Secure Wireless Network with Movable Base Stations
暂无分享,去创建一个
[1] Michael D. Zoltowski,et al. Low complexity anti-jam space-time processing for GPS , 2001, 2001 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.01CH37221).
[2] Sanjay Kumar Madria,et al. Tech Report 2000-07 Fault-tolerant Authentication and Group Key Management in Mobile Computing , 2000 .
[3] Stefan Schlott,et al. Securing ad hoc routing protocols , 2004, Proceedings. 30th Euromicro Conference, 2004..
[4] Baruch Awerbuch,et al. An on-demand secure routing protocol resilient to byzantine failures , 2002, WiSE '02.
[5] Aura Ganz,et al. Security protocol for IEEE 802.11 wireless local area network , 1998, Mob. Networks Appl..
[6] Martín Abadi,et al. A logic of authentication , 1989, Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences.
[7] Chad Scott Bergstrom,et al. Advanced interference rejection and anti-jam methods for low power mobile battlefield communications , 1997, MILCOM 97 MILCOM 97 Proceedings.
[8] Thomas E. Daniels,et al. Packet Tracker Final Report , 2001 .
[9] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[10] Bharat K. Bhargava,et al. Study of distance vector routing protocols for mobile ad hoc networks , 2003, Proceedings of the First IEEE International Conference on Pervasive Computing and Communications, 2003. (PerCom 2003)..
[11] Bharat Bhargava,et al. Hierarchical structure for supporting movable base stations in wireless networks , 2003, 10th International Conference on Telecommunications, 2003. ICT 2003..
[12] Ram Ramanathan,et al. On the scalability of ad hoc routing protocols , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.