메뉴 건너뛰기




Volumn 24, Issue , 2004, Pages 582-587

Trust- and clustering-based authentication services in mobile ad hoc networks

Author keywords

[No Author keywords available]

Indexed keywords

ALGORITHMS; DATA PRIVACY; NETWORK PROTOCOLS; PUBLIC KEY CRYPTOGRAPHY; SECURITY OF DATA; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 3042598885     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/icdcsw.2004.1284091     Document Type: Conference Paper
Times cited : (55)

References (22)
  • 1
    • 0003902875 scopus 로고    scopus 로고
    • Helsinki University of Technology, Tik-110.501 Seminar on Network Security, Telecommunications Software and Multimedia Laboratory
    • V. Karpijoki, "Security in Ad Hoc Networks," Helsinki University of Technology, Tik-110.501 Seminar on Network Security, Telecommunications Software and Multimedia Laboratory, 2000.
    • (2000) Security in Ad Hoc Networks
    • Karpijoki, V.1
  • 5
    • 0003237987 scopus 로고
    • The Kerberos network authentication service (version 5)
    • June
    • J. Kohl and B. Neuman, "The Kerberos network authentication service (version 5)," RFC-1510, June 1991.
    • (1991) RFC-1510
    • Kohl, J.1    Neuman, B.2
  • 7
    • 0027617271 scopus 로고
    • Increasing availability and security of an authentication service
    • June
    • L. Gong, "Increasing Availability and Security of an Authentication Service," IEEE Journal on Selected Areas in Communications, vol. 11, no. 5, June 1993.
    • (1993) IEEE Journal on Selected Areas in Communications , vol.11 , Issue.5
    • Gong, L.1
  • 8
    • 85084160265 scopus 로고    scopus 로고
    • Building intrusion tolerant applications
    • Washington, D.C., August 23-26
    • T. Wu, M. Malkin, and D. Boneh, "Building Intrusion Tolerant Applications," Eighth USENIX Security Symposium, pp. 79-92, Washington, D.C., August 23-26 1999.
    • (1999) Eighth USENIX Security Symposium , pp. 79-92
    • Wu, T.1    Malkin, M.2    Boneh, D.3
  • 9
  • 12
    • 3142719292 scopus 로고
    • Multicluster, mobile, multimedia radio network
    • M. Gerla and J. T. C. Tsai, "Multicluster, Mobile, Multimedia Radio Network," ACM-Baltzer Journal of Wireless Networks, vol. 1, no. 3, pp. 255-256, 1995.
    • (1995) ACM-baltzer Journal of Wireless Networks , vol.1 , Issue.3 , pp. 255-256
    • Gerla, M.1    Tsai, J.T.C.2
  • 18
    • 3042593094 scopus 로고
    • Chapter 1 of the document Introduction to Cryptography in the POP 6.5.1 documentation, Copyright © Network Associates, Inc. and its Affiliated Companies
    • "How PGP Works," Chapter 1 of the document Introduction to Cryptography in the POP 6.5.1 documentation, Copyright © 1990-1999 Network Associates, Inc. and its Affiliated Companies.
    • (1990) How PGP Works
  • 21
    • 0032290722 scopus 로고    scopus 로고
    • Resilient authentication using path independence
    • December
    • M. K. Reiter and S. G. Stubblebine, "Resilient Authentication using Path Independence," IEEE Transactions on Computers vol. 47, no. 12, pp. 1351-1362, December 1998.
    • (1998) IEEE Transactions on Computers , vol.47 , Issue.12 , pp. 1351-1362
    • Reiter, M.K.1    Stubblebine, S.G.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.