Design and Development of a Secured Routing Scheme for Mobile Adhoc Network
暂无分享,去创建一个
[1] Daryl McCullough,et al. Noninterference and the composability of security properties , 1988, Proceedings. 1988 IEEE Symposium on Security and Privacy.
[2] Michael K. Reiter,et al. Networked cryptographic devices resilient to capture , 2003, International Journal of Information Security.
[3] Robin Kravets,et al. Security-aware ad hoc routing for wireless networks , 2001, MobiHoc '01.
[4] Martín Abadi,et al. Authentication in distributed systems: theory and practice , 1991, SOSP '91.
[5] Eytan Modiano,et al. Dynamic power allocation and routing for time varying wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[6] Matthew K. Franklin,et al. Secure Communication in Minimal Connectivity Models , 1998, Journal of Cryptology.
[7] John McLean,et al. A General Theory of Composition for a Class of "Possibilistic'' Properties , 1996, IEEE Trans. Software Eng..
[8] Martín Abadi,et al. Authentication in the Taos operating system , 1993, SOSP '93.
[9] Panganamala Ramana Kumar,et al. RHEINISCH-WESTFÄLISCHE TECHNISCHE HOCHSCHULE AACHEN , 2001 .
[10] E. Stewart Lee,et al. A general theory of security properties , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[11] David Tse,et al. Mobility increases the capacity of ad hoc wireless networks , 2002, TNET.
[12] Malik,et al. January 2000! , 2000, American journal of physiology. Lung cellular and molecular physiology.
[13] J. J. Garcia-Luna-Aceves,et al. Securing distance-vector routing protocols , 1997, Proceedings of SNDSS '97: Internet Society 1997 Symposium on Network and Distributed System Security.
[14] Virgil D. Gligor. A Note on Denial-of-Service in Operating Systems , 1984, IEEE Transactions on Software Engineering.
[15] Michael J. Neely,et al. Dynamic power allocation and routing for satellite and wireless networks with time varying channels , 2003 .
[16] Sheng Zhong,et al. Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[17] F. Javier Thayer,et al. Security and the Composition of Machines , 1988, CSFW.
[18] Bruce Schneier,et al. Secrets and Lies: Digital Security in a Networked World , 2000 .
[19] Mukesh Singhal,et al. Deadlock detection in distributed systems , 1989, Computer.
[20] John S. Baras,et al. On the Negotiation of Access Control Policies , 2001, Security Protocols Workshop.
[21] Chris J. Mitchell,et al. Reputation methods for routing security for mobile ad hoc networks , 2003, SympoTIC'03. Joint 1st Workshop on Mobile Future and Symposium on Trends in Communications.
[22] H. Mehta. Dynamic Adaptive Routing in Mobile Ad Hoc Networks , 2002 .
[23] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[24] Léon J. M. Rothkrantz,et al. Ant-Based Load Balancing in Telecommunications Networks , 1996, Adapt. Behav..
[25] Yongguang Zhang,et al. An integrated environment for testing mobile ad-hoc networks , 2002, MobiHoc '02.
[26] Bruce Schneier,et al. Semantic network attacks. , 2000 .
[27] J. Spencer. The Strange Logic of Random Graphs , 2001 .
[28] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[29] Munindar P. Singh,et al. Detecting deception in reputation management , 2003, AAMAS '03.
[30] Seif Haridi,et al. Distributed Algorithms , 1992, Lecture Notes in Computer Science.
[31] Jerome H. Saltzer,et al. End-to-end arguments in system design , 1984, TOCS.
[32] Marie-Pierre Gleizes,et al. Agents and Multi-Agent Systems , 2011, Self-organising Software.
[33] Eytan Modiano,et al. Capacity and delay tradeoffs for ad hoc mobile networks , 2004, IEEE Transactions on Information Theory.
[34] Zhen Liu,et al. Capacity, delay and mobility in wireless ad-hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[35] Martin Vetterli,et al. Locating nodes with EASE: last encounter routing in ad hoc networks through mobility diffusion , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[36] Jonathan K. Millen,et al. A resource allocation model for denial of service , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.
[37] Jonathan K. Millen,et al. Hookup security for synchronous machines , 1990, [1990] Proceedings. The Computer Security Foundations Workshop III.
[38] Piyush Gupta,et al. Critical Power for Asymptotic Connectivity in Wireless Networks , 1999 .
[39] E. Stewart Lee,et al. The compatibility of policies , 1994, CCS '94.
[40] B. Lampson,et al. Authentication in distributed systems: theory and practice , 1991, TOCS.
[41] Martín Abadi,et al. Authentication in the Taos operating system , 1994, TOCS.
[42] Virgil D. Gligor,et al. A Specification and Verification Method for Preventing Denial of Service , 1990, IEEE Trans. Software Eng..
[43] Marianne Winslett,et al. Limiting the Disclosure of Access Control Policies during Automated Trust Negotiation , 2001, NDSS.
[44] Eytan Modiano,et al. Improving Delay in Ad-Hoc Mobile Networks Via Redundant Packet Transfers , 2003 .
[45] K.E. Seamons,et al. Automated trust negotiation , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.