Bootstrapping security associations for routing in mobile ad-hoc networks
暂无分享,去创建一个
[1] Frank Stajano,et al. The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.
[2] Yih-Chun Hu,et al. Caching strategies in on-demand routing protocols for wireless ad hoc networks , 2000, MobiCom '00.
[3] Michael Roe,et al. Child-proof authentication for MIPv6 (CAM) , 2001, CCRV.
[4] Pekka Nikander,et al. Protecting Against Bidding Down Attacks , 2002 .
[5] Dan Boneh,et al. Generating RSA Keys on a Handheld Using an Untrusted Server , 2000, INDOCRYPT.
[6] Ran Canetti,et al. Efficient and Secure Source Authentication for Multicast , 2001, NDSS.
[7] M. S. Corson,et al. A highly adaptive distributed routing algorithm for mobile wireless networks , 1997, Proceedings of INFOCOM '97.
[8] Gabriel Montenegro,et al. Statistically Unique and Cryptographically Verifiable (SUCV) Identifiers and Addresses , 2002, NDSS.
[9] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.
[10] Duncan S. Wong,et al. The performance measurement of cryptographic primitives on palm devices , 2001, Seventeenth Annual Computer Security Applications Conference.
[11] Zygmunt J. Haas,et al. A new routing protocol for the reconfigurable wireless networks , 1997, Proceedings of ICUPC 97 - 6th International Conference on Universal Personal Communications.
[12] Charles E. Perkins,et al. Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for mobile computers , 1994, SIGCOMM.
[13] Yih-Chun Hu,et al. SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2002, Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications.
[14] Panagiotis Papadimitratos,et al. Secure Routing for Mobile Ad Hoc Networks , 2002 .
[15] Jean-Pierre Hubaux,et al. The quest for security in mobile ad hoc networks , 2001, MobiHoc '01.
[16] Charles E. Perkins,et al. Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers , 1994, SIGCOMM.
[17] Charles E. Perkins,et al. Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.
[18] Yih-Chun Hu,et al. Packet leashes: a defense against wormhole attacks in wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[19] David A. Maltz,et al. DSR: the dynamic source routing protocol for multihop wireless ad hoc networks , 2001 .
[20] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[21] Frank Stajano,et al. Security for Ubiquitous Computing , 2002, ICISC.
[22] Elizabeth M. Belding-Royer,et al. A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..