Authentic Vehicular Environment Using a Cluster Based Key Management
暂无分享,去创建一个
[1] Srdjan Capkun,et al. Self-Organized Public-Key Management for Mobile Ad Hoc Networks , 2003, IEEE Trans. Mob. Comput..
[2] S. Sivagurunathan,et al. Securing Mobile Ad Hoc Networks through AntTree Clustering and Threshold Cryptography , 2006, 2006 International Symposium on Ad Hoc and Ubiquitous Computing.
[3] Melbourne Barton,et al. Efficient flooding with passive clustering-an overhead-free selective forward mechanism for ad hoc/sensor networks , 2003 .
[4] Vaduvur Bharghavan,et al. Routing in ad-hoc networks using minimum connected dominating sets , 1997, Proceedings of ICC'97 - International Conference on Communications.
[5] Hisham Dahshan,et al. Key Management in Web of Trust for Mobile Ad Hoc Networks , 2009, 2009 International Conference on Advanced Information Networking and Applications.
[6] Robin Kravets,et al. MOCA : MObile Certificate Authority for Wireless Ad Hoc Networks , 2004 .
[7] Tomoyuki Ohta,et al. An adaptive multihop clustering scheme for highly mobile ad hoc networks , 2003, The Sixth International Symposium on Autonomous Decentralized Systems, 2003. ISADS 2003..
[8] Charalampos Konstantopoulos,et al. Clustering in mobile ad hoc networks through neighborhood stability-based mobility prediction , 2008, Comput. Networks.
[9] Mahmoud Naghshineh,et al. PARO: Supporting Dynamic Power Controlled Routing in Wireless Ad Hoc Networks , 2003, Wirel. Networks.
[10] Taieb Znati,et al. A mobility-based framework for adaptive clustering in wireless ad hoc networks , 1999, IEEE J. Sel. Areas Commun..
[11] Sung-Ju Lee,et al. Ad hoc wireless multicast with mobility prediction , 1999, Proceedings Eight International Conference on Computer Communications and Networks (Cat. No.99EX370).
[12] Mario Gerla,et al. Adaptive Clustering for Mobile Wireless Networks , 1997, IEEE J. Sel. Areas Commun..
[13] Soyoung Park,et al. Reliable Traffic Information Propagation in Vehicular Ad-Hoc Networks , 2008, 2008 IEEE Sarnoff Symposium.
[14] Haiyun Luo,et al. Security in mobile ad hoc networks: challenges and solutions , 2004, IEEE Wireless Communications.
[15] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.
[16] Adrian Perrig,et al. Challenges in Securing Vehicular Networks , 2005 .
[17] Robert H. Deng,et al. Highly reliable trust establishment scheme in ad hoc networks , 2004, Comput. Networks.
[18] Prithwish Basu,et al. A mobility based metric for clustering in mobile ad hoc networks , 2001, Proceedings 21st International Conference on Distributed Computing Systems Workshops.
[19] Peng Liu,et al. Localized public-key management for mobile ad hoc networks , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..
[20] I. Sasase,et al. On demand distributed public key management for wireless ad hoc networks , 2005, PACRIM. 2005 IEEE Pacific Rim Conference on Communications, Computers and signal Processing, 2005..
[21] Thomas Nowey,et al. Towards a security architecture for vehicular ad hoc networks , 2006, First International Conference on Availability, Reliability and Security (ARES'06).
[22] Charles E. Perkins,et al. Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.