SOMA: Self-Organised Mesh Authentication
暂无分享,去创建一个
[1] Srdjan Capkun,et al. Mobility helps security in ad hoc networks , 2003, MobiHoc '03.
[2] Jiejun Kong,et al. Providing robust and ubiquitous security support for mobile ad-hoc networks , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.
[3] Srdjan Capkun,et al. Self-Organized Public-Key Management for Mobile Ad Hoc Networks , 2003, IEEE Trans. Mob. Comput..
[4] Robin Kravets,et al. Key management for heterogeneous ad hoc wireless networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..
[5] Robbert van Renesse,et al. COCA: a secure distributed online certification authority , 2002, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].
[6] Srdjan Capkun,et al. Mobility helps peer-to-peer security , 2006, IEEE Transactions on Mobile Computing.
[7] Robin Kravets,et al. MOCA : MObile Certificate Authority for Wireless Ad Hoc Networks , 2004 .
[8] Duncan J. Watts,et al. Collective dynamics of ‘small-world’ networks , 1998, Nature.
[9] Robert Tappan Morris,et al. Architecture and evaluation of an unplanned 802.11b mesh network , 2005, MobiCom '05.
[10] Philip R. Zimmermann,et al. The official PGP user's guide , 1996 .
[11] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[12] M.R. Shikh-Bahaei,et al. Interference cancellation in W-CDMA cellular structures using statistical processing , 1999, Seamless Interconnection for Universal Services. Global Telecommunications Conference. GLOBECOM'99. (Cat. No.99CH37042).
[13] David R. Karger,et al. Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM '01.
[14] S. Gritzalis,et al. Binary tree based public-key management for Mobile Ad Hoc Networks , 2008, 2008 IEEE International Symposium on Wireless Communication Systems.
[15] Adi Shamir,et al. How to share a secret , 1979, CACM.
[16] Karl Aberer,et al. A decentralised public key infrastructure for customer-to-customer e-commerce , 2005, Int. J. Bus. Process. Integr. Manag..
[17] Aggelos Kiayias,et al. Self Protecting Pirates and Black-Box Traitor Tracing , 2001, CRYPTO.
[18] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[19] Panayiotis Kotzanikolaou,et al. Chord-PKI: Embedding a Public Key Infrastructure into the Chord Overlay Network , 2007, EuroPKI.
[20] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.