A Simulation Study of New Security Schemes in Mobile Ad-Hoc NETworks
暂无分享,去创建一个
[1] André Weimerskirch,et al. Authentication in ad-hoc and sensor networks , 2004 .
[2] Jeong Hyun Yi,et al. Efficient node admission for short-lived mobile ad hoc networks , 2005, 13TH IEEE International Conference on Network Protocols (ICNP'05).
[3] Luiz A. DaSilva,et al. Authentication protocols for ad hoc networks: taxonomy and research issues , 2005, Q2SWinet '05.
[4] Robert Meersman,et al. On the Move to Meaningful Internet Systems 2004: CoopIS, DOA, and ODBASE , 2004, Lecture Notes in Computer Science.
[5] Adam Wierzbicki,et al. A new authentication protocol for revocable anonymity in ad-hoc networks , 2005, ArXiv.
[6] Candelaria Hernández-Goya,et al. Strong Solutions to the Identification Problem , 2001, COCOON.
[7] Hitoshi Asaeda,et al. Implementation of group member authentication protocol in mobile ad-hoc networks , 2006, IEEE Wireless Communications and Networking Conference, 2006. WCNC 2006..
[8] Ilyoung Chong,et al. A Self-organized Authentication Architecture in Mobile Ad-Hoc Networks , 2005, ICOIN.