暂无分享,去创建一个
Helge Janicke | Hamza Aldabbas | Ali H. Al-Bayatti | Tariq Falah Alwada'n | H. Janicke | Hamza Aldabbas | A. Al-Bayatti | T. Alwada'n
[1] Panagiotis Papadimitratos,et al. Securing Mobile Ad Hoc Networks , 2004, Mobile Computing Handbook.
[2] Jean-Pierre Hubaux,et al. The quest for security in mobile ad hoc networks , 2001, MobiHoc '01.
[3] Hussein Zedan,et al. Security Solution for Mobile Ad Hoc Network of Networks (MANoN) , 2009, 2009 Fifth International Conference on Networking and Services.
[4] Mihaela Cardei,et al. A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks , 2007 .
[5] Dharma P. Agrawal,et al. Security in Wireless Ad Hoc Networks , 2005, Handbook of Algorithms for Wireless Networking and Mobile Computing.
[6] Yongguang Zhang,et al. Security in Mobile Ad-Hoc Networks , 2005 .
[7] Yvo Desmedt,et al. Threshold cryptography , 1994, Eur. Trans. Telecommun..
[8] Haiyun Luo,et al. Security in mobile ad hoc networks: challenges and solutions , 2004, IEEE Wireless Communications.
[9] P. Khatri,et al. A Survey on Security issues in Mobile ADHOC networks , 2009 .
[10] Brian Haberman,et al. Key Challenges of Military Tactical Networking and the Elusive Promise of MANET Technology , 2006, IEEE Communications Magazine.
[11] Ekata Mehul,et al. Security in Mobile Ad Hoc Networks , 2009 .
[12] Joan Feigenbaum,et al. Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[13] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[14] Subir Kumar Sarkar,et al. Ad Hoc Mobile Wireless Networks: Principles, Protocols and Applications , 2007 .
[15] Charikleia Zouridaki. Security in Mobile Ad-Hoc Networks , 2008 .
[16] V. S. Sheeba,et al. Security in Mobile Ad-Hoc Networks , 2012, 2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12).
[17] Stephen T. Kent,et al. Securing the Nimrod routing architecture , 1997, Proceedings of SNDSS '97: Internet Society 1997 Symposium on Network and Distributed System Security.
[18] Sheng-Ti Li,et al. Enhanced Security Design for Threshold Cryptography in Ad Hoc Network Sheng-Ti Li , , 2004 .
[19] Ritu Chadha,et al. Policy-Driven Mobile Ad hoc Network Management , 2007 .
[20] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[21] Iman Almomani. END-TO-END SECURITY SOLUTION FOR WIRELESS MOBILE AD HOC NETWORK ( WMANET ) , 2007 .
[22] Chai-Keong Toh,et al. Maximum battery life routing to support ubiquitous mobile computing in wireless ad hoc networks , 2001, IEEE Commun. Mag..
[23] Yvo Desmedt,et al. Threshold Cryptosystems , 1989, CRYPTO.
[24] C. Siva Ram Murthy,et al. Ad Hoc Wireless Networks: Architectures and Protocols , 2004 .
[25] Djamel Djenouri,et al. A survey of security issues in mobile ad hoc and sensor networks , 2005, IEEE Communications Surveys & Tutorials.
[26] Jameela Al-Jaroodi. Security Issues at the Network Layer in Wireless Mobile Ad Hoc Networks , 2005, ICWN.
[27] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[28] Srdjan Capkun,et al. Self-Organized Public-Key Management for Mobile Ad Hoc Networks , 2003, IEEE Trans. Mob. Comput..