메뉴 건너뛰기




Volumn , Issue , 2008, Pages 120-126

Authentication mechanisms for mobile Ad-hoc networks and resistance to sybil attack

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL; AUTHENTICATION; COMPUTER CRIME; MOBILE TELECOMMUNICATION SYSTEMS; TELECOMMUNICATION NETWORKS; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 55849097728     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SECURWARE.2008.68     Document Type: Conference Paper
Times cited : (26)

References (18)
  • 2
    • 0033357103 scopus 로고    scopus 로고
    • Securing Ad Hoc Networks
    • J. Z. Haas and L. Zhou, "Securing Ad Hoc Networks," IEEE Network, vol. 13, pp. 24-30, 1999.
    • (1999) IEEE Network , vol.13 , pp. 24-30
    • Haas, J.Z.1    Zhou, L.2
  • 3
    • 30344446233 scopus 로고    scopus 로고
    • DICTATE: Distributed CerTification Authority with probabilis Tic frEshness for Ad Hoc Networks
    • T. E. Patrick, "DICTATE: Distributed CerTification Authority with probabilis Tic frEshness for Ad Hoc Networks," IEEE Trans. Dependable Secur. Comput., vol. 2, pp. 311-323, 2005.
    • (2005) IEEE Trans. Dependable Secur. Comput , vol.2 , pp. 311-323
    • Patrick, T.E.1
  • 10
    • 33749611163 scopus 로고    scopus 로고
    • Bootstrapping security in mobile ad hoc networks using identity-based schemes with key revocation,
    • Technical Report CACR 2006-04, University of Waterloo, Canada
    • K. Hoeper and G. Gong, "Bootstrapping security in mobile ad hoc networks using identity-based schemes with key revocation," Technical Report CACR 2006-04, University of Waterloo, Canada.
    • Hoeper, K.1    Gong, G.2
  • 11
    • 11244320485 scopus 로고    scopus 로고
    • URSA: Ubiquitous and robust access control for mobile ad hoc networks
    • L. Haiyun, K. Jiejun, Z. Petros, Lu Songwu, and Z. Lixia, "URSA: ubiquitous and robust access control for mobile ad hoc networks," IEEE/ACM Trans. Networking, vol. 12, pp. 1049-1063, 2004.
    • (2004) IEEE/ACM Trans. Networking , vol.12 , pp. 1049-1063
    • Haiyun, L.1    Jiejun, K.2    Petros, Z.3    Lu, S.4    Lixia, Z.5
  • 15
    • 55849126078 scopus 로고    scopus 로고
    • Accessed on: 1st February, 2008
    • "Engage Packet Builder, http://www.engagesecurity.com/products/ engagepacketbuilder/, Accessed on: 1st February, 2008."
    • Engage Packet Builder
  • 16
    • 33749589405 scopus 로고    scopus 로고
    • K. Frank, S. Stefan, and W. Michael, Identification in Ad Hoc Networks, in Proceedings of the 39th Annual Hawaii International Conference on System Sciences - 09: IEEE Computer Society, 2006.
    • K. Frank, S. Stefan, and W. Michael, "Identification in Ad Hoc Networks," in Proceedings of the 39th Annual Hawaii International Conference on System Sciences - Volume 09: IEEE Computer Society, 2006.
  • 17
    • 33846626862 scopus 로고    scopus 로고
    • Multiple-key cryptography-based distributed certificate authority in mobile ad-hoc networks
    • presented at, IEEE
    • Z. Hongbo, M. W. Mutka, and L. M. Ni, "Multiple-key cryptography-based distributed certificate authority in mobile ad-hoc networks," presented at Global Telecommunications Conference, 2005. GLOBECOM '05. IEEE, 2005.
    • (2005) Global Telecommunications Conference, 2005. GLOBECOM '05
    • Hongbo, Z.1    Mutka, M.W.2    Ni, L.M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.