SDRP: Secure and dynamic routing protocol for mobile ad-hoc networks
暂无分享,去创建一个
[1] Jean-Marie Bonnin,et al. HOTA: Handover optimized ticket-based authentication in network-based mobility management , 2013, Inf. Sci..
[2] Paul F. Syverson. The use of logic in the analysis of cryptographic protocols , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.
[3] Mohsen Guizani,et al. A survey of secure mobile Ad Hoc routing protocols , 2008, IEEE Communications Surveys & Tutorials.
[4] Raja Datta,et al. Identity based secure AODV and TCP for mobile ad hoc networks , 2011, ACWR '11.
[5] Gene Tsudik,et al. SRDP: securing route discovery in DSR , 2005, The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services.
[6] N. Asokan,et al. Securing ad hoc routing protocols , 2002, WiSE '02.
[7] Yih-Chun Hu,et al. SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2003, Ad Hoc Networks.
[8] Raja Datta,et al. A secure dynamic IP configuration scheme for mobile ad hoc networks , 2011, Ad Hoc Networks.
[9] Donal O'Mahony,et al. Secure routing for mobile ad hoc networks , 2005, IEEE Communications Surveys & Tutorials.
[10] Yih-Chun Hu,et al. SEAR: a secure efficient ad hoc on demand routing protocol for wireless networks , 2009, Secur. Commun. Networks.
[11] Martín Abadi,et al. A logic of authentication , 1990, TOCS.
[12] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.
[13] A. Yasinsac,et al. Identifying flaws in the secure routing protocol , 2003, Conference Proceedings of the 2003 IEEE International Performance, Computing, and Communications Conference, 2003..
[14] Raja Datta,et al. A novel signature scheme to secure distributed dynamic address configuration protocol in mobile ad hoc networks , 2012, 2012 IEEE Wireless Communications and Networking Conference (WCNC).
[15] Elizabeth M. Belding-Royer,et al. Authenticated routing for ad hoc networks , 2005, IEEE Journal on Selected Areas in Communications.
[16] Jonathan Katz,et al. Aggregate Message Authentication Codes , 1995 .
[17] Elizabeth M. Belding-Royer,et al. A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..