A Secure and Effective Optimal Path Searching Method on Certificate Chains in Mobile Ad hoc NETworks
![]() |
Choi, Sung-Jae
(연세대학교 컴퓨터학과)
Kim, Yong-Woo (연세대학교 컴퓨터학과) Lee, Hong-Ki (연세대학교 컴퓨터학과) Song, Joo-Seok (연세대학교 컴퓨터학과) Nyang, Dae-Mon (인하대학교 정보통신대학원) |
1 | J. Kong, P. Zerfos, H. Luo, S. Lu and L. Zhang, 'Providing Robust and Ubiquitous Security Support for Mobile Ad-Hoc networks,' IEEE ICNP '2001, 2001 |
2 | W. Peng and X. Lu, 'On the reduction of broadcast redundancy in mobile ad hoc networks,' In Proceedings of MOBIHOC, 2000 |
3 | W. Lou and J. Wu, 'On reducing broadcast redundancy in ad hoc wireless networks,' IEEE Transactions on Mobile Computing, vol.1, no. 2, Apr 2002 DOI ScienceOn |
4 | L. Zhou and Z. Haas, 'Securing ad hoc networks,' IEEE Newark Megazine, vol.13, no.6, Dec 1999 DOI ScienceOn |
5 | L. Venkatraman and D. Agrawal, 'A Novel Authentication scheme for Ad hoc networks', IEEE 2000, Nov 2002 DOI |
6 | S. Tseng, Y. Chen and J. Sheu, 'The broadcast storm problem in a mobile ad hoc network,' In Proceedings of the ACM International Workshop on Modeling, Analysis and Simulation of Wireless and Mobile System(MSWIM), 2000 DOI |
7 | B. Williams, and T. Camp, 'Comparison of broadcasting techniques for mobile ad hoc networks', In Proceedings of the ACM International Symposium on Mobile Ad Hoc networking and Computing(MOBIHOC), pp. 194-205, 2002 DOI |
8 | S. Capkun, L. Buttyan and J. Hubaux, 'SelfOrganized Public-key Management for Mobile Ad Hoc networks,' IEEE transactions on mobile computing vol.2, no.1, Jan 2003 DOI ScienceOn |
9 | H. Lim and C. Kim, 'Flooding in Wireless Ad Hoc networks,' Computer Comm..J vol.24, no. 3-4, pp. 353-363, 2001 DOI ScienceOn |
![]() |