supported by National Natural Science Foundation of China (Grant Nos. 61572379, 61501333, U1536204);National High Technology Research and Development Program of China (863 Program) (Grant No. 2015AA016004);Open Foundation of the State Key Laboratory of Cryptology, and Natural Science Foundation of Hubei Province (Grant No. 2015CFB257);Wang D was supported by National Natural Science Foundation of China (Grant No. 61472016);Xie Q was supported by Natural Science Foundation of Zhejiang Province (Grant No. LZ12F02005);National Basic Research Program of China (973 Program) (Grant No. 2013CB834205);National Natural Science Foundation of China (Grant Nos. 61133014, 61472114)
With the development of the wireless communication technology and the popularity of mobile devices, the mobile wireless network(MWN) has been widely used in our daily life. Through the access point(AP), users coul...
supported by National Basic Research Program of China(973 Program)(Grant No.2012CB-315903);National Natural Science Foundation of China(Grant Nos.61103200,61070157);Key Science and Technology Innovation Team Project of Zhejiang Province(Grant No.2011R50010)
Distance vector routing protocols have been widely adopted as an efcient routing mechanism in current Internet, and many wireless networks. However, as is well-known, the existing distance vector routing protocols are...
The National Basic Research Program of China(973Program) (No.G1999035805);the Natural Science Foundation of ShannxiProvince (No.2007F37);China Postdoctoral Science Foundation (No.20060401008,20070410376).
Based on thorough researches on the Chinese wireless local area network (WLAN) security standard, i. e., WLAN authentication and privacy infrastructure (WAPI), the security of the authentication access process is ...