A Novel Anonymous Authentication Scheme in Ad Hoc Networks
暂无分享,去创建一个
[1] Stefanos Gritzalis,et al. Addressing Privacy: Matching User Requirements with Implementation Techniques , 2005 .
[2] Zhi Li,et al. An adaptive clustering routing transition protocol in ad hoc networks , 2008, Comput. Commun..
[3] Shinichi Honiden,et al. An authentication architecture for collaboration among agents in ad hoc networks , 2004 .
[4] Christos Douligeris,et al. Multifold node authentication in mobile ad hoc networks , 2007, Int. J. Commun. Syst..
[5] Yunhao Liu,et al. Pseudo Trust: Zero-Knowledge Authentication in Anonymous P2Ps , 2008, IEEE Transactions on Parallel and Distributed Systems.
[6] Shiuh-Jeng Wang,et al. Two-tier authentication for cluster and individual sets in mobile ad hoc networks , 2007, Comput. Networks.
[7] W.-S. Juang,et al. Anonymous channel and authentication in wireless communications , 1999, Comput. Commun..
[8] Eitan Altman,et al. Performance of ad hoc networks with two-hop relay routing and limited packet lifetime (extended version) , 2008, Perform. Evaluation.
[9] Eitan Altman,et al. Performance of Ad Hoc Networks with Two-Hop Relay Routing and Limited Packet Lifetime , 2006, IWQoS.
[10] Bernhard Plattner,et al. Density-Based Anycast: A Robust Routing Strategy for Wireless Ad Hoc Networks , 2008, IEEE/ACM Transactions on Networking.
[11] Azzedine Boukerche,et al. An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks , 2005, Comput. Commun..
[12] Yuguang Fang,et al. MASK: anonymous on-demand routing in mobile ad hoc networks , 2006, IEEE Transactions on Wireless Communications.