Ad hoc networks security
暂无分享,去创建一个
[1] Adi Shamir,et al. How to share a secret , 1979, CACM.
[2] M. F.,et al. Bibliography , 1985, Experimental Gerontology.
[3] Lloyd S. Shapley,et al. Utility comparisons and the theory of games , 1988 .
[4] Charles E. Perkins,et al. Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers , 1994, SIGCOMM.
[5] Ariel Rubinstein,et al. A Course in Game Theory , 1995 .
[6] Philip R. Zimmermann,et al. The official PGP user's guide , 1996 .
[7] 염흥렬,et al. [서평]「Applied Cryptography」 , 1997 .
[8] J. Broch,et al. Dynamic source routing in ad hoc wireless networks , 1998 .
[9] Tony Larsson,et al. Routing protocols in wireless ad-hoc networks : a simulation study , 1998 .
[10] David A. Maltz,et al. A performance comparison of multi-hop wireless ad hoc network routing protocols , 1998, MobiCom '98.
[11] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[12] Michael K. Reiter,et al. Authentication metric analysis and design , 1999, TSEC.
[13] G. Zacharia. Collaborative reputation mechanisms for online communities , 1999 .
[14] Bartosz Mielczarek,et al. Scenario-based performance analysis of routing protocols for mobile ad-hoc networks , 1999, MobiCom.
[15] Gary E. Bolton,et al. ERC: A Theory of Equity, Reciprocity, and Competition , 2000 .
[16] Haiyun Luo,et al. Ubiquitous and Robust Authentication Services for Ad Hoc Wireless Networks , 2000 .
[17] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[18] Ran Canetti,et al. Efficient authentication and signing of multicast streams over lossy channels , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[19] Jean-Pierre Hubaux,et al. Nuglets: a Virtual Currency to Stimulate Cooperation in Self-Organized Mobile Ad Hoc Networks , 2001 .
[20] J.-Y. Le Boudec,et al. Toward self-organized mobile ad hoc networks: the terminodes project , 2001, IEEE Commun. Mag..
[21] Srdjan Capkun,et al. Self-organization in mobile ad hoc networks: the approach of Terminodes , 2001, IEEE Commun. Mag..
[22] Pietro Michiardi,et al. Game theoretic analysis of security in mobile ad hoc networks , 2002 .
[23] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.
[24] Pietro Michiardi,et al. Simulation-based analysis of security exposures in mobile ad hoc networks , 2002 .
[25] Yih-Chun Hu,et al. SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2002, Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications.
[26] Jean-Yves Le Boudec,et al. Nodes bearing grudges: towards routing security, fairness, and robustness in mobile ad hoc networks , 2002, Proceedings 10th Euromicro Workshop on Parallel, Distributed and Network-based Processing.
[27] Elizabeth M. Belding-Royer,et al. A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..
[28] Pietro Michiardi,et al. Prevention of denial of service attacks and selfishness in mobile ad hoc networks , 2002 .
[29] Songwu Lu,et al. Self-organized network-layer security in mobile ad hoc networks , 2002, WiSE '02.
[30] John Ioannidis,et al. Using the Fluhrer, Mantin, and Shamir Attack to Break WEP , 2002, NDSS.
[31] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[32] Rahul Garg,et al. A game-theoretic approach towards congestion control in communication networks , 2002, CCRV.
[33] Refik Molva,et al. Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.
[34] Srdjan Capkun,et al. Self-Organized Public-Key Management for Mobile Ad Hoc Networks , 2003, IEEE Trans. Mob. Comput..
[35] Charles E. Perkins,et al. Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.
[36] Gerard van der Laan,et al. A class of consistent share functions for games in coalition structure , 2005, Games Econ. Behav..