Optimal Key Generation Policies for MANET Security
暂无分享,去创建一个
[1] F. Richard Yu,et al. Distributed node selection for threshold key management with intrusion detection in mobile ad hoc networks , 2010, Wirel. Networks.
[2] Eytan Modiano,et al. Optimal Transmission Scheduling in Symmetric Communication Models With Intermittent Connectivity , 2007, IEEE Transactions on Information Theory.
[3] Haiyun Luo,et al. Security in mobile ad hoc networks: challenges and solutions , 2004, IEEE Wireless Communications.
[4] Adi Shamir,et al. How to share a secret , 1979, CACM.
[5] Yvo Desmedt,et al. Threshold Cryptosystems , 1989, CRYPTO.
[6] Dharma P. Agrawal,et al. Threshold and identity-based key management and authentication for wireless ad hoc networks , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..
[7] Ward Whitt,et al. Comparison methods for queues and other stochastic models , 1986 .
[8] T. Lindvall. Lectures on the Coupling Method , 1992 .
[9] Leandros Tassiulas,et al. Dynamic server allocation to parallel queues with randomly varying connectivity , 1993, IEEE Trans. Inf. Theory.
[10] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[11] Ioannis Lambadaris,et al. Optimal Resource Scheduling in Wireless Multiservice Systems with Random Channel Connectivity , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.
[12] Jean-Pierre Hubaux,et al. The quest for security in mobile ad hoc networks , 2001, MobiHoc '01.
[13] N. L. Lawrie,et al. Comparison Methods for Queues and Other Stochastic Models , 1984 .
[14] Marc Fischlin,et al. A Closer Look at PKI: Security and Efficiency , 2007, Public Key Cryptography.
[15] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.