Secure routing with tamper resistant module for mobile Ad hoc networks
暂无分享,去创建一个
Victor C. M. Leung | Vincent W. S. Wong | Yoji Kawamoto | Joo-Han Song | V. Wong | Joo-Han Song | Yoji Kawamoto
[1] Hugo Krawczyk,et al. HMAC: Keyed-Hashing for Message Authentication , 1997, RFC.
[2] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[3] David Aucsmith,et al. Tamper Resistant Software: An Implementation , 1996, Information Hiding.
[4] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2005, Wirel. Networks.
[5] D. Johnson,et al. ECC , Future Resiliency and High Security Systems March 30 , 1999 , 1999 .
[6] Songwu Lu,et al. Self-organized network-layer security in mobile ad hoc networks , 2002, WiSE '02.
[7] M. Kuhn,et al. The Advanced Computing Systems Association Design Principles for Tamper-resistant Smartcard Processors Design Principles for Tamper-resistant Smartcard Processors , 2022 .
[8] Charles E. Perkins,et al. Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.