共 50 条
- [1] AD-HOC ON DEMAND AUTHENTICATION CHAIN PROTOCOL An Authentication Protocol for Ad-hoc Networks [J]. SECRYPT 2009: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2009, : 274 - +
- [2] A global authentication scheme for Mobile Ad-hoc networks [J]. ADVANCES IN INFORMATION AND COMPUTER SECURITY, PROCEEDINGS, 2007, 4752 : 105 - +
- [3] Group Monitoring in Mobile Ad-Hoc Networks [J]. NEXT GENERATION SOCIETY: TECHNOLOGICAL AND LEGAL ISSUES, 2010, 26 : 441 - 451
- [4] Authentication Protocol Runtime Evaluation in Distributed AAA Framework for Mobile Ad-Hoc Networks [J]. 2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 1, 2010, : 277 - 281
- [5] Evaluation of the Multimetric Proactive Routing Protocol Implementation for Mobile Ad-Hoc Networks [J]. 2012 19th International Conference on Microwave Radar and Wireless Communications (MIKON), Vols 1 and 2, 2012, : 259 - 261
- [6] A lightweight authentication protocol for mobile ad hoc networks [J]. ITCC 2005: International Conference on Information Technology: Coding and Computing, Vol 2, 2005, : 546 - 551
- [7] An Efficient Hierarchical Group Key Management Protocol for Mobile Ad-Hoc Networks [J]. 2009 1ST INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATION, VEHICULAR TECHNOLOGY, INFORMATION THEORY AND AEROSPACE & ELECTRONIC SYSTEMS TECHNOLOGY, VOLS 1 AND 2, 2009, : 565 - +
- [8] A new authentication protocol for revocable anonymity in ad-hoc networks [J]. PROCEEDINGS OF THE IASTED INTERNATIONAL CONFERENCE ON COMMUNICATION, NETWORK, AND INFORMATION SECURITY, 2005, : 30 - +
- [9] TAM: A Tiered Authentication of Multicast Protocol for Ad-Hoc Networks [J]. IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2012, 9 (01): : 100 - 113
- [10] A secure routing protocol for mobile ad-hoc networks [J]. PROCEEDINGS OF THE 2004 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2004, : 2825 - 2829