Attacks Against OLSR : Distributed Key Management for Security
暂无分享,去创建一个
[1] Burton H. Bloom,et al. Space/time trade-offs in hash coding with allowable errors , 1970, CACM.
[2] Leslie Lamport,et al. The Byzantine Generals Problem , 1982, TOPL.
[3] Radia J. Perlman,et al. Network layer protocols with Byzantine robustness , 1988 .
[4] Yih-Chun Hu. Packet Leashes : A Defense against Wormhole Attacks in Wireless Ad Hoc Networks , 2001 .
[5] Steven D. Galbraith,et al. Implementing the Tate Pairing , 2002, ANTS.
[6] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.
[7] Elizabeth M. Belding-Royer,et al. A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..
[8] Paulo S. L. M. Barreto,et al. Efficient Algorithms for Pairing-Based Cryptosystems , 2002, CRYPTO.
[9] Jorji Nonaka,et al. An Evaluation of Low Cost Hardware-assisted Internal Clock Synchronization in PC Cluster Environment , 2002, PDPTA.
[10] Jung Hee Cheon,et al. An Identity-Based Signature from Gap Diffie-Hellman Groups , 2003, Public Key Cryptography.
[11] Securing the OLSR protocol , 2003 .
[12] Ratna Dutta,et al. Pairing-based cryptography : A survey , 2004 .
[13] Hovav Shacham,et al. Short Signatures from the Weil Pairing , 2001, J. Cryptol..
[14] Hisashi Kobayashi,et al. Amendment to: Highly Secure and Efficient Routing , 2004 .
[15] Philippe Jacquet,et al. OLSR performance measurement in a military mobile ad-hoc network , 2004, 24th International Conference on Distributed Computing Systems Workshops, 2004. Proceedings..
[16] Hisashi Kobayashi,et al. Highly secure and efficient routing , 2004, IEEE INFOCOM 2004.
[17] Paul Mühlethaler,et al. An advanced signature system for OLSR , 2004, SASN '04.
[18] Jung Hee Cheon,et al. A New ID-based Signature with Batch Verification , 2004, IACR Cryptol. ePrint Arch..
[19] Danny Dhillon,et al. Implementing a fully distributed certificate authority in an OLSR MANET , 2004, 2004 IEEE Wireless Communications and Networking Conference (IEEE Cat. No.04TH8733).
[20] Daniele Rao,et al. Security Schemes for the OLSR Protocol for Ad Hoc Networks , 2005 .
[21] Cédric Adjih,et al. Securing OLSR Using Node Locations , 2005 .
[22] Anis Laouiti,et al. Securing the OLSR routing protocol with or without compromised nodes in the network , 2005 .
[23] Alfred Menezes,et al. Pairing-Based Cryptography at High Security Levels , 2005, IMACC.
[24] Crypto , 2021, Journal AWWA.