메뉴 건너뛰기




Volumn 2, Issue 1, 2003, Pages 52-64

Self-organized public-key management for mobile ad hoc networks

Author keywords

Key authentication; Mobile ad hoc networks; PGP; Public key cryptography; Security; Self organization

Indexed keywords

ALGORITHMS; MOBILE COMPUTING; NUMERICAL ANALYSIS; SECURITY SYSTEMS; SERVERS;

EID: 0242678584     PISSN: 15361233     EISSN: None     Source Type: Journal    
DOI: 10.1109/TMC.2003.1195151     Document Type: Article
Times cited : (672)

References (31)
  • 1
    • 0003582910 scopus 로고    scopus 로고
    • Addison Wesley Professional, Dec.
    • C.E. Perkins, Ad Hoc Networking, Addison Wesley Professional, Dec. 2000.
    • (2000) Ad Hoc Networking
    • Perkins, C.E.1
  • 3
  • 4
    • 0003777824 scopus 로고
    • bachelor's thesis, Dept. Electrical Eng., Massachusetts Inst. of Technology, Cambridge
    • L.M. Kornfelder, "Toward a Practical Public-Key Cryptosystem," bachelor's thesis, Dept. Electrical Eng., Massachusetts Inst. of Technology, Cambridge, 1978.
    • (1978) Toward a Practical Public-key Cryptosystem
    • Kornfelder, L.M.1
  • 6
    • 0033357103 scopus 로고    scopus 로고
    • Securing ad hoc networks
    • Nov./Dec.
    • L. Zhou and Z. Haas, "Securing Ad Hoc Networks," IEEE Network, vol. 13, no. 6, pp. 24-30, Nov./Dec. 1999.
    • (1999) IEEE Network , vol.13 , Issue.6 , pp. 24-30
    • Zhou, L.1    Haas, Z.2
  • 10
    • 0013093839 scopus 로고    scopus 로고
    • Child-proof authentication for MIPv6 (CAM)
    • Apr.
    • G. O'Shea and M. Roe, "Child-Proof Authentication for MIPv6 (CAM)," ACM Computer Comm. Rev., Apr. 2001.
    • (2001) ACM Computer Comm. Rev.
    • O'Shea, G.1    Roe, M.2
  • 15
    • 0042660545 scopus 로고    scopus 로고
    • Stimulating cooperation in self-organizing mobile ad hoc networks
    • to appear in, Oct.
    • L. Buttyan and J.-P. Hubaux, "Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks," to appear in ACM/Kluwer Mobile Networks and Applications (MONET), vol. 8, no. 5, Oct. 2003.
    • (2003) ACM/Kluwer Mobile Networks and Applications (MONET) , vol.8 , Issue.5
    • Buttyan, L.1    Hubaux, J.-P.2
  • 19
    • 0031078841 scopus 로고    scopus 로고
    • Trusting mobile user devices and security modules
    • Feb.
    • A. Pfitzmann, B. Pfitzmann, and M. Waidner, "Trusting Mobile User Devices and Security Modules," Computer, Feb. 1997.
    • (1997) Computer
    • Pfitzmann, A.1    Pfitzmann, B.2    Waidner, M.3
  • 21
    • 0034317075 scopus 로고    scopus 로고
    • Key agreement in ad hoc networks
    • N. Asokan and P. Ginzboorg, "Key Agreement in Ad Hoc Networks," Computer Comm., vol. 23, pp. 1627-1637, 2000.
    • (2000) Computer Comm. , vol.23 , pp. 1627-1637
    • Asokan, N.1    Ginzboorg, P.2
  • 25
    • 0002687371 scopus 로고
    • The small world problem
    • S. Milgram, "The Small World Problem," Psychology Today, vol. 61, 1967.
    • (1967) Psychology Today , vol.61
    • Milgram, S.1
  • 26
    • 0001504032 scopus 로고
    • An experimental study of the small world problem
    • J. Travers and S. Milgram, "An Experimental Study of the Small World Problem," Sociometry, vol. 32, 1969.
    • (1969) Sociometry , vol.32
    • Travers, J.1    Milgram, S.2
  • 27
    • 0004081447 scopus 로고    scopus 로고
    • Princeton Univ. Press
    • D. Watts, Small Worlds. Princeton Univ. Press, 1999.
    • (1999) Small Worlds
    • Watts, D.1
  • 29
    • 3042718930 scopus 로고    scopus 로고
    • Algorithmic Solutions, "LEDA," www.algorithmic-solutions.com, 2003.
    • (2003) LEDA
  • 31
    • 0042473975 scopus 로고    scopus 로고
    • Route driven gossip: Probabilistic reliable multicast in ad hoc networks
    • J. Luo, P.T. Eugster, and J.-P. Hubaux, "Route Driven Gossip: Probabilistic Reliable Multicast in Ad Hoc Networks," Proc. INFOCOM 2003, 2003.
    • (2003) Proc. INFOCOM 2003
    • Luo, J.1    Eugster, P.T.2    Hubaux, J.-P.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.