Proposal for SZRP protocol with the establishment of the salted SHA-256 Bit HMAC PBKDF2 advance security system in a MANET
暂无分享,去创建一个
[1] Shoichi Hirose,et al. A Lightweight 256-Bit Hash Function for Hardware and Low-End Devices: Lesamnta-LW , 2010, ICISC.
[2] CONTENTS 2 Contents , 2002 .
[3] Helena Handschuh,et al. Security Analysis of SHA-256 and Sisters , 2003, Selected Areas in Cryptography.
[4] Azzedine Boukerche,et al. Algorithms and Protocols for Wireless, Mobile Ad Hoc Networks , 2008 .
[5] John Viega,et al. Secure programming cookbook for C and C , 2003 .
[6] Elizabeth M. Belding-Royer,et al. A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..
[7] Matthew D Falk. Cryptographic Cloud Storage Framework , 2013 .
[8] Elizabeth M. Belding-Royer,et al. A review of current routing protocols for ad hoc mobile wireless networks , 1999, IEEE Wirel. Commun..
[9] Behrouz A. Forouzan,et al. Cryptography and network security , 1998 .
[10] Simon Josefsson. PKCS #5: Password-Based Key Derivation Function 2 (PBKDF2) Test Vectors , 2011, RFC.
[11] William E. Burr,et al. Selecting the Advanced Encryption Standard , 2003, IEEE Secur. Priv..
[12] Kevin Curran,et al. A hash-based image encryption algorithm , 2010 .
[13] Al-Sakib Khan Pathan. Security of Self-Organizing Networks: MANET, WSN, WMN, VANET , 2010 .
[14] Ramin Hekmat,et al. Ad-hoc networks - fundamental properties and network topologies , 2006 .
[15] Michel Barbeau,et al. Principles of ad hoc networking , 2007 .
[16] N. Beijar. Zone Routing Protocol ( ZRP ) , 2002 .
[17] Silvio Micali,et al. A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks , 1988, SIAM J. Comput..
[18] Subir Kumar Sarkar,et al. Ad Hoc Mobile Wireless Networks: Principles, Protocols and Applications , 2007 .
[19] Radia J. Perlman,et al. Network security - private communication in a public world , 2002, Prentice Hall series in computer networking and distributed systems.
[20] Paul E. Hoffman,et al. Determining Strengths For Public Keys Used For Exchanging Symmetric Keys , 2004, RFC.
[21] J. V. R. Murthy,et al. Secure zone based routing protocol for mobile adhoc networks , 2013, 2013 International Mutli-Conference on Automation, Computing, Communication, Control and Compressed Sensing (iMac4s).