Efficient Trust Authority Distribution in Tactical MANET Environments
暂无分享,去创建一个
[1] Siu-Ming Yiu,et al. Performance evaluation on CRL distribution using flooding in mobile ad hoc networks (MANETs) , 2005, ACM-SE 43.
[2] Jiejun Kong,et al. Providing robust and ubiquitous security support for mobile ad-hoc networks , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.
[3] Christian Bettstetter,et al. Smooth is better than sharp: a random mobility model for simulation of wireless networks , 2001, MSWIM '01.
[4] Adrian Perrig,et al. On the distribution and revocation of cryptographic keys in sensor networks , 2005, IEEE Transactions on Dependable and Secure Computing.
[5] Dan Boneh,et al. Identity-Based En ryption from the Weil Pairing , 2001 .
[6] Louise E. Moser,et al. An analysis of the optimum node density for ad hoc mobile networks , 2001, ICC 2001. IEEE International Conference on Communications. Conference Record (Cat. No.01CH37240).
[7] Tracy Camp,et al. Stationary distributions for the random waypoint mobility model , 2004, IEEE Transactions on Mobile Computing.
[8] Hans-Joachim Hof,et al. A cluster-based security architecture for ad hoc networks , 2004, IEEE INFOCOM 2004.
[9] 박성현,et al. NS-2를 이용한 네트워크 시뮬레이션 방법론 , 2007 .
[10] Tracy Camp,et al. A survey of mobility models for ad hoc network research , 2002, Wirel. Commun. Mob. Comput..
[11] Jörg Hähner,et al. Graph-based mobility model for mobile ad hoc network simulation , 2002, Proceedings 35th Annual Simulation Symposium. SS 2002.
[12] Robin Kravets,et al. MOCA : MObile Certificate Authority for Wireless Ad Hoc Networks , 2004 .
[13] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[14] Bruce Lowekamp,et al. A structured group mobility model for the simulation of mobile ad hoc networks , 2004, MobiWac '04.
[15] S. Reidt,et al. Efficient Distribution of Trust Authority Functions in Tactical Networks , 2007, 2007 IEEE SMC Information Assurance and Security Workshop.
[16] Kevin C. Almeroth,et al. Real-world environment models for mobile network evaluation , 2005, IEEE Journal on Selected Areas in Communications.
[17] Atulya Mahajan,et al. Mobility models for vehicular ad hoc network simulations , 2006, ACM-SE 44.
[18] Guang Gong,et al. Key Revocation for Identity-Based Schemes in Mobile Ad Hoc Networks , 2006, ADHOC-NOW.
[19] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[20] Feipei Lai,et al. SWARM: Secure Wireless Ad-hoc network Reliance Management , 2006, 2006 1st International Symposium on Wireless Pervasive Computing.
[21] Stephen D. Wolthusen,et al. An Evaluation of Cluster Head TA Distribution Mechanisms in Tactical MANET Environments , 2007 .
[22] Paolo Santi,et al. The Node Distribution of the Random Waypoint Mobility Model for Wireless Ad Hoc Networks , 2003, IEEE Trans. Mob. Comput..
[23] Pedro José Marrón,et al. Mobility modeling of outdoor scenarios for MANETs , 2005, 38th Annual Simulation Symposium.