1 |
'홈 네트워크 내에서의 멀티 홉통신을 지원하는 인증 프로토콜' JCCI 2007, 평창, 2007년 5윌
|
2 |
S. Carter and A. Yasinsac, 'Secure Position Aided Ad hoc Routing Protocol',in Proc. the International Conference on Communications and Computer Networks (CCN) pp. 329-334, Mass, U.S.A., Nov. 4-7, 2002
|
3 |
L. Gong, R. Needham, and R. Yahalom, 'Reasoning about Belief in Cryptographic Protocols', in Proc. IEEE Symposium on Research in Security and Privacy, pp. 234-248, Oakland, CA, May 1990
DOI
|
4 |
P. Papadimitratos and Z. J. Haas, 'Secure Routing for Mobile Ad hoc Networks', in Proc. the SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002), pp. 193-204, San Antonio, TX, Jan. 27-31, 2002
|
5 |
M. M. Islam, R. Pose, and C. Kopp, 'Suburban Ad-hoc Networks in Information Warfare', in Proc. 6th Australian InfoWar Conference, Geelong, Australia, Nov. 24-25, 2005
|
6 |
K. Sanzgiri, D. Laflamme, B. Dahill, B. N. Levine, C. Shields, and E. M. Belding-Royer, 'Authenticated Routing for Ad Hoc Networks', IEEE Journal on Selected Areas in Communications, Vol. 23, no. 3, Mar. 2005, pp. 598-610
DOI
ScienceOn
|
7 |
H. Deng, A. Mukherjee, and D. P. Agrawal, 'Threshold and Identity-based Key Management and. Authentication for Wireless Ad Hoc Networks', in Proc. the Information Technology:Coding and Computing (ITCC'04), vol. 1, pp. 107-111, Las Vegas, U.S.A., Apr. 5-7, 2004
DOI
|
8 |
M. Bechler, H.-J. Hof, D. Kraft, F. Phlke, and L. Wolf, 'A Cluster-Based Security Architecture for Ad Hoc Networks', in Proc. INFOCOM 2004, vol. 4, pp. 2393-2403, Hong Kong, Mar. 12-13, 2004
|
9 |
A. A. Pirzada and C. McDonald, 'Kerberos Assisted Authentication in Mobile Ad-hoc Networks', in Proc. the 27th Australasian Computer Science Conference (ACSC'04), pp. 41-46, Dunedin, New Zealand, Jan. 18-22, 2004
|
10 |
http://www.itu.int/ITU-T/studygroups/com17/index.asp
|