메뉴 건너뛰기




Volumn , Issue , 2010, Pages

A self-organized mechanism for thwarting malicious access in ad hoc networks

Author keywords

[No Author keywords available]

Indexed keywords

COLLUSION ATTACK; DYNAMIC NETWORK; NETWORK PARTITIONS; PERFORMANCE IMPROVEMENTS; SELF-ORGANIZED; THRESHOLD CRYPTOGRAPHY; USER ACCESS;

EID: 77953320587     PISSN: 0743166X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/INFCOM.2010.5462232     Document Type: Conference Paper
Times cited : (10)

References (8)
  • 1
    • 0033357103 scopus 로고    scopus 로고
    • Securing ad hoc networks
    • L. Zhou and Z. J. Haas, "Securing ad hoc networks," IEEE Network, vol. 13, no. 6, pp. 24-30, 1999.
    • (1999) IEEE Network , vol.13 , Issue.6 , pp. 24-30
    • Zhou, L.1    Haas, Z.J.2
  • 2
    • 30344446233 scopus 로고    scopus 로고
    • DICTATE: Distributed certification authority with probabilistic freshness for ad hoc networks
    • J. Luo, J.-P. Hubaux, and P. T. Eugster, "DICTATE: Distributed certification authority with probabilistic freshness for ad hoc networks," Trans. Dependable Secure Comput., vol. 2, no. 4, pp. 311-323, 2005.
    • (2005) Trans. Dependable Secure Comput. , vol.2 , Issue.4 , pp. 311-323
    • Luo, J.1    Hubaux, J.-P.2    Eugster, P.T.3
  • 3
    • 11244320485 scopus 로고    scopus 로고
    • URSA: Ubiquitous and robust access control for mobile ad hoc networks
    • Dec
    • H. Luo, J. Kong, P. Zerfos, S. Lu, , and L. Zhang, "URSA: Ubiquitous and robust access control for mobile ad hoc networks," IEEE/ACM Transactions on Networking, vol. 12, no. 6, pp. 1049-1063, Dec. 2004.
    • (2004) IEEE/ACM Transactions on Networking , vol.12 , Issue.6 , pp. 1049-1063
    • Luo, H.1    Kong, J.2    Zerfos, P.3    Lu, S.4    Zhang, L.5
  • 4
    • 0242678584 scopus 로고    scopus 로고
    • Self-organized public-key management for mobile ad hoc networks
    • Mar
    • S. Capkun, L. Buttyán, and J.-P. Hubaux, "Self-organized public-key management for mobile ad hoc networks," IEEE Transactions on Mobile Computing, vol. 2, no. 1, pp. 25-64, Mar. 2003.
    • (2003) IEEE Transactions on Mobile Computing , vol.2 , Issue.1 , pp. 25-64
    • Capkun, S.1    Buttyán, L.2    Hubaux, J.-P.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.