메뉴 건너뛰기




Volumn 2, Issue , 2004, Pages 1275-1284

An authentication service against dishonest users in mobile Ad Hoc networks

Author keywords

[No Author keywords available]

Indexed keywords

DATA PACKETS; HACKERS; MOBILE AD HOC NETWORKS; PUBLIC KEY AUTHENTICATION;

EID: 11244256574     PISSN: 1095323X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/AERO.2004.1367725     Document Type: Conference Paper
Times cited : (30)

References (25)
  • 1
    • 0034431670 scopus 로고    scopus 로고
    • Self-organizing, self-healing wireless networks
    • C. Elliott and B. Heile,"Self-Organizing, Self-Healing Wireless Networks," Proceedings 2000 IEEE Aerospace Conference, vol. 1, pp. 149-156, 2000.
    • (2000) Proceedings 2000 IEEE Aerospace Conference , vol.1 , pp. 149-156
  • 2
    • 4143079666 scopus 로고    scopus 로고
    • Security in Ad Hoc networks
    • Helsinki University of Technology, Telecommunications Software and Multimedia Laboratory
    • V. Karpijoki, "Security in Ad Hoc Networks," Helsinki University of Technology, Tik-110.501 Seminar on Network Security, Telecommunications Software and Multimedia Laboratory, 2000.
    • (2000) Tik-110.501 Seminar on Network Security
    • Karpijoki, V.1
  • 7
    • 0031630935 scopus 로고    scopus 로고
    • Evaluating certification authority security
    • S. Kent, "Evaluating Certification Authority Security," Proceedings 1998 IEEE Aerospace Conference, vol. 4, pp. 319-327, 1998.
    • (1998) Proceedings 1998 IEEE Aerospace Conference , vol.4 , pp. 319-327
    • Kent, S.1
  • 10
    • 0031627885 scopus 로고    scopus 로고
    • Public-key infrastructure interoperation
    • W. Ford, "Public-Key Infrastructure Interoperation," Proceedings 1998 IEEE Aerospace Conference, vol. 4, pp. 329-333, 1998.
    • (1998) Proceedings 1998 IEEE Aerospace Conference , vol.4 , pp. 329-333
    • Ford, W.1
  • 11
    • 0027617271 scopus 로고
    • Increasing availability and security of an authentication service
    • June
    • L. Gong, "Increasing Availability and Security of an Authentication Service," IEEE Journal on Selected Areas in Communications, vol. 11, no. 5, June 1993.
    • (1993) IEEE Journal on Selected Areas in Communications , vol.11 , Issue.5
    • Gong, L.1
  • 12
    • 85084160265 scopus 로고    scopus 로고
    • Building intrusion tolerant applications
    • Washington, D.C., August 23-26
    • T. Wu, M. Malkin, and D. Boneh, "Building Intrusion Tolerant Applications," Eighth USENIX Security Symposium, pp. 79-92, Washington, D.C., August 23-26 1999.
    • (1999) Eighth USENIX Security Symposium , pp. 79-92
    • Wu, T.1    Malkin, M.2    Boneh, D.3
  • 13
  • 15
    • 3142719292 scopus 로고
    • Multicluster, mobile, multimedia radio network
    • M. Gerla and J. T. C. Tsai, "Multicluster, Mobile, Multimedia Radio Network," ACM-Baltzer Journal of Wireless Networks, vol. 1, no. 3, pp. 255-256, 1995.
    • (1995) ACM-Baltzer Journal of Wireless Networks , vol.1 , Issue.3 , pp. 255-256
    • Gerla, M.1    Tsai, J.T.C.2
  • 19
    • 11244300143 scopus 로고    scopus 로고
    • Chapter 1 of the document Introduction to Cryptography in the POP 6.5.1 documentation, Copyright ©1990-1999 Network Associates, Inc. and its Affiliated Companies
    • "How POP Works," Chapter 1 of the document Introduction to Cryptography in the POP 6.5.1 documentation, Copyright ©1990-1999 Network Associates, Inc. and its Affiliated Companies.
    • How POP Works
  • 23
    • 0032290722 scopus 로고    scopus 로고
    • Resilient authentication using path independence
    • December
    • M. K. Reiter and S. G. Stubblebine, "Resilient Authentication using Path Independence," IEEE Transactions on Computers vol. 47, no. 12, pp. 1351-1362, December 1998.
    • (1998) IEEE Transactions on Computers , vol.47 , Issue.12 , pp. 1351-1362
    • Reiter, M.K.1    Stubblebine, S.G.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.