Analysis of a hybrid key management solution for ad hoc networks
暂无分享,去创建一个
[1] Adi Shamir,et al. How to share a secret , 1979, CACM.
[2] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[3] William A. Arbaugh,et al. Toward secure key distribution in truly ad-hoc networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..
[4] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[5] Gene Tsudik,et al. Diffie-Hellman key distribution extended to group communication , 1996, CCS '96.
[6] Hans-Joachim Hof,et al. A cluster-based security architecture for ad hoc networks , 2004, IEEE INFOCOM 2004.
[7] N. Asokan,et al. Key agreement in ad hoc networks , 2000, Comput. Commun..
[8] Stefano Basagni,et al. Distributed clustering for ad hoc networks , 1999, Proceedings Fourth International Symposium on Parallel Architectures, Algorithms, and Networks (I-SPAN'99).
[9] Jean-Pierre Hubaux,et al. The quest for security in mobile ad hoc networks , 2001, MobiHoc '01.
[10] Gene Tsudik,et al. Authenticated group key agreement and friends , 1998, CCS '98.
[11] Jiejun Kong,et al. Providing robust and ubiquitous security support for mobile ad-hoc networks , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.
[12] M. Gerla,et al. GloMoSim: a library for parallel simulation of large-scale wireless networks , 1998, Proceedings. Twelfth Workshop on Parallel and Distributed Simulation PADS '98 (Cat. No.98TB100233).
[13] Robin Kravets,et al. MOCA : MObile Certificate Authority for Wireless Ad Hoc Networks , 2004 .