Performance Evaluation of a Hybrid Cryptosystem with Authentication for Wireless Ad hoc Networks
暂无分享,去创建一个
[1] Deep Medhi,et al. A key-chain-based keying scheme for many-to-many secure group communication , 2004, TSEC.
[2] Lei Tang,et al. A Secure Data Transmission Scheme for Mobile Ad Hoc Networks , 2007, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.
[3] Chin-Ling Chen,et al. A Location-Dependent Data Encryption Approach for Enhancing Mobile Information System Security , 2007, The 9th International Conference on Advanced Communication Technology.
[4] David A. Maltz,et al. A performance comparison of multi-hop wireless ad hoc network routing protocols , 1998, MobiCom '98.
[5] Gene Tsudik,et al. Key Agreement in Dynamic Peer Groups , 2000, IEEE Trans. Parallel Distributed Syst..
[6] Joonsang Baek,et al. Self-organised group key management for ad hoc networks , 2006, ASIACCS '06.
[7] Riccardo Sisto,et al. A configurable mobile agent data protection protocol , 2003, AAMAS '03.
[8] S. Furuya,et al. A Lightweight Encryption Method Suitable For Copyright Protection , 1998, International 1998 Conference on Consumer Electronics.
[9] Ludwig Seitz,et al. Secure communication for ad-hoc, federated groups , 2008, IDtrust '08.
[10] Gene Tsudik,et al. Tree-based group key agreement , 2004, TSEC.
[11] Azzedine Boukerche,et al. Algorithms and Protocols for Wireless, Mobile Ad Hoc Networks , 2008 .
[12] Yuh-Min Tseng. A heterogeneous-network aided public-key management scheme for mobile ad hoc networks , 2007, Int. J. Netw. Manag..
[13] T. Jamil. The Rijndael algorithm , 2004, IEEE Potentials.
[14] Azzedine Boukerche,et al. Modeling and Managing the Trust for Wireless and Mobile Ad Hoc Networks , 2008, 2008 IEEE International Conference on Communications.
[15] Azzedine Boukerche,et al. Algorithms and Protocols for Wireless and Mobile Ad Hoc Networks: Boukerche/Mobile , 2008 .