An Authentication Scheme for Ad-hoc Networks using Threshold Secret Sharing
暂无分享,去创建一个
[1] Jean-Pierre Hubaux,et al. The quest for security in mobile ad hoc networks , 2001, MobiHoc '01.
[2] Yvo Desmedt,et al. Some Recent Research Aspects of Threshold Cryptography , 1997, ISW.
[3] Haiyun Luo,et al. Adaptive security for multilevel ad hoc networks , 2002, Wirel. Commun. Mob. Comput..
[4] Srdjan Capkun,et al. Self-Organized Public-Key Management for Mobile Ad Hoc Networks , 2003, IEEE Trans. Mob. Comput..
[5] Susan Hansche,et al. Official (ISC)2 Guide to the CISSP Exam , 2003 .
[6] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[7] Xiaoyan Hong,et al. Hierarchical routing for multi-layer ad-hoc wireless networks with UAVs , 2000, MILCOM 2000 Proceedings. 21st Century Military Communications. Architectures and Technologies for Information Superiority (Cat. No.00CH37155).
[8] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[9] Haiyun Luo,et al. Security in mobile ad hoc networks: challenges and solutions , 2004, IEEE Wireless Communications.
[10] Jiejun Kong,et al. Providing robust and ubiquitous security support for mobile ad-hoc networks , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.
[11] Roberto Gómez Cárdenas,et al. Overview the Key Management in Ad Hoc Networks , 2005, ISSADS.
[12] Robin Kravets,et al. Key management for heterogeneous ad hoc wireless networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..
[13] Sajal K. Das,et al. A Weight Based Distributed Clustering Algorithm for Mobile ad hoc Networks , 2000, HiPC.
[14] Lars Klander,et al. Hacker Proof : The Ultimate Guide to Network Security , 1997 .
[15] Imrich Chlamtac,et al. Mobile ad hoc networking: imperatives and challenges , 2003, Ad Hoc Networks.