Self-organized authentication in mobile ad-hoc networks
暂无分享,去创建一个
[1] Haiyun Luo,et al. Security in mobile ad hoc networks: challenges and solutions , 2004, IEEE Wireless Communications.
[2] T. Aura,et al. Robust Membership Management for Ad-hoc Groups , 2000 .
[3] Paul C. van Oorschot,et al. Authentication and authenticated key exchanges , 1992, Des. Codes Cryptogr..
[4] Luiz A. DaSilva,et al. Authentication protocols for ad hoc networks: taxonomy and research issues , 2005, Q2SWinet '05.
[5] Niki Pissinou,et al. Revisiting Global Time Synchronization , 2007, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.
[6] Gene Tsudik. Some Issues in WSN, MANET and Cellular Security , 2007 .
[7] Pino Caballero-Gil,et al. A Simulation Study of New Security Schemes in Mobile Ad-Hoc NETworks , 2007, EUROCAST.
[8] Candelaria Hernández-Goya,et al. Zero-Knowledge Hierarchical Authentication in MANETs , 2006, IEICE Trans. Inf. Syst..
[9] Panayiotis Kotzanikolaou,et al. Preventing impersonation attacks in MANET with multi-factor authentication , 2005, Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt'05).
[10] Benny Sudakov,et al. Sparse pseudo-random graphs are Hamiltonian , 2003, J. Graph Theory.
[11] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[12] Ilyoung Chong,et al. A Self-organized Authentication Architecture in Mobile Ad-Hoc Networks , 2005, ICOIN.
[13] Haiyun Luo,et al. Ubiquitous and Robust Authentication Services for Ad Hoc Wireless Networks , 2000 .
[14] Candelaria Hernández-Goya,et al. Strong Solutions to the Identification Problem , 2001, COCOON.
[15] Hitoshi Asaeda,et al. Implementation of group member authentication protocol in mobile ad-hoc networks , 2006, IEEE Wireless Communications and Networking Conference, 2006. WCNC 2006..
[16] Silvio Micali,et al. How to Prove all NP-Statements in Zero-Knowledge, and a Methodology of Cryptographic Protocol Design , 1986, CRYPTO.
[17] Pino Caballero-Gil,et al. A Global Authentication Scheme for Mobile Ad-Hoc Networks , 2007, IWSEC.
[18] Jeong Hyun Yi,et al. An attack on the proactive RSA signature scheme in the URSA ad hoc network access control protocol , 2004, SASN '04.
[19] Gene Tsudik,et al. Admission control in peer groups , 2003, Second IEEE International Symposium on Network Computing and Applications, 2003. NCA 2003..
[20] Haiyun Luo,et al. Adaptive security for multilevel ad hoc networks , 2002, Wirel. Commun. Mob. Comput..
[21] Basil. Vandegriend,et al. Finding Hamiltonian cycles: algorithms, graphs and performance , 1998 .
[22] Adam Wierzbicki,et al. A new authentication protocol for revocable anonymity in ad-hoc networks , 2005, ArXiv.
[23] Jean-Pierre Hubaux,et al. The quest for security in mobile ad hoc networks , 2001, MobiHoc '01.
[24] Jeong Hyun Yi,et al. Efficient node admission for short-lived mobile ad hoc networks , 2005, 13TH IEEE International Conference on Network Protocols (ICNP'05).
[25] Stephen B. Wicker,et al. On the Complexity of Distributed Self-Configuration in Wireless Networks , 2003, Telecommun. Syst..
[26] André Weimerskirch,et al. Authentication in ad-hoc and sensor networks , 2004 .
[27] Haiyun Luo,et al. Adaptive Security for Multi-layer Ad-hoc Networks , 2002 .
[28] Carla D. Savage,et al. Hamilton cycle heuristics in hard graphs , 2004 .