메뉴 건너뛰기




Volumn , Issue , 2005, Pages 96-104

Authentication protocols for ad hoc networks: Taxonomy and research issues

Author keywords

Ad Hoc Networks; Authentication; Credentials; Identity Verification; Network Security; Protocol Taxonomy

Indexed keywords

COPYRIGHTS; MILITARY APPLICATIONS; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 32144463658     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1089761.1089777     Document Type: Conference Paper
Times cited : (39)

References (27)
  • 10
    • 11244256574 scopus 로고    scopus 로고
    • An authentication service against dishonest users in mobile ad hoc networks
    • March 6-13
    • Edith C. H. Ngai and Michael R. Lyu and Roland T. Chin, "An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks." In Proc. of 2004 IEEE Aerospace Conference, March 6-13 2004.
    • (2004) Proc. of 2004 IEEE Aerospace Conference
    • Ngai, E.C.H.1    Lyu, M.R.2    Chin, R.T.3
  • 11
    • 0001831930 scopus 로고    scopus 로고
    • The resurrecting duckling: Security issues in ad-hoc wireless networks
    • M. Roe B. Christianson, B. Crispo, editor, Security Protocols. Springer Verlag
    • F. Stajano and R. Anderson, "The Resurrecting Duckling: Security Issues in Ad-Hoc Wireless Networks." In M. Roe B. Christianson, B. Crispo, editor, Security Protocols, 7th International Workshop Proceedings, LectureNotes in Computer Science. Springer Verlag, 1999.
    • (1999) 7th International Workshop Proceedings, LectureNotes in Computer Science
    • Stajano, F.1    Anderson, R.2
  • 16
    • 0033357103 scopus 로고    scopus 로고
    • Securing ad hoc networks
    • L. Zhou and Z.J. Haas, "Securing Ad Hoc Networks." IEEE Network Journal, vol. 13, no. 6,1999, pp. 24-30.
    • (1999) IEEE Network Journal , vol.13 , Issue.6 , pp. 24-30
    • Zhou, L.1    Haas, Z.J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.