Authenticated On-Demand Ad Hoc Routing Protocol without Pre-shared Key Distribution
暂无分享,去创建一个
[1] Hugo Krawczyk,et al. A modular approach to the design and analysis of authentication and key exchange protocols (extended abstract) , 1998, STOC '98.
[2] Mihai Nadin,et al. Not Everything We Know We Learned , 2003, ABiALS.
[3] Ran Canetti,et al. Efficient authentication and signing of multicast streams over lossy channels , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[4] Elizabeth M. Belding-Royer,et al. A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..
[5] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[6] Elizabeth M. Belding-Royer,et al. Authenticated routing for ad hoc networks , 2005, IEEE Journal on Selected Areas in Communications.
[7] H. J. Kadim. Analytical Modelling of Power Attenuation under Parameter Fluctuations with Applications to Self-Test and Repair , 2006, First NASA/ESA Conference on Adaptive Hardware and Systems (AHS'06).
[8] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[9] H. J. Kadim,et al. Estimation of parameter fluctuations for robust operation in analogue circuits and systems , 2000, 2000 IEEE International Symposium on Circuits and Systems. Emerging Technologies for the 21st Century. Proceedings (IEEE Cat No.00CH36353).
[10] David B. Johnson,et al. The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks , 2003 .
[11] H.J. Kadim. Estimation of a maximum bound of uncertain parameter fluctuations with applications to analogue IP-cores , 2004, 2004 International Symposium on System-on-Chip, 2004. Proceedings..
[12] Kenneth G. Paterson,et al. Key Agreement Using Statically Keyed Authenticators , 2004, ACNS.
[13] H. J. Kadim. Analytical Modelling for Adaptive Multi-Purpose On-Chip Optical Interconnect , 2007, Second NASA/ESA Conference on Adaptive Hardware and Systems (AHS 2007).
[14] Wonjun Lee,et al. LSRP: A Lightweight Secure Routing Protocol with Low Cost for Ad-Hoc Networks , 2005, ICOIN.
[15] N. Asokan,et al. Securing ad hoc routing protocols , 2002, WiSE '02.
[16] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.
[17] W. Walter,et al. Contingent Negative Variation : An Electric Sign of Sensori-Motor Association and Expectancy in the Human Brain , 1964, Nature.