PERFORMANCE EVALUATION OF AOMDV AND IAOMDV UNDER PRETTY GOOD PRIVACY MODEL
暂无分享,去创建一个
[1] R. Perlman,et al. An overview of PKI trust models , 1999, IEEE Netw..
[2] Shi Lei,et al. Research on Trust Model of PKI , 2011, 2011 Fourth International Conference on Intelligent Computation Technology and Automation.
[3] Xing-hui Wu,et al. Research of the Database Encryption Technique Based on Hybrid Cryptography , 2010, 2010 International Symposium on Computational Intelligence and Design.
[4] Wai-Choong Wong,et al. A robust routing protocol for wireless mobile ad hoc networks , 2002, The 8th International Conference on Communication Systems, 2002. ICCS 2002..
[5] K. R. Anupama,et al. A multicast protocol for mobile adhoc networks , 2002, 2002 IEEE International Conference on Personal Wireless Communications.
[6] Azzedine Boukerche,et al. A simulation based study of on-demand routing protocols for ad hoc wireless networks , 2001, Proceedings. 34th Annual Simulation Symposium.
[7] S. Adibi,et al. Security Routing in MANETs - A Comparative Study , 2006, 2006 IEEE International Conference on Electro/Information Technology.
[8] Jiang Haowei,et al. Research in P2P-PKI trust model , 2010, 2010 3rd International Conference on Computer Science and Information Technology.
[9] Vijay Varadharajan,et al. Designing secure wireless mobile ad hoc networks , 2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).
[10] Gopinath Ganapathy,et al. Performance Comparison of Mobile Ad-hoc Network Routing Protocol , 2007 .
[11] Mahesh K. Marina,et al. On-demand multipath distance vector routing in ad hoc networks , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.
[12] Elizabeth M. Belding-Royer,et al. Authenticated routing for ad hoc networks , 2005, IEEE Journal on Selected Areas in Communications.
[13] Svein Johan Knapskog. New Cryptographic Primitives (Plenary Lecture) , 2008 .
[14] Byoungcheon Lee,et al. Unified Public Key Infrastructure Supporting Both Certificate-Based and ID-Based Cryptography , 2010, 2010 International Conference on Availability, Reliability and Security.
[15] Anuj K. Gupta,et al. Secure Routing Techniques for MANETs , 2009 .
[16] J. Quamar,et al. A hybrid cryptography model for managing security in dynamic topology of MANET , 2008, 2008 International Symposium on Biometrics and Security Technologies.
[17] A.A. Pirzada,et al. Trustworthy routing with the AODV protocol , 2004, 2004 International Networking and Communication Conference.
[18] T R Mahesh,et al. Design of new security algorithm: Using hybrid Cryptography architecture , 2011, 2011 3rd International Conference on Electronics Computer Technology.
[19] M. Markovic. Data Protection Techniques, Cryptographic Protocols and PKI Systems in Modern Computer Networks , 2007, 2007 14th International Workshop on Systems, Signals and Image Processing and 6th EURASIP Conference focused on Speech and Image Processing, Multimedia Communications and Services.
[20] Fuwen Pang,et al. Improved PKI Solution for Mobile Ad Hoc Networks , 2010, 2010 International Conference on Multimedia Technology.
[21] Hiroyuki Seki,et al. Certificate Chain Discovery in Web of Trust for Ad Hoc Networks , 2007, 21st International Conference on Advanced Information Networking and Applications Workshops (AINAW'07).