共 50 条
- [41] A Threshold Cryptography Based Authentication Scheme for Mobile Ad-hoc Network [J]. ADVANCES IN NETWORKS AND COMMUNICATIONS, PT II, 2011, 132 : 400 - 409
- [42] Secure routing with time-space cryptography for mobile ad-hoc networks [J]. MILCOM 2005 - 2005 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1-5, 2005, : 1869 - 1874
- [43] Dynamic support for distributed certification authority in mobile ad hoc networks [J]. 2006 INTERNATIONAL CONFERENCE ON HYBRID INFORMATION TECHNOLOGY, VOL 1, PROCEEDINGS, 2006, : 424 - +
- [44] Virtual Mobile Ad-hoc Networks [J]. 2013 IEEE 10TH INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR SYSTEMS (MASS 2013), 2013, : 433 - 434
- [45] Distributed symmetric key management for mobile ad hoc networks [J]. IEEE INFOCOM 2004: THE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-4, PROCEEDINGS, 2004, : 2414 - 2424
- [46] Tree-based group key agreement framework for mobile ad-hoc networks [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2007, 23 (06): : 787 - 803
- [48] Tree-based group key agreement framework for mobile ad-hoc networks [J]. 20TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2, PROCEEDINGS, 2006, : 5 - +
- [49] Security in Mobile Ad-Hoc Networks [J]. 2012 THIRD INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION & NETWORKING TECHNOLOGIES (ICCCNT), 2012,
- [50] Mobile and ad-hoc local networks [J]. COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING, 2003, 41 (03): : 285 - 287