Ensuring Secure Information Management in 802 . 11 Networks after a Central Authority Failure
暂无分享,去创建一个
[1] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[2] Wenke Lee,et al. A cooperative intrusion detection system for ad hoc networks , 2003, SASN '03.
[3] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[4] Teresa A. Dahlberg,et al. Providing fault tolerance in wireless access networks , 2002, IEEE Commun. Mag..
[5] X. Wang,et al. GSWLAN: a new architecture model for a generic and secure wireless LAN system , 2004, Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004..
[6] O. Spaniol,et al. Establishing Pair-wise Keys for Secure Communication in Ad-Hoc Networks Seminar: Pervasive Computing SS 2004 , 2022 .
[7] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[8] Stefan Savage,et al. 802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions , 2003, USENIX Security Symposium.
[9] Baruch Awerbuch,et al. An on-demand secure routing protocol resilient to byzantine failures , 2002, WiSE '02.
[10] David Levin,et al. Survivable mobile wireless networks: issues, challenges, and research directions , 2002, WiSE '02.