共 8 条
[1]
Zhou L., Haas Z.J., Securing ad hoc networks, IEEE Network Magazine, 13, 6, pp. 24-30, (1999)
[2]
Kong J., Zerfos P., Luo H., Providing robust and ubiquitous security support for mobile ad hoc networks, IEEE ICNP (Int'l Conf. Network Protocols), (2001)
[3]
Hubaux J.-P., Buttyan L., Capkun S., The quest for security in mobile ad hoc networks, The 2nd ACM Symposium on Mobile Ad Hoc Networking and Computing, (2001)
[4]
Crepeau C., Davis C.R., A certificate revocation scheme for wireless ad hoc networks, The 1st ACM Workshop Security of Ad Hoc and Sensor Networks, (2003)
[5]
Jiang M., Li J., Tay Y.C., Cluster based routing protocol, (1999)
[6]
Venkatraman L., Agrawal D.P., A novel authentication scheme for ad hoc networks, IEEE Wireless Communications and Networking Conf., (2000)
[7]
Bechler M., Hof H.J., Kraft D., A cluster-based security architecture for ad hoc networks, IEEE INFOCOM2004, (2004)
[8]
Awerbuch B., Holmer D., Nita-Rotaru C., An on-demand secure routing protocol resilient to Byzantine failures, ACM Workshop on Wireless Security (WiSe) 2002, (2002)