1 |
IETF MANET Working Group Internet Drafts. http//www.ietforg/ids.by.wg/rnanet.html
|
2 |
J. Broch. David B. Johnson and David A. Maltz, 'The dynamic source routing protocol for mobile ad hoc networks', Internet-Draft Version 03, IETF, October 1999
|
3 |
Pirzada, A. A. and McDonald, C. 'Establishing trust in pure ad-hoc networks'. ACM International Conference Proceeding Series. Vol. 56. Proceedings of the 27th conference on Australasian computer science - Volume 26
|
4 |
S. Buchegger and J.-Y. L. Boudec, 'Nodes bearing grudges: Towards routing security, fairness, and robustness in mobile ad hoc networks', Proceedings of the Tenth Euromicro Workshop on Parallel, Distributed and Network-based Processing, Canary Islands, Spain: IEEE Computer Society, January 2002, pp. 403--410
|
5 |
박영희, 정병천, 이윤호, 김희열, 이재원, 윤현수, 'Diffie-Hallman 키 교환을 이용한 확장성을 가진 계층적 그룹키 설정 프로토콜', 한국정보보호학회, 정보보호학회논문지 제13권 5호, 2003
|
6 |
Pietro Michiardi and Refik Melva, 'CORE: A Collaborative Reputation mechanism to enforce node cooperation in Mobile Ad Hoc Networks', Proceedings of the IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security: Advanced Communications and Multimedia Security, p.l07-121, September 26-27, 2002
|
7 |
조태남, 이상호, '(2,4)-트리를 이용한 그룹키 관리', 한국정보보호학회, 정보보호학회논문지 제11권 4호, pp. 64-77, 2001
|
8 |
L. Zhou and Z.J. Haas, 'Securing ad hoc networks', IEEE Network Magazine. vol.13, no.6, November December 1999
|
9 |
The Network Simulator - ns-2. http://www.isl.edu/nsnam/ns/. 2002
|
10 |
이상원, 천정희, 김용대, 'Pairing을 이용한 트리 기반 그룹키 합의 프로토콜', 한국정보보호학회, 정보보호학회논문지 제13권 3호, 2003
|
11 |
The CMU Monarch Project, 'The CMU Monarch Projects Wireless and Mobility Extensions', Http://www.monarch.cs.rice.edu/crnu-ns.html. Oct. 12, 1999
|
12 |
Sonja Buchegger and Jean-Yves Le Boudec. 'Performance Analysis of the CONFIDANT Protocol (Cooperation Of Nodes: Fairness In Dynamic Ad-hoc NeTworks)', In Proceedings of IEEE/ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC), Lausanne, CH, June 2002
|
13 |
권정옥, 황정연, 김현정, 이동훈, 임종인, '일방향 함수와 XOR을 이용한 효율적인 그룹키 관리 프로토콜 : ELKH', 한국정보보호학회, 정보보호학회논문지 제12권 6호, 2002
|
14 |
박영호, 이경현, '이동네크워크 환경에서 그룹키 관리구조', 한국정보보호학회, 정보보호학회논문지 제12권 2호 pp. 77-89, 2002
|
15 |
Prashant Dewan, Partha Dasgupta and Amiya Bhattacharya. 'On Using Reputations in Ad hoc Networks to Counter Malicious Nodes', QoS and Dynamic Systems in conjunction with IEEE ICPADS Newport Beach, USA, 2004
|
16 |
Sergio Marti, T.J. Giuli, Kevin Lai and Mary Baker, 'Mitigating Routing Misbehaviour in Mobile Ad Hoc Networks', Proceedings of the Sixth Annual International Conference on Mobile Computing and Networking (MobiCom 2000)
|