메뉴 건너뛰기




Volumn , Issue , 2002, Pages 567-574

Self-securing ad hoc wireless networks

Author keywords

[No Author keywords available]

Indexed keywords

AD HOC WIRELESS NETWORKS; AUTHENTICATION SERVICES; CERTIFICATION SERVICES; DENIAL OF SERVICE ATTACKS; DISTRIBUTED AUTHENTICATION; HIERARCHICAL NETWORK; INFRASTRUCTURELESS; MOBILE AD HOC NETWORKING;

EID: 84883869163     PISSN: 15301346     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ISCC.2002.1021731     Document Type: Conference Paper
Times cited : (306)

References (24)
  • 2
    • 0033314753 scopus 로고    scopus 로고
    • An overview of PKI trust models
    • Nov.-Dec.
    • R. Perlman, "An overview of PKI trust models", IEEE Network, p. 38-43, vol. 13, (no. 6) Nov.-Dec. 1999
    • (1999) IEEE Network , vol.13 , Issue.6 , pp. 38-43
    • Perlman, R.1
  • 4
    • 0034546898 scopus 로고    scopus 로고
    • Intrusion detection in wireless ad hoc networks
    • Y. Zhang and W. Lee, "Intrusion detection in wireless ad hoc networks, " ACM MOBICOM, 2000
    • (2000) ACM MOBICOM
    • Zhang, Y.1    Lee, W.2
  • 5
    • 0003237987 scopus 로고    scopus 로고
    • The Kerberos network authentication service (version 5)
    • J. Kohl and B. Neuman, "The Kerberos network authentication service (version 5), " RFC-1510
    • RFC-1510
    • Kohl, J.1    Neuman, B.2
  • 8
    • 0027617271 scopus 로고
    • Increasing availability and security of an authentication service
    • Jun.
    • L. Gong, "Increasing availability and security of an authentication service, " IEEE Journal on Selected Areas in Communications, Vol. 11, No. 5, Jun. 1993
    • (1993) IEEE Journal on Selected Areas in Communications , vol.11 , Issue.5
    • Gong, L.1
  • 15
    • 0030415891 scopus 로고    scopus 로고
    • Security on the move: Indirect authentication using Kerberos
    • A. Fox and S. Gribble, "Security on the move: Indirect authentication using Kerberos, " ACM MOBICOM, 1996
    • (1996) ACM MOBICOM
    • Fox, A.1    Gribble, S.2
  • 16
    • 0033357103 scopus 로고    scopus 로고
    • Securing ad hoc networks
    • L. Zhou and Z. J. Haas. "Securing ad hoc networks, " IEEE Networks, 13(6):24-30, 1999
    • (1999) IEEE Networks , vol.13 , Issue.6 , pp. 24-30
    • Zhou, L.1    Haas, Z.J.2
  • 18
    • 0034541756 scopus 로고    scopus 로고
    • Mitigating routing misbehavior in mobile ad hoc networks
    • S. Marti, T. Giuli, K. Lai and M. Baker, "Mitigating routing misbehavior in mobile ad hoc networks, " ACM MOBICOM, 2000
    • (2000) ACM MOBICOM
    • Marti, S.1    Giuli, T.2    Lai, K.3    Baker, M.4
  • 20
    • 0008144151 scopus 로고    scopus 로고
    • Ubiquitous and robust authentication services for ad hoc wireless networks
    • Technical Report 200030, Oct.
    • H. Luo and S. Lu, "Ubiquitous and robust authentication services for ad hoc wireless networks, " UCLA Computer Science Technical Report 200030, Oct. 2000
    • (2000) UCLA Computer Science
    • Luo, H.1    Lu, S.2
  • 21
    • 4944253148 scopus 로고    scopus 로고
    • Maintaining authenticated communication in the presence of break-ins
    • R. Canetti, S. Halevi, and A. Herzberg, "Maintaining authenticated communication in the presence of break-ins, " Journal of Cryptology, 13(1):61-105, 2000
    • (2000) Journal of Cryptology , vol.13 , Issue.1 , pp. 61-105
    • Canetti, R.1    Halevi, S.2    Herzberg, A.3
  • 23
    • 84883897255 scopus 로고    scopus 로고
    • Standard Performance Evaluation Corporation
    • Standard Performance Evaluation Corporation, http://www. specbench. org


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.