Authentication Protocol Using Threshold Certification in Hierarchical-cluser-based Ad Hoc Networks
暂无分享,去创建一个
[1] Vijay Varadharajan,et al. Security for cluster based ad hoc networks , 2004, Comput. Commun..
[2] Adi Shamir,et al. How to share a secret , 1979, CACM.
[3] Jinyang Li,et al. Cluster Based Routing Protocol(CBRP) Functional Specification , 1999 .
[4] Gene Tsudik,et al. A Group Key Management Architecture for Mobile Ad-hoc Wireless Networks , 2005, J. Inf. Sci. Eng..
[5] Elizabeth M. Belding-Royer,et al. Multi-Level Hierarchies for Scalable Ad hoc Routing , 2003, Wirel. Networks.
[6] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[7] H. S. Suh,et al. DSRR Organizing and Its Algorithm for Efficient Mobility Management in the SIP , 2004 .
[8] William A. Arbaugh,et al. Toward secure key distribution in truly ad-hoc networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..
[9] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[10] Stefano Basagni,et al. Distributed clustering for ad hoc networks , 1999, Proceedings Fourth International Symposium on Parallel Architectures, Algorithms, and Networks (I-SPAN'99).
[11] Gene Tsudik,et al. Diffie-Hellman key distribution extended to group communication , 1996, CCS '96.
[12] Aldar C.-F. Chan,et al. Distributed symmetric key management for mobile ad hoc networks , 2004, IEEE INFOCOM 2004.
[13] Hans-Joachim Hof,et al. A cluster-based security architecture for ad hoc networks , 2004, IEEE INFOCOM 2004.
[14] Elizabeth M. Belding-Royer,et al. A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..
[15] Edward J. Coyle,et al. Minimizing communication costs in hierarchically-clustered networks of wireless sensors , 2004, Comput. Networks.
[16] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[17] Elizabeth M. Belding-Royer,et al. Authenticated routing for ad hoc networks , 2005, IEEE Journal on Selected Areas in Communications.
[18] Dharma P. Agrawal,et al. TIDS: threshold and identity-based security scheme for wireless ad hoc networks , 2004, Ad Hoc Networks.