A Proposed Security Subsystem for Ad Hoc Wireless Networks
暂无分享,去创建一个
[1] T. Hardjono,et al. Secure group communications for wireless networks , 2001, 2001 MILCOM Proceedings Communications for Network-Centric Operations: Creating the Information Force (Cat. No.01CH37277).
[2] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[3] Dharma P. Agrawal,et al. Routing security in wireless ad hoc networks , 2002, IEEE Commun. Mag..
[4] I. Glauche,et al. Continuum percolation of wireless ad hoc communication networks , 2003, cond-mat/0304579.
[5] M. P. Sebastian,et al. Fully distributed cluster based routing architecture for mobile ad hoc networks , 2005, WiMob'2005), IEEE International Conference on Wireless And Mobile Computing, Networking And Communications, 2005..
[6] Charles E. Perkins,et al. Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.
[7] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2005, Wirel. Networks.
[8] Victor C. M. Leung,et al. Secure Routing for Mobile Ad Hoc Networks , 2006 .
[9] N. Asokan,et al. Securing ad hoc routing protocols , 2002, WiSE '02.
[10] Wenke Lee,et al. Intrusion Detection Techniques for Mobile Wireless Networks , 2003, Wirel. Networks.
[11] Yih-Chun Hu,et al. SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2003, Ad Hoc Networks.
[12] Panagiotis Papadimitratos,et al. Secure link state routing for mobile ad hoc networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..
[13] Levente Buttyán,et al. Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks , 2003, Mob. Networks Appl..
[14] Ian F. Akyildiz,et al. Proceedings of the 8th annual international conference on Mobile computing and networking , 2000, MobiCom 2002.