Secure pebblenets
暂无分享,去创建一个
Stefano Basagni | Danilo Bruschi | Emilia Rosti | Kris Herrin | S. Basagni | D. Bruschi | Kris Herrin | E. Rosti
[1] Stefano Basagni,et al. Finding a Maximal Weighted Independent Set in Wireless Networks , 2001, Telecommun. Syst..
[2] Sajal K. Das,et al. Mobility-adaptive protocols for managing large ad hoc networks , 2001, ICC 2001. IEEE International Conference on Communications. Conference Record (Cat. No.01CH37240).
[3] Sajal K. Das,et al. An on-demand weighted clustering algorithm (WCA) for ad hoc networks , 2000, Globecom '00 - IEEE. Global Telecommunications Conference. Conference Record (Cat. No.00CH37137).
[4] Sushil Jajodia,et al. Kronos: a scalable group re-keying approach for secure multicast , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[5] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[6] Stefano Basagni,et al. Distributed and mobility-adaptive clustering for multimedia support in multi-hop wireless networks , 1999, Gateway to 21st Century Communications Village. VTC 1999-Fall. IEEE VTS 50th Vehicular Technology Conference (Cat. No.99CH36324).
[7] Nathalie Weiler,et al. The VersaKey framework: versatile group key management , 1999, IEEE J. Sel. Areas Commun..
[8] Stefano Basagni,et al. Distributed clustering for ad hoc networks , 1999, Proceedings Fourth International Symposium on Parallel Architectures, Algorithms, and Networks (I-SPAN'99).
[9] Imrich Chlamtac,et al. A new approach to the design and analysis of peer‐to‐peer mobile networks , 1999, Wirel. Networks.
[10] Frank Stajano,et al. The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.
[11] Carl A. Gunter,et al. Specifying the PLAN Network Programming Langauge , 1999, HOOTS.
[12] Bruce Schneier,et al. Applied cryptography (2nd ed.): protocols, algorithms, and source code in C , 1995 .