Secure message transmission in mobile ad hoc networks
暂无分享,去创建一个
[1] M. Bellare,et al. HMAC: Keyed-Hashing for Message Authentication, RFC 2104 , 2000 .
[2] Randall J. Atkinson,et al. IP Encapsulating Security Payload (ESP) , 1995, RFC.
[3] Levente Buttyán,et al. Enforcing service availability in mobile ad-hoc WANs , 2000, MobiHoc.
[4] Panagiotis Papadimitratos,et al. Path set selection in mobile ad hoc networks , 2002, MobiHoc '02.
[5] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.
[6] Stefan Schlott,et al. Securing ad hoc routing protocols , 2004, Proceedings. 30th Euromicro Conference, 2004..
[7] Carlisle Adams,et al. Using Elliptic Curve Diffie-Hellman in the SPKM GSS-API , 1999 .
[8] Elizabeth M. Belding-Royer,et al. A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..
[9] Panagiotis Papadimitratos,et al. Secure link state routing for mobile ad hoc networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..
[10] Randall J. Atkinson,et al. Security Architecture for the Internet Protocol , 1995, RFC.
[11] Panagiotis Papadimitratos,et al. The secure routing protocol (SRP) for ad hoc networks, IETF Internet Draft , 2002 .
[12] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[13] Azer Bestavros,et al. TCP Boston: a fragmentation-tolerant TCP protocol for ATM networks , 1997, Proceedings of INFOCOM '97.
[14] Michael O. Rabin,et al. Efficient dispersal of information for security, load balancing, and fault tolerance , 1989, JACM.
[15] Zygmunt J. Haas,et al. Multipath routing in the presence of frequent topological changes , 2001, IEEE Commun. Mag..
[16] David A. Maltz,et al. A performance comparison of multi-hop wireless ad hoc network routing protocols , 1998, MobiCom '98.
[17] Baruch Awerbuch,et al. An on-demand secure routing protocol resilient to byzantine failures , 2002, WiSE '02.
[18] Michael O. Rabin,et al. Probabilistic Algorithms in Finite Fields , 1980, SIAM J. Comput..
[19] Hugo Krawczyk,et al. A Security Architecture for the Internet Protocol , 1999, IBM Syst. J..
[20] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[21] Donal O'Mahony,et al. Secure routing for mobile ad hoc networks , 2005, IEEE Communications Surveys & Tutorials.
[22] Hugo Krawczyk,et al. HMAC: Keyed-Hashing for Message Authentication , 1997, RFC.
[23] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[24] Stephen T. Kent,et al. IP Authentication Header , 1995, RFC.
[25] Christian Bettstetter,et al. On the minimum node degree and connectivity of a wireless multihop network , 2002, MobiHoc '02.