메뉴 건너뛰기




Volumn 2, Issue , 2004, Pages 787-790

Secure cluster based routing protocol incorporating the distributed PKI mechanisms

Author keywords

[No Author keywords available]

Indexed keywords

MESSAGE TRANSFER; PUBLIC KEY INFRASTRUCTURE (PKI); ROUTER REQUEST; ROUTING PROTOCOLS;

EID: 8744300676     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (7)

References (11)
  • 1
    • 8744238870 scopus 로고    scopus 로고
    • CBRP: Cluster based routing protocol
    • draft-ietfmanet-ietf-spec-01.txt, Tay, 14, August
    • Mingliang Jiang, Jinyang Li, Y. C., "CBRP:Cluster Based Routing Protocol," Internet Draft, MANET Working Group, draft-ietfmanet-ietf-spec- 01.txt, pp. 11-15, Tay, 14, August, 1999.
    • (1999) Internet Draft, MANET Working Group , pp. 11-15
    • Jiang, M.1    Jinyang Li, Y.C.2
  • 3
    • 0032621035 scopus 로고    scopus 로고
    • A review of current routing protocols for ad hoc mobile wireless networks
    • Apr.
    • E.. M. Royer, C. -K. Toh, "A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks," IEEE Personal Communications, Apr. 1999, pp. 46-55.
    • (1999) IEEE Personal Communications , pp. 46-55
    • Royer, E.M.1    Toh, C.K.2
  • 4
    • 1542356506 scopus 로고    scopus 로고
    • The dynamic source routing protocol for mobile ad hoc networks (DSR)
    • draft-ietf-manet-dsr-07.txt, Feb.
    • D. B. Johnson et al., "The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks (DSR)," IETF Internet Draft MANET Working Group, draft-ietf-manet-dsr-07.txt, Feb. 2002.
    • (2002) IETF Internet Draft MANET Working Group
    • Johnson, D.B.1
  • 5
  • 6
    • 0242678584 scopus 로고    scopus 로고
    • Self-organized public key management for mobile ad hoc networks
    • Jan-March
    • Srdjan Capkun, Levente Buttyan, Jean Pierre Hubaux, "Self-Organized Public Key Management for Mobile Ad Hoc Networks," IEEE Transactions of Mobile Computing, Vol.2, No.l, Jan-March, 2003.
    • (2003) IEEE Transactions of Mobile Computing , vol.2 , Issue.50
    • Capkun, S.1    Buttyan, L.2    Hubaux, J.P.3
  • 7
    • 0033357103 scopus 로고    scopus 로고
    • Securing ad hoc networks
    • Nov. /Dec.
    • L. Zhou, Z. Haas, "Securing Ad Hoc Networks", IEEE Network, Vol.13, No.6, pp.24-30, Nov. /Dec. 1999.
    • (1999) IEEE Network , vol.13 , Issue.6 , pp. 24-30
    • Zhou, L.1    Haas, Z.2
  • 10
    • 0035704362 scopus 로고    scopus 로고
    • Providing robust and ubiquitous security supports for mobile ad hoc networks
    • Nov.
    • Jiejun Kong, Petros Zerfos, Haiyun Luo, Songwe Lu, Lixia Zhang, "Providing Robust and ubiquitous Security Supports for Mobile Ad Hoc Networks", lEEEProc. ICNP, pp.251-260, Nov. 2001.
    • (2001) LEEEProc. ICNP , pp. 251-260
    • Kong, J.1    Zerfos, P.2    Luo, H.3    Lu, S.4    Zhang, L.5
  • 11
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir, "How to Share a Secret", Communications of the ACM, 22(11):612-613,1979
    • (1979) Communications of the ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.