Modeling Secure Connectivity of Self-Organized Wireless Ad Hoc Networks
暂无分享,去创建一个
[1] E. N. Gilbert,et al. Random Plane Networks , 1961 .
[2] J. V. D. Merwe,et al. Self-Organized Public Key Management for Mobile Ad Hoc Networks , 2002 .
[3] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2005, Wirel. Networks.
[4] Robin Kravets,et al. MOCA : MObile Certificate Authority for Wireless Ad Hoc Networks , 2004 .
[5] Bengt Ahlgren,et al. Spontaneous networking: an application-oriented approach to ad hoc networking , 2001, IEEE Commun. Mag..
[6] Mathew D. Penrose,et al. Random Geometric Graphs , 2003 .
[7] Béla Bollobás,et al. Continuum percolation with steps in the square or the disc , 2005, Random Struct. Algorithms.
[8] R. Meester,et al. Continuum percolation: References , 1996 .
[9] Svante Janson,et al. Random graphs , 2000, ZOR Methods Model. Oper. Res..
[10] Jiejun Kong,et al. Providing robust and ubiquitous security support for mobile ad-hoc networks , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.
[11] William A. Arbaugh,et al. Bootstrapping security associations for routing in mobile ad-hoc networks , 2003, GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489).
[12] Deep Medhi,et al. Modeling pairwise key establishment for random key predistribution in large-scale sensor networks , 2007, TNET.
[13] Svante Janson,et al. Random graphs , 2000, Wiley-Interscience series in discrete mathematics and optimization.
[14] Wenjing Lou,et al. LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[15] Ness B. Shroff,et al. Degenerate delay-capacity tradeoffs in ad-hoc networks with Brownian mobility , 2006, IEEE Transactions on Information Theory.
[16] Haiyun Luo,et al. Self-securing ad hoc wireless networks , 2002, Proceedings ISCC 2002 Seventh International Symposium on Computers and Communications.
[17] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[18] Béla Bollobás,et al. Random Graphs , 1985 .
[19] Eytan Modiano,et al. Capacity and delay tradeoffs for ad hoc mobile networks , 2005, IEEE Trans. Inf. Theory.
[20] Simson L. Garfinkel,et al. PGP: Pretty Good Privacy , 1994 .
[21] Johann van der Merwe,et al. Fully self-organized peer-to-peer key management for mobile ad hoc networks , 2005, WiSe '05.
[22] Jean-Pierre Hubaux,et al. The quest for security in mobile ad hoc networks , 2001, MobiHoc '01.
[23] Paul Malliavin,et al. Stochastic Analysis , 1997, Nature.
[24] Yunghsiang Sam Han,et al. A pairwise key predistribution scheme for wireless sensor networks , 2005, TSEC.
[25] Yuguang Fang,et al. Securing Mobile Ad Hoc Networks with Certificateless Public Keys , 2006, IEEE Transactions on Dependable and Secure Computing.
[26] Srdjan Capkun,et al. Small worlds in security systems: an analysis of the PGP certificate graph , 2002, NSPW '02.
[27] Jehoshua Bruck,et al. Continuum Percolation with Unreliable and Spread-Out Connections , 2005 .
[28] M. Penrose. On a continuum percolation model , 1991, Advances in Applied Probability.
[29] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..