A survey on threats in routing security in manet for trust management using SMC protocols
暂无分享,去创建一个
[1] Songwu Lu,et al. Self-organized network-layer security in mobile ad hoc networks , 2002, WiSE '02.
[2] Yih-Chun Hu. Efficient Security Mechanisms for Routing Protocols , 2003 .
[3] Elizabeth M. Belding-Royer,et al. A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..
[4] Veljko M. Milutinovic,et al. Routing and security in mobile ad hoc networks , 2004, Computer.
[5] R. Stephenson. A and V , 1962, The British journal of ophthalmology.
[6] Helmut Kurth,et al. Certifying open source - the Linux experience , 2004, IEEE Security & Privacy Magazine.
[7] Charles E. Perkins,et al. Performance comparison of two on-demand routing protocols for ad hoc networks , 2001, IEEE Wirel. Commun..
[8] Yih-Chun Hu,et al. Efficient Security Mechanisms for Routing Protocolsa , 2003, NDSS.
[9] Yih-Chun Hu,et al. A survey of secure wireless ad hoc routing , 2004, IEEE Security & Privacy Magazine.
[10] Shubham Joshi,et al. Schematize Trust Overlays and Management for Privacy Preservation in MANET , 2010, 2010 Second International Conference on Computational Intelligence, Modelling and Simulation.
[11] Durgesh Kumar Mishra,et al. Secure Multiparty Computation: From Millionaires Problem to Anonymizer , 2011, Inf. Secur. J. A Glob. Perspect..
[12] Wenke Lee,et al. A cooperative intrusion detection system for ad hoc networks , 2003, SASN '03.
[13] Yih-Chun Hu,et al. Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[14] Charles E. Perkins,et al. Ad Hoc Networking , 2001 .