A Study on Certificate Revocation in Mobile Ad Hoc Networks
暂无分享,去创建一个
[1] Nirwan Ansari,et al. Security services in group communications over wireless infrastructure, mobile ad hoc, and wireless sensor networks , 2007, IEEE Wireless Communications.
[2] Jolyon Clulow,et al. Suicide for the common good: a new strategy for credential revocation in self-organizing systems , 2006, OPSR.
[3] Elaine Shi,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[4] Nei Kato,et al. Certificate Revocation to Cope with False Accusations in Mobile Ad Hoc Networks , 2010, 2010 IEEE 71st Vehicular Technology Conference.
[5] Muthucumaru Maheswaran,et al. A localized certificate revocation scheme for mobile ad hoc networks , 2008, Ad Hoc Networks.
[6] Haiyun Luo,et al. URSA: ubiquitous and robust access control for mobile ad hoc networks , 2004, IEEE/ACM Transactions on Networking.
[7] Fred B. Schneider,et al. COCA: a secure distributed online certification authority , 2002 .
[8] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[9] Shiyong Zhang,et al. Resisting flooding attacks in ad hoc networks , 2005, International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II.
[10] S. Micali. Eecient Certiicate Revocation , 1996 .
[11] Haiyun Luo,et al. Security in mobile ad hoc networks: challenges and solutions , 2004, IEEE Wireless Communications.
[12] Tarik Taleb,et al. Detecting and avoiding wormhole attacks in wireless ad hoc networks , 2008, IEEE Communications Magazine.
[13] Xiaoyan Hong,et al. A secure ad-hoc routing approach using localized self-healing communities , 2005, MobiHoc '05.
[14] Tracy Camp,et al. A survey of mobility models for ad hoc network research , 2002, Wirel. Commun. Mob. Comput..
[15] Pål Spilling,et al. A survey of key management in ad hoc networks , 2006, IEEE Communications Surveys & Tutorials.
[16] R.A. Raja Mahmood,et al. A survey on detecting black hole attack in AODV-based mobile ad hoc networks , 2007, 2007 International Symposium on High Capacity Optical Networks and Enabling Technologies.