Predictive preemptive certificate transfer in Cluster-Based Certificate Chain
暂无分享,去创建一个
[1] Fred B. Schneider,et al. COCA: a secure distributed online certification authority , 2002 .
[2] Robin Kravets,et al. MOCA : MObile Certificate Authority for Wireless Ad Hoc Networks , 2004 .
[3] Wang Heng-jun. Routing in AD HOC Networks of Mobile Hosts , 2002 .
[4] Jean-Pierre Hubaux,et al. The quest for security in mobile ad hoc networks , 2001, MobiHoc '01.
[5] Rahmat Budiarto,et al. A Secure Mobile Ad hoc Network Based on Distributed Certificate Authority , 2011 .
[6] M. Jiang,et al. Cluster based routing protocol (CBRP) , 1999 .
[7] David B. Johnson,et al. Routing in Ad Hoc Networks of Mobile Hosts , 1994, 1994 First Workshop on Mobile Computing Systems and Applications.
[8] Charles E. Perkins,et al. Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.
[9] Charles E. Perkins,et al. Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.
[10] Bo Peng,et al. Surveying Position Based Routing Protocols for Wireless Sensor and Ad-hoc Networks , 2012, Int. J. Commun. Networks Inf. Secur..
[11] Haiyun Luo,et al. Self-securing ad hoc wireless networks , 2002, Proceedings ISCC 2002 Seventh International Symposium on Computers and Communications.
[12] Ahmed Meddahi,et al. Predictive Preemptive Ad Hoc On-Demand Distance Vector Routing , 2006 .
[13] Robert H. Deng,et al. Highly reliable trust establishment scheme in ad hoc networks , 2004, Comput. Networks.
[14] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[15] Christine Meierhöfer. Pretty good privacy , 1996, SIGGRAPH '96.
[16] Haiyun Luo,et al. Ubiquitous and Robust Authentication Services for Ad Hoc Wireless Networks , 2000 .
[17] Bernard P. Zajac,et al. Pretty good privacy , 1994 .
[18] Kamel Mohamed Faraoun,et al. Link Quality and MAC-Overhead Aware Predictive Preemptive Multipath Routing Protocol for Mobile Ad Hoc Networks , 2013, Int. J. Commun. Networks Inf. Secur..
[19] Srdjan Capkun,et al. Self-Organized Public-Key Management for Mobile Ad Hoc Networks , 2003, IEEE Trans. Mob. Comput..
[20] Philip R. Zimmermann,et al. The official PGP user's guide , 1996 .
[21] Mario Gerla,et al. Adaptive Clustering for Mobile Wireless Networks , 1997, IEEE J. Sel. Areas Commun..
[22] David A. Maltz,et al. Dynamic Source Routing in Ad Hoc Wireless Networks , 1994, Mobidata.
[23] Souheila Bouam,et al. Secure Routing Optimization in Hierarchical Cluster-Based Wireless Sensor Networks , 2013, Int. J. Commun. Networks Inf. Secur..
[24] Kamesh Namuduri,et al. Secure, Redundant, and Fully Distributed Key Management Scheme for Mobile Ad Hoc Networks: An Analysis , 2005, EURASIP J. Wirel. Commun. Netw..
[25] Charles E. Perkins,et al. Evolution and future directions of the ad hoc on-demand distance-vector routing protocol , 2003, Ad Hoc Networks.
[26] Dharma P. Agrawal,et al. Routing security in wireless ad hoc networks , 2002, IEEE Commun. Mag..
[27] Mario Gerla,et al. A distributed architecture for multimedia in dynamic wireless networks , 1995, Proceedings of GLOBECOM '95.
[28] Simson L. Garfinkel,et al. PGP: Pretty Good Privacy , 1994 .
[29] Sugata Sanyal,et al. Security Architecture for Cluster based Ad Hoc Networks , 2012, ArXiv.
[30] Robbert van Renesse,et al. COCA: a secure distributed online certification authority , 2002, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].
[31] Charles E. Perkins,et al. An implementation study of the AODV routing protocol , 2000, 2000 IEEE Wireless Communications and Networking Conference. Conference Record (Cat. No.00TH8540).
[32] Taekyoung Kwon,et al. Cluster-Based Certificate Chain for Mobile Ad Hoc Networks , 2006, ICCSA.