Tài liệu tham khảo |
Loại |
Chi tiết |
[1] S. Capkun, L. Buttyan, and J. Hubaux, “Sector: Secure Tracking of Node Encounters in Multi-hop Wireless Networks. Proc. of the ACM Workshop on Security of Ad Hoc and Sensor Networks,” 2003 |
Sách, tạp chí |
Tiêu đề: |
Sector: Secure Tracking of Node Encounters in Multi-hop "Wireless Networks. Proc. of the ACM Workshop on Security of Ad Hoc and Sensor Networks,” |
|
[2] H. Deng, W. Li, Agrawal, D.P., “Routing security in wireless ad hoc networks,” Cincinnati Univ., OH, USA; IEEE Communications Magazine, Oct. 2002, Volume: 40, page(s): 70- 75, ISSN: 0163-6804 |
Sách, tạp chí |
Tiêu đề: |
Routing security in wireless ad hoc networks,” |
|
[3] J.-P. HuBaux, L. Buttyan, and S. Capkun., “The quest for security immobile ad hoc network,” In Proc. ACM MOBICOM, Oct. 2001 |
Sách, tạp chí |
Tiêu đề: |
The quest for security immobile ad hoc network,” |
|
[4] H. Hsieh and R. Sivakumar, “Transport OverWireless Networks,” Handbook of Wireless Networks and Mobile Computing, Edited by Ivan Stojmenovic. John Wiley and Sons, Inc., 2002 |
Sách, tạp chí |
Tiêu đề: |
Transport OverWireless Networks,” |
|
[5] Y. Hu, A. Perrig, and D. Johnson, “Ariadne: A Secure On-Demand Routing for Ad Hoc Networks,”Proc. of MobiCom 2002, Atlanta, 2002 |
Sách, tạp chí |
Tiêu đề: |
Ariadne: A Secure On-Demand Routing for Ad Hoc Networks,” |
|
[6] Y. Hu, A. Perrig, and D. Johnson, “Packet Leashes: A Defense AgainstWormhole Attacks inWireless Ad Hoc Networks,” Proc. of IEEE INFORCOM, 2002 |
Sách, tạp chí |
Tiêu đề: |
“Packet Leashes: A Defense AgainstWormhole Attacks inWireless Ad "Hoc Networks,” |
|
[7] IEEE Std. 802.11i/D30, “Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Specification for Enhanced Security,” 2002 |
Sách, tạp chí |
Tiêu đề: |
“Wireless Medium Access Control (MAC) and Physical Layer (PHY) "Specifications: Specification for Enhanced Security,” |
|
[8] J. Kong et al., “Providing robust and ubiquitous security support for mobile ad-hoc networks,” In Proc. IEEE ICNP, pages 251–260, 2001 |
Sách, tạp chí |
Tiêu đề: |
Providing robust and ubiquitous security support for mobile ad-hoc networks,” |
|
[9] C. Kaufman, R. Perlman, and M. Speciner, “Network Security Private Communication in a Public World,” Prentice Hall PTR, A division of Pearson Education, Inc., 2002 |
Sách, tạp chí |
Tiêu đề: |
Network Security Private Communication in a Public "World,” |
|
[10] P. Kyasanur, and N. Vaidya, “Detection and Handling of MAC Layer Misbehavior in Wireless Networks,” DCC, 2003 |
Sách, tạp chí |
Tiêu đề: |
“Detection and Handling of MAC Layer Misbehavior in Wireless "Networks,” |
|
[11] P. Michiardi, R. Molva, “Ad hoc networks security,” IEEE Press Wiley, New York, 2003 |
Sách, tạp chí |
Tiêu đề: |
Ad hoc networks security,” |
|
[12] A. Perrig, R. Canetti, J. Tygar, and D. Song, “The TESLA Broadcast Authentication Protocol,”Internet Draft, 2000 |
Sách, tạp chí |
Tiêu đề: |
The TESLA Broadcast Authentication Protocol |
|
[16] H. Yang, H. Luo, F. Ye, S. Lu, L. Zhang, “Security in mobile ad hoc networks: challenges and solutions,” In proc. IEE Wireless Communication, UCLA, Los Angeles, CA, USA; volume- 11, Page(s) |
Sách, tạp chí |
Tiêu đề: |
Security in mobile ad hoc networks: challenges and "solutions,” |
|