Reliable Identities Using Off-the-Shelf Hardware Security in MANETs
暂无分享,去创建一个
[1] Paul Ward,et al. Trusted computing for protecting ad-hoc routing , 2006, 4th Annual Communication Networks and Services Research Conference (CNSR'06).
[2] Stefan Katzenbeisser,et al. Improving the scalability of platform attestation , 2008, STC '08.
[3] Ronald Perez,et al. Linking remote attestation to secure tunnel endpoints , 2006, STC '06.
[4] Ravi S. Sandhu,et al. Peer-to-peer access control architecture using trusted computing technology , 2005, SACMAT '05.
[5] Kenneth G. Paterson,et al. Trusted computing: providing security for peer-to-peer networks , 2005, Fifth IEEE International Conference on Peer-to-Peer Computing (P2P'05).
[6] Siani Pearson. Trusted Computing Platforms , the Next Security Solution , 2002 .
[7] Luiz A. DaSilva,et al. Authentication protocols for ad hoc networks: taxonomy and research issues , 2005, Q2SWinet '05.
[8] Dharma P. Agrawal,et al. A novel authentication scheme for ad hoc networks , 2000, 2000 IEEE Wireless Communications and Networking Conference. Conference Record (Cat. No.00TH8540).
[9] Michael D. Smith,et al. Trusted Computing, Peer-to-Peer Distribution, and The Economics of Pirated Entertainment , 2004, Economics of Information Security.
[10] Helen Tang,et al. Strong Authentication for Tactical Mobile Ad Hoc Networks , 2007 .
[11] Kenneth G. Paterson,et al. Key Refreshing in Identity-Based Cryptography and its Applications in MANETs , 2007, MILCOM 2007 - IEEE Military Communications Conference.