An Efficient Trusted Computing Base for MANET Security
暂无分享,去创建一个
[1] Paul Ward,et al. Trusted computing for protecting ad-hoc routing , 2006, 4th Annual Communication Networks and Services Research Conference (CNSR'06).
[2] Charles E. Perkins,et al. Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.
[3] Ralph C. Merkle,et al. Protocols for Public Key Cryptosystems , 1980, 1980 IEEE Symposium on Security and Privacy.
[4] Charles E. Perkins,et al. Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers , 1994, SIGCOMM.
[5] Victor C. M. Leung,et al. Secure routing with tamper resistant module for mobile Ad hoc networks , 2003, MOCO.
[6] Mahalingam Ramkumar,et al. Minimal trusted computing base for MANET nodes , 2010, 2010 IEEE 6th International Conference on Wireless and Mobile Computing, Networking and Communications.
[7] Mahalingam Ramkumar,et al. A Framework for Dual-Agent MANET Routing Protocols , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.
[8] B. Lampson,et al. Authentication in distributed systems: theory and practice , 1991, TOCS.
[9] Jean-Pierre Hubaux,et al. The quest for security in mobile ad hoc networks , 2001, MobiHoc '01.
[10] Mahalingam Ramkumar. On the scalability of an efficient “Nonscalable” key distribution scheme , 2008, 2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks.
[11] Burton H. Bloom,et al. Space/time trade-offs in hash coding with allowable errors , 1970, CACM.
[12] Elizabeth M. Belding-Royer,et al. A review of current routing protocols for ad hoc mobile wireless networks , 1999, IEEE Wirel. Commun..