暂无分享,去创建一个
[1] Joni da Silva Fraga,et al. Self-Adaptable and Intrusion Tolerant Certificate Authority for Mobile Ad Hoc Networks , 2008, 22nd International Conference on Advanced Information Networking and Applications (aina 2008).
[2] Usman Tariq,et al. Sinkhole Vulnerabilities in Wireless Sensor Networks , 2014 .
[3] John T. Michalski,et al. Enhancements for distributed certificate authority approaches for mobile wireless ad hoc networks. , 2003 .
[4] Dae-Young Lee,et al. An Efficient Certificate Management for Mobile Ad-Hoc Network , 2006, ADHOC-NOW.
[5] Wenbi Rao,et al. Merging clustering scheme in distributed certificate authority for ad hoc network , 2006 .
[6] Aziz Mohaisen,et al. Certificate Issuing Using Proxy and Threshold Signatures in Self-initialized Ad Hoc Network , 2007, ICCSA.
[7] Siu-Ming Yiu,et al. Providing Distributed Certificate Authority Service in Mobile Ad Hoc Networks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).
[8] Kwok-Yan Lam,et al. Self-initialized Distributed Certificate Authority for Mobile Ad Hoc Network , 2009, ISA.
[9] Kamesh Namuduri,et al. Secure, Redundant, and Fully Distributed Key Management Scheme for Mobile Ad Hoc Networks: An Analysis , 2005, EURASIP J. Wirel. Commun. Netw..
[10] Jie Wu,et al. Secure and efficient key management in mobile ad hoc networks , 2005, 19th IEEE International Parallel and Distributed Processing Symposium.
[11] M. Lee,et al. Vulnerabilities and verification of cryptographic protocols and their future in Wireless Body Area Networks , 2012, 2012 International Conference on Emerging Technologies.
[12] Lionel M. Ni,et al. Multiple-key cryptography-based distributed certificate authority in mobile ad-hoc networks , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..
[13] Mehmet A. Orgun,et al. Survey on cybersecurity issues in wireless mesh networks based eHealthcare , 2016, 2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom).
[14] Christoph Thuemmler,et al. U-prove based security framework for mobile device authentication in eHealth networks , 2016, 2016 IEEE 18th International Conference on e-Health Networking, Applications and Services (Healthcom).
[15] Jaydip Sen,et al. A Scheme of Certificate Authority for Ad Hoc Networks , 2007, 18th International Workshop on Database and Expert Systems Applications (DEXA 2007).
[16] Al-Sakib Khan Pathan. Security of Self-Organizing Networks: MANET, WSN, WMN, VANET , 2010 .
[17] John S. Baras,et al. Distributed Certification Authority Generation to Enhance Autonomous Key Management for Group Communications in Mobile Ad-Hoc Networks , 2004 .
[18] Danny Dhillon,et al. Implementing a fully distributed certificate authority in an OLSR MANET , 2004, 2004 IEEE Wireless Communications and Networking Conference (IEEE Cat. No.04TH8733).
[19] Rajaram Ayyasamy,et al. An enhanced distributed certificate authority scheme for authentication in mobile ad-hoc networks , 2012, Int. Arab J. Inf. Technol..
[20] Samir Elloumi,et al. Integrated Generic Association Rule Based Classifier , 2007 .
[21] Abdelouahid Derhab,et al. Human-oriented design of secure Machine-to-Machine communication system for e-Healthcare society , 2015, Comput. Hum. Behav..
[22] Ghassan Chaddoud,et al. Distributed Certificate Authority in Cluster-based Ad hoc networks , 2006 .
[23] Xi Chen,et al. Identity-Based Fully Distributed Certificate Authority in an OLSR MANET , 2008, 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing.
[24] Siu-Ming Yiu,et al. Providing distributed certificate authority service in cluster-based mobile ad hoc networks , 2007, Comput. Commun..