Self-organized public-key management for mobile Ad Hoc Networks based on a bidirectional trust model
暂无分享,去创建一个
Hong Liang | Chen Jing | Hong Fan | Fu Cai | Li Rui-xian
[1] Tracy Camp,et al. A survey of mobility models for ad hoc network research , 2002, Wirel. Commun. Mob. Comput..
[2] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[3] P.E. McKenney,et al. Physical- and link-layer modeling of packet-radio network performance , 1990, IEEE Conference on Military Communications.
[4] Xiaoqi Li,et al. A trust model based routing protocol for secure ad hoc networks , 2004, 2004 IEEE Aerospace Conference Proceedings (IEEE Cat. No.04TH8720).
[5] Jiejun Kong,et al. Providing robust and ubiquitous security support for mobile ad-hoc networks , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.
[6] M. Satyanarayanan,et al. Mobile computing , 1993, Computer.
[7] Bruce S. Davie,et al. Computer Networks: A Systems Approach , 1996 .
[8] Tomasz Imielinski,et al. Mobile Computing , 1996 .
[9] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..