1 |
C. Jaeduck, R. Hyosun, J. Souhwan, and K. Younghan, 'Support of Context-awareness in Ubiquitous Networks using Smart Packet,' IPSJ SIG 2005, pp. 275-280, 2005
|
2 |
M. Maurer and Y. Yacobi, 'A remark on a Non- interactive public-key distribution system,' EUROCRYPT' 92, 1998
|
3 |
S. Kent and K Seo, 'Security Architecture for the Internet Protocol,' IETF RFC 4301, December 2005
|
4 |
S. Corson and J. Macker, 'Mobile ad-hoc networking (MANET),' IETF RFC 2051, January 1999
|
5 |
C. Perkins, E. Belding-Royer and S. Das, 'Ad hoc On-Demand Distance Vector (AODV) Routing,' IETF RFC 3561, July 2003
|
6 |
T. Kwon, S. Baek, S. Pack, and Y. Choi, 'AAA for NEMO', IETF Internet Draft, draft-kwon- aaa-nemo-00, January 2006
|
7 |
P. Argyroudis and D. O'Mahony, 'Secure routing for mobile ad hoc networks,' Communications surveys & Tutorials, IEEE volume 7, pp. 2-21, 2005
|
8 |
D. Simon, B. Aboba and R. Hurst, 'The EAP-TLS Authentication Protocol,' IETF RFC 5216, March 2008
|
9 |
C. Siva Ram Murthy and B. S, Manoj, Ad Hoc Wireless Networks Architectures and Protocols, Prentice Hall PTR, New Jersey, 2004
|
10 |
K. Namhi, P. Ilkyun, and K. Younghan, 'Ubiquitous zone networking technologies for multi-hop based wireless communications,' IWSOS 2006, LNCS 4124, September 2006
DOI
ScienceOn
|