Secure data transmission in mobile ad hoc networks
暂无分享,去创建一个
[1] Azer Bestavros,et al. TCP Boston: a fragmentation-tolerant TCP protocol for ATM networks , 1997, Proceedings of INFOCOM '97.
[2] Michael O. Rabin,et al. Efficient dispersal of information for security, load balancing, and fault tolerance , 1989, JACM.
[3] Zygmunt J. Haas,et al. Multipath routing in the presence of frequent topological changes , 2001, IEEE Commun. Mag..
[4] Donal O'Mahony,et al. Secure routing for mobile ad hoc networks , 2005, IEEE Communications Surveys & Tutorials.
[5] Panagiotis Papadimitratos,et al. Path set selection in mobile ad hoc networks , 2002, MobiHoc '02.
[6] Baruch Awerbuch,et al. An on-demand secure routing protocol resilient to byzantine failures , 2002, WiSE '02.
[7] Christian Bettstetter,et al. On the minimum node degree and connectivity of a wireless multihop network , 2002, MobiHoc '02.
[8] Michael O. Rabin,et al. Probabilistic Algorithms in Finite Fields , 1980, SIAM J. Comput..
[9] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[10] Hugo Krawczyk,et al. HMAC: Keyed-Hashing for Message Authentication , 1997, RFC.
[11] Elizabeth M. Belding-Royer,et al. A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..
[12] Panagiotis Papadimitratos,et al. Secure link state routing for mobile ad hoc networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..
[13] Randall J. Atkinson,et al. Security Architecture for the Internet Protocol , 1995, RFC.
[14] Panagiotis Papadimitratos,et al. The secure routing protocol (SRP) for ad hoc networks, IETF Internet Draft , 2002 .
[15] J.-P. Hubaux,et al. Enforcing service availability in mobile ad-hoc WANs , 2000, 2000 First Annual Workshop on Mobile and Ad Hoc Networking and Computing. MobiHOC (Cat. No.00EX444).
[16] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[17] Lixia Zhang,et al. Stream Control Transmission Protocol , 2000, RFC.
[18] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2005, Wirel. Networks.
[19] N. Asokan,et al. Securing ad hoc routing protocols , 2002, WiSE '02.
[20] Qiaobing Xie,et al. Stream control transmission protocol (SCTP): a reference guide , 2001 .
[21] Hugo Krawczyk,et al. A Security Architecture for the Internet Protocol , 1999, IBM Syst. J..
[22] Randall J. Atkinson,et al. IP Encapsulating Security Payload (ESP) , 1995, RFC.
[23] W. Douglas Maughan,et al. Internet Security Association and Key Management Protocol (ISAKMP) , 1998, RFC.
[24] Panagiotis Papadimitratos,et al. Secure message transmission in mobile ad hoc networks , 2003, Ad Hoc Networks.
[25] Stephen T. Kent,et al. IP Authentication Header , 1995, RFC.
[26] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[27] Carlisle Adams,et al. Using Elliptic Curve Diffie-Hellman in the SPKM GSS-API , 1999 .
[28] David A. Maltz,et al. A performance comparison of multi-hop wireless ad hoc network routing protocols , 1998, MobiCom '98.
[29] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.