Interaction between nodes in MANET
暂无分享,去创建一个
[1] Sheng Zhong,et al. Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[2] Gary Stoneburner,et al. SP 800-30. Risk Management Guide for Information Technology Systems , 2002 .
[3] Guang Gong,et al. Bootstrapping Security in Mobile Ad Hoc Networks Using Identity-Based Schemes with Key Revocation , 2006 .
[4] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[5] Levente Buttyán,et al. Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks , 2003, Mob. Networks Appl..
[6] Claude Crépeau,et al. A certificate revocation scheme for wireless ad hoc networks , 2003, SASN '03.
[7] S. Buchegger,et al. A Robust Reputation System for P2P and Mobile Ad-hoc Networks , 2004 .
[8] Adrian Perrig,et al. On the distribution and revocation of cryptographic keys in sensor networks , 2005, IEEE Transactions on Dependable and Secure Computing.
[9] D. Roberts,et al. Holistan: A Futuristic Scenario for International Coalition Operations , 2007, 2007 International Conference on Integration of Knowledge Intensive Multi-Agent Systems.
[10] Alex C. Snoeren,et al. Priority Forwarding in Ad Hoc Networks with Self-Interested Parties , 2003 .
[11] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[12] G. Stoneburner,et al. Risk Management Guide for Information Technology Systems: Recommendations of the National Institute of Standards and Technology , 2002 .