메뉴 건너뛰기




Volumn , Issue , 2008, Pages 208-213

Security in multicast routing in ad hoc network

Author keywords

Ad hoc network; Multicast; Secure communication; Security

Indexed keywords

APPLICATIONS; COMPUTER NETWORKS; ELECTRIC NETWORK TOPOLOGY; ELECTRONIC COMMERCE; MOBILE DEVICES; MULTICASTING; NETWORK ROUTING; RELIABILITY; ROUTING ALGORITHMS; TECHNOLOGY; TELECOMMUNICATION EQUIPMENT; TELEPHONE SYSTEMS; WIRELESS NETWORKS; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 51949111687     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICETET.2008.250     Document Type: Conference Paper
Times cited : (3)

References (10)
  • 2
    • 0036929565 scopus 로고    scopus 로고
    • Secure Multicast in Wireless Networks of Mobile Hosts: Protocols and Issues
    • Bruschi, D. and Rosti, E., "Secure Multicast in Wireless Networks of Mobile Hosts: Protocols and Issues", Mobile Networks and Applications, Volume 7, 2002, pp 503-511.
    • (2002) Mobile Networks and Applications , vol.7 , pp. 503-511
    • Bruschi, D.1    Rosti, E.2
  • 3
    • 0033356116 scopus 로고    scopus 로고
    • A Survey of Security Issues in Multicast Communication
    • Nov.-Dec
    • Moyer, M.J., Rao, J.R. and Rohatgi, P., "A Survey of Security Issues in Multicast Communication",IEEE Network, Nov.-Dec. 1999, pp. 12-23.
    • (1999) IEEE Network , pp. 12-23
    • Moyer, M.J.1    Rao, J.R.2    Rohatgi, P.3
  • 4
    • 84995289060 scopus 로고    scopus 로고
    • Scalable Multicast security with Dynamic Recipient Groups
    • August
    • Molva, R. and Pannetrat, A., "Scalable Multicast security with Dynamic Recipient Groups.",ACM Transaction on Information and System Security, Volume 3, No. 3, August 2000, pp. 136-160.
    • (2000) ACM Transaction on Information and System Security , vol.3 , Issue.3 , pp. 136-160
    • Molva, R.1    Pannetrat, A.2
  • 5
    • 0000367158 scopus 로고
    • Multicast security and its extension to a mobile environment
    • Gong, L. and Shacham, N., "Multicast security and its extension to a mobile environment", Wireless Networks, 1995, pp. 281-295.
    • (1995) Wireless Networks , pp. 281-295
    • Gong, L.1    Shacham, N.2
  • 6
    • 0042878478 scopus 로고    scopus 로고
    • Multicast over wireless networks
    • December
    • Varshney, U., "Multicast over wireless networks.", Communications of the ACM, Volume 45, No. 12, December 2002, pp. 31-37.
    • (2002) Communications of the ACM , vol.45 , Issue.12 , pp. 31-37
    • Varshney, U.1
  • 7
    • 1842815887 scopus 로고    scopus 로고
    • Security in Mobile Ad Hoc Networks: Challenges and Solutions
    • February
    • Yang, H., Luo, H., Ye, F., Lu, S., and Zhang, L., "Security in Mobile Ad Hoc Networks: Challenges and Solutions", IEEE Wireless Communications, Volume 11, Issue 1, February 2004, pp. 38-47.
    • (2004) IEEE Wireless Communications , vol.11 , Issue.1 , pp. 38-47
    • Yang, H.1    Luo, H.2    Ye, F.3    Lu, S.4    Zhang, L.5
  • 10
    • 84892591410 scopus 로고    scopus 로고
    • A Survey of Security Issues in Mobile Adhoc and Sensor Networks
    • Fourth Quarter
    • Djenouri, D., Khelladi, L., and Badache, N., "A Survey of Security Issues in Mobile Adhoc and Sensor Networks" , IEEE Communications survey and tutorials, Volume 7, No 4, Fourth Quarter 2005, pp. 1-27
    • (2005) IEEE Communications survey and tutorials , vol.7 , Issue.4 , pp. 1-27
    • Djenouri, D.1    Khelladi, L.2    Badache, N.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.