Wireless Network Security Issues
暂无分享,去创建一个
[1] Moti Yung,et al. Proactive RSA , 1997, CRYPTO.
[2] John T. Kohl,et al. The Kerberos Network Authentication Service (V5 , 2004 .
[3] Stephen T. Kent,et al. Securing the Nimrod routing architecture , 1997, Proceedings of SNDSS '97: Internet Society 1997 Symposium on Network and Distributed System Security.
[4] Gene Tsudik,et al. Lowering security overhead in link state routing , 1999, Comput. Networks.
[5] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[6] Sheila Frankel. Demystifying The Ipsec Puzzle , 2001 .
[7] William Stallings,et al. Data and Computer Communications , 1985 .
[8] Hugo Krawczyk,et al. Robust and Efficient Sharing of RSA Functions , 1996, CRYPTO.
[9] J.J. Garcia-Luna-Aceves,et al. Securing the border gateway routing protocol , 1996, Proceedings of GLOBECOM'96. 1996 IEEE Global Telecommunications Conference.
[10] Radia J. Perlman,et al. Network layer protocols with Byzantine robustness , 1988 .
[11] R. Perlman,et al. An overview of PKI trust models , 1999, IEEE Netw..
[12] J. J. Garcia-Luna-Aceves,et al. Securing distance-vector routing protocols , 1997, Proceedings of SNDSS '97: Internet Society 1997 Symposium on Network and Distributed System Security.
[13] Armando Fox,et al. Security on the move: indirect authentication using Kerberos , 1996, MobiCom '96.
[14] Brijesh Kumar,et al. Integration of security in network routing protocols , 1993, SGSC.
[15] Moti Yung,et al. Optimal-resilience proactive public-key cryptosystems , 1997, Proceedings 38th Annual Symposium on Foundations of Computer Science.
[16] Hugo Krawczyk,et al. Robust and Efficient Sharing of RSA Functions , 1996, Journal of Cryptology.
[17] Li Gong,et al. Increasing Availability and Security of an Authentication Service , 1993, IEEE J. Sel. Areas Commun..