A Secure Intra-domain Routing Protocol for Wireless Mesh Networks
暂无分享,去创建一个
[1] Peng Ning,et al. How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols , 2003, IEEE Systems, Man and Cybernetics SocietyInformation Assurance Workshop, 2003..
[2] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[3] Hovav Shacham,et al. Short Signatures from the Weil Pairing , 2001, J. Cryptol..
[4] Elizabeth M. Belding-Royer,et al. A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..
[5] Ratna Dutta,et al. Pairing-Based Cryptographic Protocols : A Survey , 2004, IACR Cryptol. ePrint Arch..
[6] Raouf Boutaba,et al. Routing protocols in wireless mesh networks: challenges and design considerations , 2006, Multimedia Tools and Applications.
[7] Manel Guerrero Zapata. Secure ad hoc on-demand distance vector routing , 2002, MOCO.
[8] Yuguang Fang,et al. ARSA: An Attack-Resilient Security Architecture for Multihop Wireless Mesh Networks , 2006, IEEE Journal on Selected Areas in Communications.
[9] Charles E. Perkins,et al. Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.
[10] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[11] Colin Boyd,et al. Advances in Cryptology - ASIACRYPT 2001 , 2001 .
[12] Myung J. Lee,et al. Emerging standards for wireless mesh technology , 2006, IEEE Wireless Communications.
[13] Manel Guerrero Zapata. Secure Ad hoc On-Demand Distance Vector (SAODV) Routing , 2006 .
[14] Chunxiao Chigan,et al. Token Routing: A Power Efficient Method for Securing AODV Routing Protocol , 2006, 2006 IEEE International Conference on Networking, Sensing and Control.
[15] Ian F. Akyildiz,et al. Wireless mesh networks: a survey , 2005, Comput. Networks.