A New Method for Sharing the Public Keys in Opportunistic Networks
暂无分享,去创建一个
[1] Athanasios V. Vasilakos,et al. A Survey of Security Challenges in Cognitive Radio Networks: Solutions and Future Research Directions , 2012, Proceedings of the IEEE.
[2] Jie Wu,et al. Performance and Security Analyses of Onion-Based Anonymous Routing for Delay Tolerant Networks , 2017, IEEE Transactions on Mobile Computing.
[3] D. Rus,et al. An Underwater Sensor Network with Dual Communications, Sensing, and Mobility , 2007, OCEANS 2007 - Europe.
[4] Shivakant Mishra,et al. CenWits: a sensor-based loosely coupled search and rescue system using witnesses , 2005, SenSys '05.
[5] Pål Spilling,et al. A survey of key management in ad hoc networks , 2006, IEEE Communications Surveys & Tutorials.
[6] Matthew K. Wright,et al. PEON: privacy-enhanced opportunistic networks with applications in assistive environments , 2009, PETRA '09.
[7] Yong Wang,et al. Energy-efficient computing for wildlife tracking: design tradeoffs and early experiences with ZebraNet , 2002, ASPLOS X.
[8] Dieter Hogrefe,et al. Autonomous Ant-based Public Key Authentication Mechanism for Mobile Ad-hoc Networks , 2016, Mob. Networks Appl..
[9] Vinny Cahill,et al. When TCP Breaks: Delay- and Disruption- Tolerant Networking , 2006, IEEE Internet Computing.
[10] Sanjay Kumar Madria,et al. Multi-party encryption (MPE): secure communications in delay tolerant networks , 2015, Wirel. Networks.
[11] Luiz Carlos Pessoa Albini,et al. Fully Distributed Public Key Management through Digital Signature Chains for Delay and Disrupt Tolerant Networks , 2016, 2016 IEEE 13th International Conference on Mobile Ad Hoc and Sensor Systems (MASS).
[12] Samaneh Rashidibajgan. A trust structure for detection of sybil attacks in opportunistic networks , 2016, 2016 11th International Conference for Internet Technology and Secured Transactions (ICITST).
[13] Johan A. Pouwelse,et al. Key Management for Onion Routing in a True Peer to Peer Setting , 2014, IWSEC.
[14] Refik Molva,et al. Privacy in context-based and epidemic forwarding , 2009, 2009 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks & Workshops.
[15] Refik Molva,et al. Privacy in Content-Based Opportunistic Networks , 2009, 2009 International Conference on Advanced Information Networking and Applications Workshops.