메뉴 건너뛰기




Volumn 4277 LNCS - I, Issue , 2006, Pages 575-584

A composite key management scheme for mobile ad hoc networks

Author keywords

Ad Hoc networks; Hierarchical cluster algorithm; Identity based cryptosystem; Key management; Threshold cryptography

Indexed keywords

ALGORITHMS; COMPUTER NETWORKS; FAULT TOLERANT COMPUTER SYSTEMS; MULTIPATH PROPAGATION; SECURITY OF DATA; TELECOMMUNICATION TRAFFIC;

EID: 33845394304     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11915034_81     Document Type: Conference Paper
Times cited : (4)

References (10)
  • 2
    • 0033357103 scopus 로고    scopus 로고
    • Securing ad hoc network
    • Zhou, L. and Haas, Z.J.: Securing Ad Hoc Network. IEEE Networks, Vol. 13, No. 6 (1999)
    • (1999) IEEE Networks , vol.13 , Issue.6
    • Zhou, L.1    Haas, Z.J.2
  • 6
    • 0035789229 scopus 로고    scopus 로고
    • The quest for security in mobile ad hoc networks
    • Hubaux, J.P., Buttyan, L. and Capkun, S.: The Quest for Security in Mobile Ad Hoc Networks, CACM (2001)
    • (2001) CACM
    • Hubaux, J.P.1    Buttyan, L.2    Capkun, S.3
  • 9
    • 84941171182 scopus 로고    scopus 로고
    • Intrusion detection technologies in mobile ad hoc network
    • Jiang, H.: Intrusion Detection Technologies in Mobile Ad Hoc Network. ZhongXing Telecom Technology, Vol. 10 (2002)
    • (2002) ZhongXing Telecom Technology , vol.10
    • Jiang, H.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.