Distributed authentication for services commercialization in ad hoc networks
暂无分享,去创建一个
[1] Chris McDonald,et al. A Review of Secure Routing Protocols for Ad hoc Mobile Wireless Networks , 2003 .
[2] Srdjan Capkun,et al. Mobility helps peer-to-peer security , 2006, IEEE Transactions on Mobile Computing.
[3] Gilles Bourdon,et al. Authentication and services access control in a cooperative ad hoc environment , 2008, 2008 5th International Conference on Broadband Communications, Networks and Systems.
[4] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[5] Jean-Pierre Hubaux,et al. The quest for security in mobile ad hoc networks , 2001, MobiHoc '01.
[6] Hannes Tschofenig,et al. The EAP-PSK Protocol: A Pre-Shared Key Extensible Authentication Protocol (EAP) Method , 2007, RFC.
[7] John T. Kohl,et al. The Kerberos Network Authentication Service (V5 , 2004 .
[8] Gregory A. Hansen,et al. The Optimized Link State Routing Protocol , 2003 .
[9] Kenneth Raeburn,et al. Encryption and Checksum Specifications for Kerberos 5 , 2005, RFC.
[10] Chris McDonald,et al. Kerberos Assisted Authentication in Mobile Ad-hoc Networks , 2004, ACSC.
[11] Jim Schaad,et al. Initial and Pass Through Authentication Using Kerberos V5 and the GSS- API (IAKERB) , 2007 .