메뉴 건너뛰기




Volumn 19, Issue 2, 2008, Pages

Multilevel security model for ad hoc networks

Author keywords

access control; ad hoc network; multilevel security model

Indexed keywords

ACCESS CONTROL; MATHEMATICAL MODELS; MOBILE TELECOMMUNICATION SYSTEMS; NETWORK SECURITY;

EID: 42949153805     PISSN: 10044132     EISSN: None     Source Type: Journal    
DOI: 10.1016/S1004-4132(08)60098-5     Document Type: Article
Times cited : (6)

References (12)
  • 1
    • 0033357103 scopus 로고    scopus 로고
    • Securing ad hoc networks
    • LD Zhou ZJ Haas Securing ad hoc networks IEEE Network 13 6 1999 24 30
    • (1999) IEEE Network , vol.13 , Issue.6 , pp. 24-30
    • Zhou, LD1    Haas, ZJ2
  • 2
    • 85120129322 scopus 로고    scopus 로고
    • Papadimitratos P, Haas Z J, Zhou L D. Secure routing for mobile ad hoc networks. Proc. of CNDS , 2002: 1–13.
  • 3
    • 17444426121 scopus 로고    scopus 로고
    • Ariadne: a secure ondemand routing protocol for ad hoc networks
    • YC Hu A Perrig DB Johnson Ariadne: a secure ondemand routing protocol for ad hoc networks Wireless Networks 11 1–2 2002 21 38
    • (2002) Wireless Networks , vol.11 , Issue.1–2 , pp. 21-38
    • Hu, YC1    Perrig, A2    Johnson, DB3
  • 4
    • 85120143144 scopus 로고    scopus 로고
    • Dahill B, Levine B N, Royer E, et al. ARAN: a secure routing protocol for ad hoc networks. UMass Tech. Report, 02–32, 2002.
  • 5
    • 85120107612 scopus 로고    scopus 로고
    • Hu Y C, Johnson D B, Perrig A. SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks. Proc. of Fourth IEEE Workshop on Mobile Computing Systems and Applications , 2002: 3–13.
  • 6
    • 8344229909 scopus 로고    scopus 로고
    • A cluster-based security architecture for ad hoc networks
    • M Bechler HJ Hof D Kraft A cluster-based security architecture for ad hoc networks INFOCOM 4 7–11 2004 2393 2403
    • (2004) INFOCOM , vol.4 , Issue.7–11 , pp. 2393-2403
    • Bechler, M1    Hof, HJ2    Kraft, D3
  • 7
    • 0018545449 scopus 로고
    • How to share a secret
    • A Shamir How to share a secret ACM Comm. 22 11 1979 612 613
    • (1979) ACM Comm. , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A1
  • 8
    • 85120108836 scopus 로고    scopus 로고
    • Matthew B, Dwaine C, Todd M, et al. Proxy-based security protocols in networked mobile devices. Proc. of the ACM Symposium on Applied Computing , 2002: 265–272.
  • 9
    • 85120120259 scopus 로고    scopus 로고
    • Vesa K. Security in ad hoc networks. Seminar on Network Security, HUT TML , 2000: 1–16.
  • 10
    • 85120122677 scopus 로고    scopus 로고
    • Hanne R N, Flemming N, Mikael B. Security for mobility. DEGAS Report Number WP6-IMM-I01-Int-001.
  • 11
    • 85120137669 scopus 로고    scopus 로고
    • Trusted computer system evaluation criteria. Department of Defense Standard , 1983.
  • 12
    • 0742294233 scopus 로고    scopus 로고
    • Mobile ad hoc networking: imperatives and challenges
    • C Imrich C Marco JN Jennifer Mobile ad hoc networking: imperatives and challenges Ad Hoc Networks 1 1 2003 13 64
    • (2003) Ad Hoc Networks , vol.1 , Issue.1 , pp. 13-64
    • Imrich, C1    Marco, C2    Jennifer, JN3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.