Secure Cooperative Cache Based Data Access in Ad Hoc Networks
暂无分享,去创建一个
[1] David A. Maltz,et al. Dynamic Source Routing in Ad Hoc Wireless Networks , 1994, Mobidata.
[2] Tomasz Imielinski,et al. Sleepers and workaholics: caching strategies in mobile environments , 1994, SIGMOD '94.
[3] Chengjie Liu,et al. Maintaining Strong Cache Consistency in the World Wide Web , 1998, IEEE Trans. Computers.
[4] Nitin H. Vaidya,et al. Location-aided routing (LAR) in mobile ad hoc networks , 1998, MobiCom '98.
[5] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[6] J. J. Garcia-Luna-Aceves,et al. A multicast routing protocol for ad-hoc networks , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).
[7] Guohong Cao,et al. A scalable low-latency cache invalidation strategy for mobile environments , 2000, MobiCom '00.
[8] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[9] Charles E. Perkins,et al. Performance comparison of two on-demand routing protocols for ad hoc networks , 2001, IEEE Wirel. Commun..
[10] Ran Canetti,et al. Efficient authentication and signing of multicast streams over lossy channels , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[11] Yih-Chun Hu. Packet Leashes : A Defense against Wormhole Attacks in Wireless Ad Hoc Networks , 2001 .
[12] Jean-Pierre Hubaux,et al. The quest for security in mobile ad hoc networks , 2001, MobiHoc '01.
[13] Jorjeta G. Jetcheva,et al. Adaptive demand-driven multicast routing in multi-hop wireless ad hoc networks , 2001, MobiHoc '01.
[14] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[15] Chang-Jin Suh,et al. On-Demand Multicast Routing Protocol in Multihop Wireless Mobile Networks , 2002, Mob. Networks Appl..
[16] Elizabeth M. Belding-Royer,et al. A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..
[17] Songwu Lu,et al. Self-organized network-layer security in mobile ad hoc networks , 2002, WiSE '02.
[18] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[19] Dawn Xiaodong Song,et al. Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..
[20] Levente Buttyán,et al. Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks , 2003, Mob. Networks Appl..
[21] Nitin H. Vaidya,et al. Detection and handling of MAC layer misbehavior in wireless networks , 2003, 2003 International Conference on Dependable Systems and Networks, 2003. Proceedings..
[22] Donggang Liu,et al. Establishing pairwise keys in distributed sensor networks , 2005, TSEC.
[23] Yunghsiang Sam Han,et al. A pairwise key pre-distribution scheme for wireless sensor networks , 2003, CCS '03.
[24] Chita R. Das,et al. Cooperative cache-based data access in ad hoc networks , 2004, Computer.
[25] Sushil Jajodia,et al. An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[26] Yunghsiang Sam Han,et al. A pairwise key predistribution scheme for wireless sensor networks , 2005, TSEC.
[27] Haiyun Luo,et al. Statistical en-route filtering of injected false data in sensor networks , 2005, IEEE J. Sel. Areas Commun..
[28] Guohong Cao,et al. Supporting Cooperative Caching in Ad Hoc Networks , 2006, IEEE Trans. Mob. Comput..