Key Management and Authentication in Ad Hoc Network based on Mobile Agent
暂无分享,去创建一个
[1] Marco Dorigo,et al. Mobile agents for adaptive routing , 1998, Proceedings of the Thirty-First Hawaii International Conference on System Sciences.
[2] Ahmed Karmouch,et al. Mobile software agents: an overview , 1998, IEEE Commun. Mag..
[3] Levente Buttyán,et al. Report on a working session on security in wireless ad hoc networks , 2003, MOCO.
[4] Jiejun Kong,et al. Providing robust and ubiquitous security support for mobile ad-hoc networks , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.
[5] Amitava Mukherjee,et al. Communication-aware mobile hosts in ad-hoc wireless network , 1999, 1999 IEEE International Conference on Personal Wireless Communications (Cat. No.99TH8366).
[6] Jean-Pierre Hubaux,et al. The quest for security in mobile ad hoc networks , 2001, MobiHoc '01.
[7] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[8] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[9] Robin Kravets,et al. MOCA : MObile Certificate Authority for Wireless Ad Hoc Networks , 2004 .