Authentication Schemes for Open Distributed Network: A Classification
暂无分享,去创建一个
[1] Hans-Joachim Hof,et al. A cluster-based security architecture for ad hoc networks , 2004, IEEE INFOCOM 2004.
[2] Chris McDonald,et al. Kerberos Assisted Authentication in Mobile Ad-hoc Networks , 2004, ACSC.
[3] Shouhuai Xu,et al. LHAP: a lightweight hop-by-hop authentication protocol for ad-hoc networks , 2003, 23rd International Conference on Distributed Computing Systems Workshops, 2003. Proceedings..
[4] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[5] Dharma P. Agrawal,et al. Threshold and identity-based key management and authentication for wireless ad hoc networks , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..
[6] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[7] Partha Dasgupta,et al. Distributed authentication for peer-to-peer networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..
[8] Jennifer Seberry,et al. Proceedings of the Second International Workshop on Information Security , 1997 .
[9] Sushil Jajodia,et al. LEAP+: Efficient security mechanisms for large-scale distributed sensor networks , 2006, TOSN.
[10] Candelaria Hernández-Goya,et al. Self-organized authentication architecture for Mobile Ad-hoc Networks , 2008, 2008 6th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks and Workshops.
[11] Jehan-François Pâris,et al. Maille Authentication - A Novel Protocol for Distributed Authentication , 2004, SEC.
[12] Diana K. Smetters,et al. Talking to Strangers: Authentication in Ad-Hoc Wireless Networks , 2002, NDSS.
[13] Luiz A. DaSilva,et al. A reputation-based mechanism for isolating selfish nodes in ad hoc networks , 2005, The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services.
[14] Peng Ning,et al. An efficient scheme for authenticating public keys in sensor networks , 2005, MobiHoc '05.
[15] Thomas Beth,et al. Trust relationships in secure systems-a distributed authentication perspective , 1993, Proceedings 1993 IEEE Computer Society Symposium on Research in Security and Privacy.
[16] Ed Dawson,et al. Classification of Authentication Protocols: A Practical Approach , 2000, ISW.
[17] R. Perlman,et al. An overview of PKI trust models , 1999, IEEE Netw..
[18] M.R. Lyu,et al. An authentication service against dishonest users in mobile ad hoc networks , 2004, 2004 IEEE Aerospace Conference Proceedings (IEEE Cat. No.04TH8720).
[19] André Weimerskirch,et al. A Distributed Light-Weight Authentication Model for Ad-hoc Networks , 2001, ICISC.
[20] David W. Chadwick. Internet X.509 Public Key Infrastructure Operational Protocols -- LDAPv3 , 2002 .
[21] Banshilal Patidar. Intrusion Detection in Wireless Ad Hoc Networks , 2010 .
[22] Ran Canetti,et al. Efficient authentication and signing of multicast streams over lossy channels , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[23] Haiyun Luo,et al. Self-securing ad hoc wireless networks , 2002, Proceedings ISCC 2002 Seventh International Symposium on Computers and Communications.
[24] John A. Clark,et al. A Survey of Authentication Protocol Literature , 2010 .
[25] Dharma P. Agrawal,et al. A novel authentication scheme for ad hoc networks , 2000, 2000 IEEE Wireless Communications and Networking Conference. Conference Record (Cat. No.00TH8540).
[26] Frank Stajano,et al. The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.
[27] Dirk Westhoff,et al. Identity certified authentication for ad-hoc networks , 2003, SASN '03.
[28] John A. Clark,et al. A survey of authentication protocol literature: Version 1.0 , 1997 .
[29] Stefano Basagni,et al. Secure pebblenets , 2001, MobiHoc '01.
[30] Michael R. Lyu,et al. Trust- and clustering-based authentication services in mobile ad hoc networks , 2004, 24th International Conference on Distributed Computing Systems Workshops, 2004. Proceedings..