A Novel Algorithm HSHA to Secure Wireless Ad hoc Network
暂无分享,去创建一个
[1] Vasileios Karyotis,et al. A novel framework for mobile attack strategy modelling and vulnerability analysis in wireless ad hoc networks , 2006, Int. J. Secur. Networks.
[2] Stephen T. Kent,et al. Secure Border Gateway Protocol (S-BGP) - Real World Performance and Deployment Issues , 2000, NDSS.
[3] N. Asokan,et al. Securing ad hoc routing protocols , 2002, WiSE '02.
[4] Stephen T. Kent,et al. Secure Border Gateway Protocol (S-BGP) , 2000, IEEE Journal on Selected Areas in Communications.
[5] Tat Chee Wan,et al. Performance evaluation of IEEE 802.15.4 wireless multi-hop networks: simulation and testbed approach , 2007, Int. J. Ad Hoc Ubiquitous Comput..
[6] Raúl Aquino-Santos,et al. Performance evaluation of routing protocols in vehicular ad-hoc networks , 2005, Int. J. Ad Hoc Ubiquitous Comput..
[7] Susanne Wetzel,et al. Cryptographic Versus Trust-based Methods for MANET Routing Security , 2008, STM@ESORICS.
[8] Jiejun Kong,et al. Providing robust and ubiquitous security support for mobile ad-hoc networks , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.
[9] Sheng-Ti Li,et al. Enhanced Security Design for Threshold Cryptography in Ad Hoc Network Sheng-Ti Li , , 2004 .
[10] Falko Dressler. Reliable and semi-reliable communication with authentication in mobile ad hoc networks , 2005, IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005..
[11] Izhak Rubin,et al. Robust throughput and routing for mobile ad hoc wireless networks , 2009, Ad Hoc Networks.
[12] Nitesh Saxena,et al. Public Key Cryptography Sans Certificates in Ad Hoc Networks , 2006, ACNS.
[13] Jelena V. Misic,et al. MAC layer security of 802.15.4-compliant networks , 2005, IEEE International Conference on Mobile Adhoc and Sensor Systems Conference, 2005..
[14] Yi Mu,et al. An identity-based Broadcast Encryption Scheme for mobile ad-hoc networks , 2006 .
[15] Ian F. Akyildiz,et al. Wireless sensor networks: a survey , 2002, Comput. Networks.
[16] Elizabeth M. Belding-Royer,et al. A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..
[17] Chai-Keong Toh,et al. Evaluating the communication performance of an ad hoc wireless network , 2002, IEEE Trans. Wirel. Commun..
[18] Dijiang Huang. Pseudonym-based cryptography for anonymous communications in mobile ad hoc networks , 2007, Int. J. Secur. Networks.
[19] Mário Serafim Nunes,et al. Performance evaluation of IEEE 802.11e , 2002, The 13th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications.