Providing real-time security support for multi-level ad-hoc networks
暂无分享,去创建一个
Jiejun Kong | Mario Gerla | M. Gerla | J. Kong | Jiejun Kong
[1] Xiaoyan Hong,et al. Hierarchical routing for multi-layer ad-hoc wireless networks with UAVs , 2000, MILCOM 2000 Proceedings. 21st Century Military Communications. Architectures and Technologies for Information Superiority (Cat. No.00CH37155).
[2] David A. Maltz,et al. Dynamic Source Routing in Ad Hoc Wireless Networks , 1994, Mobidata.
[3] Christopher Allen,et al. The TLS Protocol Version 1.0 , 1999, RFC.
[4] Charles E. Perkins,et al. Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers , 1994, SIGCOMM.
[5] Dan Boneh,et al. Experimenting with Electronic Commerce on the PalmPilot , 1999, Financial Cryptography.
[6] Xiaoyan Hong,et al. C-ICAMA, a centralized intelligent channel assigned multiple access for multi-layer ad-hoc wireless networks with UAVs , 2000, 2000 IEEE Wireless Communications and Networking Conference. Conference Record (Cat. No.00TH8540).
[7] Vincent Park,et al. Temporally-Ordered Routing Algorithm (TORA) Version 1 Functional Specification , 2001 .
[8] Arjen K. Lenstra,et al. Selecting Cryptographic Key Sizes , 2000, Journal of Cryptology.
[9] P. R. Kumar,et al. Internets in the sky: The capacity of three-dimensional wireless networks , 2001, Commun. Inf. Syst..
[10] Robert Tappan Morris,et al. Capacity of Ad Hoc wireless networks , 2001, MobiCom '01.
[11] Charles E. Perkins,et al. Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.
[12] J. Broch,et al. Dynamic source routing in ad hoc wireless networks , 1998 .
[13] Panganamala Ramana Kumar,et al. RHEINISCH-WESTFÄLISCHE TECHNISCHE HOCHSCHULE AACHEN , 2001 .
[14] V. Gupta,et al. Securing the wireless internet , 2001, IEEE Commun. Mag..
[15] T. Dierks,et al. The TLS protocol , 1999 .
[16] Xiaoyan Hong,et al. UAV aided intelligent routing for ad-hoc wireless network in single-area theater , 2000, 2000 IEEE Wireless Communications and Networking Conference. Conference Record (Cat. No.00TH8540).
[17] Charles E. Perkins,et al. Performance comparison of two on-demand routing protocols for ad hoc networks , 2001, IEEE Wirel. Commun..
[18] H. Feistel. Cryptography and Computer Privacy , 1973 .