Link layer security for SAHN protocols
暂无分享,去创建一个
[1] Elizabeth M. Belding-Royer,et al. A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..
[2] Panagiotis Papadimitratos,et al. Secure link state routing for mobile ad hoc networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..
[3] Sunggu Lee,et al. Design and implementation of a private and public key crypto processor and its application to a security system , 2004, IEEE Trans. Consumer Electron..
[4] Carlo Kopp,et al. A Router Architecture to Achieve Link Rate Throughput in Suburban Ad-hoc Networks , 2003, Asia-Pacific Computer Systems Architecture Conference.
[5] Akashi Satoh,et al. A 10 Gbps full-AES crypto design with a twisted-BDD S-Box architecture , 2002, Proceedings. IEEE International Conference on Computer Design: VLSI in Computers and Processors.
[6] Hung-Yun Hsieh,et al. IEEE 802.11 over multi-hop wireless networks: problems and new perspectives , 2002, Proceedings IEEE 56th Vehicular Technology Conference.
[7] Dharma P. Agrawal,et al. A novel authentication scheme for ad hoc networks , 2000, 2000 IEEE Wireless Communications and Networking Conference. Conference Record (Cat. No.00TH8540).
[8] Carlo Kopp,et al. Multiple directional antennas in suburban ad-hoc networks , 2004, International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004..
[9] Yvo Desmedt,et al. Shared Generation of Authenticators and Signatures (Extended Abstract) , 1991, CRYPTO.
[10] Jangeun Jun,et al. Theoretical maximum throughput of IEEE 802.11 and its applications , 2003, Second IEEE International Symposium on Network Computing and Applications, 2003. NCA 2003..
[11] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[12] Robin Kravets,et al. Security-aware ad hoc routing for wireless networks , 2001, MobiHoc '01.
[13] Jiejun Kong,et al. Providing robust and ubiquitous security support for mobile ad-hoc networks , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.
[14] Ronald Pose. Password-capabilities: their evolution from the password-capability system into Walnut and beyond , 2001, Proceedings 6th Australasian Computer Systems Architecture Conference. ACSAC 2001.
[15] Carlo Kopp,et al. Bypassing the Home Computing Bottleneck: The Suburban Area Network , 1998 .
[16] Robert S. Fabry,et al. Capability-based addressing , 1974, CACM.
[17] Arjen K. Lenstra,et al. Selecting Cryptographic Key Sizes , 2000, Public Key Cryptography.
[18] Jim Binkley,et al. Authenticated Ad Hoc Routing at the Link Layer for Mobile Systems , 2001, Wirel. Networks.
[19] Soner Yesil,et al. Two fast RSA implementations using high-radix montgomery algorithm , 2004, 2004 IEEE International Symposium on Circuits and Systems (IEEE Cat. No.04CH37512).
[20] B. Brown. 802.11: the security differences between b and i , 2003 .