Public-key management in mobile ad hoc networks
暂无分享,去创建一个
Di Bai | Haifeng Lin | Yunfei Liu | Anna Jiang | Di Bai | Haifeng Lin | A. Jiang | Yun-fei Liu
[1] Jiejun Kong,et al. Providing robust and ubiquitous security support for mobile ad-hoc networks , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.
[2] Pietro Michiardi,et al. Prevention of denial of service attacks and selfishness in mobile ad hoc networks , 2002 .
[3] Moti Yung,et al. Optimal-resilience proactive public-key cryptosystems , 1997, Proceedings 38th Annual Symposium on Foundations of Computer Science.
[4] Charles E. Perkins,et al. Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.
[5] Yvo Desmedt,et al. Threshold cryptography , 1994, Eur. Trans. Telecommun..
[6] J. V. D. Merwe,et al. Self-Organized Public Key Management for Mobile Ad Hoc Networks , 2002 .
[7] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[8] Michael K. Reiter,et al. Authentication metric analysis and design , 1999, TSEC.
[9] Tang Ming . Wei Lian. Si Tuo Lin Si,et al. Cryptography and Network Security - Principles and Practice , 2015 .
[10] R. Wells. Applied Coding and Information Theory for Engineers , 1998 .
[11] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[12] Charles E. Perkins,et al. Ad Hoc Networking , 2001 .
[13] H Deng,et al. ROUTING SECURITY IN AD HOC NETWORKS , 2002 .
[14] Rafail Ostrovsky,et al. How To Withstand Mobile Virus Attacks , 1991, PODC 1991.