Multifold node authentication in mobile ad hoc networks
暂无分享,去创建一个
Christos Douligeris | Dimitrios D. Vergados | Nikos Komninos | D. Vergados | N. Komninos | C. Douligeris
[1] Elizabeth M. Belding-Royer,et al. A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..
[2] Panagiotis Papadimitratos,et al. Path set selection in mobile ad hoc networks , 2002, MobiHoc '02.
[3] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.
[4] Panagiotis Papadimitratos,et al. Secure link state routing for mobile ad hoc networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..
[5] David A. Wagner,et al. Intercepting mobile communications: the insecurity of 802.11 , 2001, MobiCom '01.
[6] Xiaoyan Hong,et al. ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks , 2003, MobiHoc '03.
[7] Azzedine Boukerche,et al. An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks , 2005, Comput. Commun..
[8] Wenke Lee,et al. Intrusion detection in wireless ad-hoc networks , 2000, MobiCom '00.
[9] John Ioannidis,et al. Using the Fluhrer, Mantin, and Shamir Attack to Break WEP , 2002, NDSS.
[10] Nitin H. Vaidya,et al. Detection and handling of MAC layer misbehavior in wireless networks , 2003, 2003 International Conference on Dependable Systems and Networks, 2003. Proceedings..
[11] Elizabeth M. Belding-Royer,et al. A review of current routing protocols for ad hoc mobile wireless networks , 1999, IEEE Wirel. Commun..
[12] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[13] Charles E. Perkins,et al. Multicast Ad hoc On-Demand Distance Vector (MAODV) Routing , 2000 .
[14] Charles E. Perkins,et al. Ad Hoc Networking , 2001 .
[15] Yih-Chun Hu,et al. SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2002, Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications.
[16] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[17] Dharma P. Agrawal,et al. Security enhancements in AODV protocol for wireless ad hoc networks , 2001, IEEE 54th Vehicular Technology Conference. VTC Fall 2001. Proceedings (Cat. No.01CH37211).
[18] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[19] Srdjan Capkun,et al. Mobility helps security in ad hoc networks , 2003, MobiHoc '03.
[20] Yih-Chun Hu,et al. Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[21] N. Asokan,et al. Key agreement in ad hoc networks , 2000, Comput. Commun..
[22] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[23] Panagiotis Papadimitratos,et al. Secure Routing for Mobile Ad Hoc Networks , 2002 .
[24] Jiejun Kong,et al. Providing robust and ubiquitous security support for mobile ad-hoc networks , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.
[25] Frank Stajano,et al. The Resurrecting Duckling - What Next? , 2000, Security Protocols Workshop.
[26] Charles E. Perkins,et al. Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.
[27] Srdjan Capkun,et al. Self-organization in mobile ad hoc networks: the approach of Terminodes , 2001, IEEE Commun. Mag..
[28] Jean-Pierre Hubaux,et al. The quest for security in mobile ad hoc networks , 2001, MobiHoc '01.