1 |
F. Stajano and R. Anderson, 'The Resurrecting Duckling : Security Issues for Ad-hoc Wireless Networks', Proc. seventh Int'l workshop security protocols, 1999
|
2 |
H. Luo and S. Lu, 'Ubiquitous and Robust Authentication Services for Ad Hoc Wireless Networks', Technical Report 200030, UCLA Computer Science Department, Oct. 2000
|
3 |
J. Kong, P. Zerfos, H. Luo, S. Lu, and L. Zhang, 'Providing robust and ubiquitous security support for MANET,' Proc. ninth Int'l conf. Network Protocols(ICNP), Nov. 2001
|
4 |
R. Hamming. Coding and Information Theory. Prentice-Hall, 1980
|
5 |
J.-P. Hubaux, L. Buttyan, and S. Capkun, 'The Quest for Security in Mobile Ad Hoc Networks,' Proc. ACM Symp. Mobile Ad Hoc Networking and in Computing(MobiHoc), 2001
|
6 |
K. Fokine, 'Key Management in Ad Hoc Networks', LiTH-ISY-EX-3322-2002, 2002
|
7 |
A. Weimerskirch and G. Thonet, 'A Distributed Light-Weight Authentication Model for Ad-hoc Networks', v. 2288 of LNCS, 2002
|
8 |
A. Herzberg, S. Jarecki, H. Krawczyk, M. Yung, 'proactive Secret Sharing, or: how to cope with perpetual leakage,' Advances in Cryptography - Crypto 95' Proceedings, LNCS Vol 963, 1995
|
9 |
H. Luo, P. Zerfos, J. Kong, S. Lu, and L. Zhang, 'Self-securing Ad Hoc Wireless Networks', Seventh IEEE Symp. on Computers and Communications(ISCC '02), 2002
|
10 |
Y. Frankel, P. Gemmell, P.-D. Mac-Kenzie, and M. Yung, 'Optimal- Resilience Proactive Public-Key Cryptosystems', IEEE Symp. on Foundations of Computer Science, 1997
|
11 |
S. Capkun, L. Buttyan and J.-P. Hubaux, 'Self-Organized Public-Key Management for Mobile Ad Hoc Networks', IEEE Trans. on mobile computing, vol. 2, No. 1, Jan./Mar. 2003
|
12 |
S. Corson and J. Macker, 'Mobile Ad hoc Networking(MANET): Routing Protocol Performance issues and Evaluation Considerations', IETF RFC2501, Jan. 1999
|
13 |
R. Housley, W. Polk, W. Ford, and D. Solo,' Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile', IETF RFC3280, April 2002
|