Self-organizing security scheme for multi-hop wireless access networks
暂无分享,去创建一个
[1] Iwao Tadashige,et al. On Providing Secure and Portable Wireless Data Networking Services : Architecture and Data Forwarding Mechanisms , 2004 .
[2] Larry J. Blunk,et al. PPP Extensible Authentication Protocol (EAP) , 1998, RFC.
[3] Pat R. Calhoun,et al. RADIUS Extensions , 2000, RFC.
[4] William A. Arbaugh,et al. YOUR 802.11 WIRELESS NETWORK HAS NO CLOTHES , 2001 .
[5] David A. Wagner,et al. Intercepting mobile communications: the insecurity of 802.11 , 2001, MobiCom '01.
[6] Allan C. Rubens,et al. Remote Authentication Dial In User Service (RADIUS) , 2000, RFC.
[7] Jiejun Kong,et al. Providing robust and ubiquitous security support for mobile ad-hoc networks , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.
[8] Glen Zorn,et al. Microsoft Vendor-specific RADIUS Attributes , 1999, RFC.
[9] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[10] Adi Shamir,et al. Weaknesses in the Key Scheduling Algorithm of RC4 , 2001, Selected Areas in Cryptography.
[11] Christopher Allen,et al. The TLS Protocol Version 1.0 , 1999, RFC.
[12] John T. Kohl,et al. The Kerberos Network Authentication Service (V5 , 2004 .