Key Distribution in Mobile Ad Hoc Networks Based on Message Relaying
暂无分享,去创建一个
[1] Mahadev Satyanarayanan,et al. IEEE Workshop on mobile computing systems and applications , 1995, IEEE Wirel. Commun..
[2] William A. Arbaugh,et al. Bootstrapping security associations for routing in mobile ad-hoc networks , 2003, GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489).
[3] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.
[4] Hugo Krawczyk,et al. A modular approach to the design and analysis of authentication and key exchange protocols (extended abstract) , 1998, STOC '98.
[5] Levente Buttyán,et al. Provably Secure On-Demand Source Routing in Mobile Ad Hoc Networks , 2006, IEEE Transactions on Mobile Computing.
[6] Srdjan Capkun,et al. Self-Organized Public-Key Management for Mobile Ad Hoc Networks , 2003, IEEE Trans. Mob. Comput..
[7] Charles E. Perkins,et al. Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.
[8] Haiyun Luo,et al. Self-securing ad hoc wireless networks , 2002, Proceedings ISCC 2002 Seventh International Symposium on Computers and Communications.
[9] Tracy Camp,et al. Stationary distributions for the random waypoint mobility model , 2004, IEEE Transactions on Mobile Computing.
[10] Jean-Yves Le Boudec,et al. Perfect simulation and stationarity of a class of mobility models , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[11] Manel Guerrero Zapata. Secure ad hoc on-demand distance vector routing , 2002, MOCO.
[12] Donal O'Mahony,et al. Secure routing for mobile ad hoc networks , 2005, IEEE Communications Surveys & Tutorials.
[13] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[14] Mihir Bellare,et al. Entity Authentication and Key Distribution , 1993, CRYPTO.
[15] Yih-Chun Hu,et al. SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2002, Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications.
[16] Manel Guerrero Zapata. Secure Ad hoc On-Demand Distance Vector (SAODV) Routing , 2006 .
[17] Srdjan Capkun,et al. Key Agreement in Peer-to-Peer Wireless Networks , 2006, Proceedings of the IEEE.
[18] Srdjan Capkun,et al. Mobility helps peer-to-peer security , 2006, IEEE Transactions on Mobile Computing.
[19] Robin Kravets,et al. MOCA : MObile Certificate Authority for Wireless Ad Hoc Networks , 2004 .
[20] Manel Guerrero Zapata. Key management and delayed verification for Ad hoc networks , 2006, J. High Speed Networks.