共 50 条
- [1] Fast authentication public key infrastructure for mobile ad hoc networks based on trusted computing [J]. 2006 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-4, 2006, : 910 - 913
- [2] Protocols for supporting a public key infrastructure in ad hoc networks [J]. SECURITY PROTOCOLS, 2005, 3364 : 274 - 287
- [3] A distributed key generation for mobile Ad Hoc network [J]. Jisuanji Gongcheng/Computer Engineering, 2006, 32 (06): : 181 - 182
- [4] Reputation based self organized public key management for mobile ad hoc network [J]. 8TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL III, PROCEEDINGS: COMMUNICATION AND NETWORK SYSTEMS, TECHNOLOGIES AND APPLICATIONS, 2004, : 331 - 335
- [5] Efficient detection of public key infrastructure-based revoked keys in mobile ad hoc networks [J]. WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2011, 11 (02): : 146 - 162
- [6] AC-PKI: Anonymous and certificateless public-key infrastructure for mobile ad hoc networks [J]. ICC 2005: IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-5, 2005, : 3515 - 3519
- [7] Public-key management in mobile ad hoc networks [J]. PIAGENG 2013: INTELLIGENT INFORMATION, CONTROL, AND COMMUNICATION TECHNOLOGY FOR AGRICULTURAL ENGINEERING, 2013, 8762
- [9] Ad hoc key management infrastructure [J]. ITCC 2005: INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING, VOL 2, 2005, : 540 - 545
- [10] A Mobile Ad hoc Network Public Key Encryption Algorithm based on Hash-chain [J]. PEEA 2011, 2011, 23