An Integrated Security Framework for Access Control and Address Auto-Configuration for MANETs
暂无分享,去创建一个
[1] Gene Tsudik,et al. Admission control in peer groups , 2003, Second IEEE International Symposium on Network Computing and Applications, 2003. NCA 2003..
[2] Haiyun Luo,et al. Adaptive security for multilevel ad hoc networks , 2002, Wirel. Commun. Mob. Comput..
[3] Torben P. Pedersen. A Threshold Cryptosystem without a Trusted Party (Extended Abstract) , 1991, EUROCRYPT.
[4] Adi Shamir,et al. How to share a secret , 1979, CACM.
[5] Chris J. Mitchell,et al. Improving IP Address Autoconfiguration Security in MANETs Using Trust Modelling , 2005, MSN.
[6] Ana R. Cavalli,et al. Secure hosts auto-configuration in mobile ad hoc networks , 2004, 24th International Conference on Distributed Computing Systems Workshops, 2004. Proceedings..
[7] Ricardo Staciarini Puttini,et al. A Secure Autoconfiguration Protocol for MANET Nodes , 2004, ADHOC-NOW.
[8] Raja Datta,et al. A secure dynamic IP configuration scheme for mobile ad hoc networks , 2011, Ad Hoc Networks.
[9] Yuguang Fang,et al. Securing Mobile Ad Hoc Networks with Certificateless Public Keys , 2006, IEEE Transactions on Dependable and Secure Computing.
[10] Archan Misra,et al. Autoconfiguration, registration, and mobility management for pervasive computing , 2001, IEEE Wirel. Commun..
[11] Nitin H. Vaidya,et al. Weak duplicate address detection in mobile ad hoc networks , 2002, MobiHoc '02.
[12] Haiyun Luo,et al. Adaptive Security for Multi-layer Ad-hoc Networks , 2002 .
[13] Lionel M. Ni,et al. Prophet address allocation for large scale MANETs , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[14] Songwu Lu,et al. Self-organized network-layer security in mobile ad hoc networks , 2002, WiSE '02.
[15] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[16] Ravi Prakash,et al. IP address assignment in a mobile ad hoc network , 2002, MILCOM 2002. Proceedings.
[17] Ravi Prakash,et al. MANETconf: configuration of hosts in a mobile ad hoc network , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.
[18] Mohammed Feham,et al. On Recent Security Enhancements to Autoconfiguration Protocols for MANETs Real Threats and Requirements , 2009 .
[19] Raja Datta,et al. ADIP: an improved authenticated dynamic IP configuration scheme for mobile ad hoc networks , 2009, Int. J. Ultra Wideband Commun. Syst..
[20] Jeong Hyun Yi,et al. Threshold cryptography in P2P and MANETs: The case of access control , 2007, Comput. Networks.
[21] Carlos J. Bernardos,et al. Survey of IP address autoconfiguration mechanisms for MANETs , 2010 .
[22] André Langer. Security issues in Address Autoconfiguration Protocols: An improved version of the Optimized Dynamic Address Configuration Protocol , 2006 .
[23] Jeong Hyun Yi,et al. Identity-Based Access Control for Ad Hoc Groups , 2004, ICISC.
[24] David A. Maltz,et al. Dynamic Source Routing in Ad Hoc Wireless Networks , 1994, Mobidata.
[25] Jeong Hyun Yi,et al. Access control in ad hoc groups , 2004 .
[26] Peng Ning,et al. Secure address auto-configuration for mobile ad hoc networks , 2005, The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services.
[27] Haiyun Luo,et al. URSA: ubiquitous and robust access control for mobile ad hoc networks , 2004, IEEE/ACM Transactions on Networking.
[28] Ali Movaghar-Rahimabadi,et al. ID-NAC: Identity-based network access control for MANETs , 2008, 2008 16th IEEE International Conference on Networks.
[29] Charles E. Perkins,et al. Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.