|
[ 1 ]Dan Boneh ,Matthew Franklin “Identity-Based Encryption from the Weil Pairing”Crypto 2001, LNCS 2139 [ 2 ]Muhammad Bohio, Ali Miri “AUTHENTICATED SECURE CMMUNICATIONS IN MOBILE AD HOC NETWORKS” Page 1 CCECE 29-CCGEI 29, Niagara Falls, May/mai 2004 [ 3 ] EM Belding-Royer “Multi-Level Hierarchies for Scalable Ad hoc Routing” Wireless Networks, 28 – Springer [ 4 ]Muhammad Bohio, Ali Miri, “An Authenticated Broadcasting Scheme for Wireless Ad hoc Network” Electrical and Computer Engineering, 2004. Canadian [ 5 ]Balfanz, D. Durfee, G. Shankar, N. Smetters, D. Staddon, J. Hao-Chi Wong “Secret Handshakes from Pairing-Based Key agreements” Security and Privacy, 2003. Proceedings. 2003 Symposium on [ 6 ]Stefano Campadello “Peer-to-Peer Security in Mobile Devices: a User Perspective” Proceedings of the Fourth International Conference on Peer-to-Peer Computing, 2004 [ 7 ]Luiz A. DaSilva, Scott F. Midkiff, Jahng S. Park, George C. Hadjichristofi, and Nathaniel J. Davis, Virginia “Network Mobility and Protocol Interoperability in Ad Hoc Networks” IEEE Communications Magazine • November 2004 [ 8 ]E. Damiani S. De Capitani di Vimercati S. Paraboschi P. Samarati “Managing and Sharing Servents'' Reputations in P2P Systems” IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2003 [ 9 ]H Deng,D P Agrawal.”TIDS:threshold and identity-based security scheme for wireless ad hoc networks”.IEEE Ad Hoc Networks,2004;2 : 291 ∼307 [ 10 ]Hongmei Deng, Anindo Mukherjee, and Dharma P. Agrawal “Threshold and Identity-based Key Management and Authentication for Wireless Ad Hoc Networks” Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC’04) [ 11 ]Klas Fokine “Key Management in Ad Hoc Networks” Key Management in Ad Hoc Networks, ISRN LITH-ISY-EX-3322-27 [ 12 ]Md. Shariful Islam, Matei Ciobanu Morogan “Efficient Key Management Scheme for Mobile Ad Hoc Network” Efficient Key Management Scheme for Mobile Ad Hoc Network [ 13 ]Aram Khalili, Jonathan Katz, William A. Arbaugh “Toward Secure Key Distribution in Truly Ad-Hoc Networks ” Proceedings of the 2003 Symposium on Applications and the Internet Workshops(SANINT-w’03) [ 14 ]J Kong, P Zerfos, H Luo, S Lu, L Zhang “Providing Robust and Ubiquitous Security Support for Mobile Ad-Hoc Networks” 2001 International Conference on Network Protocols ICNP, 2001 [ 15 ]SL Keoh, E Lupu, M Sloman “PEACE: A Policy-based Establishment of Ad-hoc Communities” Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC''04) - Volume 00 [ 16 ]Kong, J., Zerfos, P.,Luo,H., Lu, S., Zhang, L.”Providing Robust and Ubiquitous Security Support for MANET”, IEEE 9th International Conference on Network Protocols (ICNP).(2001) [ 17 ]Haiyun Luo, Member, IEEE, Jiejun Kong, Student Member, IEEE, Petros Zerfos, Student Member, IEEE, Songwu Lu, Member, IEEE, and Lixia Zhang, Senior Member, IEEE “URSA: Ubiquitous and Robust Access Control for Mobile Ad Hoc Networks” IEEE/ACM TRANSACTIONS ON NETWORKING 2004 [ 18 ]Keun-Ho Lee, Heyi-Sook Sub, Sang-Bum Han, SangKeun Lee, Chong-Sun Hwang “An Authentication Protocol Based on CBRP in Ad Hoc Network” Advanced Communication Technology, 29. The 6th International Conference on [ 19 ]Kristin Lauter, Microsoft Corporation, “THE ADVANTAGES OF ELLIPTIC CURVE CRYPTOGRAPHY FOR WIRELESS SECURITY” IEEE Wireless Communications Feb 2004 [ 20 ]B Lu, UW Pooch “A Lightweight Authentication Protocol for Mobile Ad Hoc Networks” Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC''05) - Volume II - Volume 02 [ 21 ]William D. Neumann “HORSE: An Extension of an r-Time Signature SchemeWith Fast Signing and Verification” Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC’04) [ 22 ]A Perrig, R Canetti, JD Tygar, D Song “The TESLA Broadcast Authentication Protocol” RSA CryptoBytes, 2002 [ 23 ]N. Ruangchaijatupon and P. Krishnamurthy “Encryption and Power Consumption in wireless LANs” Third IEEE Workshop on Wireless LANs, Newton, Massachusetts, 2001 [ 24 ]Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi “Admission Control in PeertoPeer: Design and Performance Evaluation ” 2003 ACM [ 25 ]Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi “Experimenting with Admission Control in P2P” Computer Security in the 21st Century, Springer, 2005 [ 26 ]Adi Shamir, SangKeun Lee, Chong-Sun Hwang “How to Share a Secret” 1979 ACM [ 27 ]Maria Striki, John S. Baras “Towards Integrating Key Distribution with Entity Authentication for Efficient, Scalable and Secure Group Communication in MANETs” IEEE Communications Society,2004 [ 28 ]Z Swiderski “Content Control in Multimedia Applications” Conference on Human Factors in Computing Systems, 26 [ 29 ]Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi, “Identity-based Access Control in Ad Hoc Groups”, Proceedings of the 2004International Workshop on Hot Topics in Peer-to-Peer Sysytems (HOT-P2P’04) [ 30 ]Dimitrios Tsesmetzis, Manolis Solidakis, Vassilios Stathopoulos, Nikolaos Mitrou “Distributed Search in P2P Networks through Secure-Authenticated Content Management Systems(CMSs)” Proceedings of the Fourth International Conference on Peer-to-Peer Computing, 2004 [ 31 ]B Wu, J Wu, EB Fernandez, S Magliveras “Secure and Efficient Key Management in Mobile Ad Hoc Networks ” 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS''05) - Workshop 17 p. 288a [ 32 ]Bin Xie ,Anup Kumar “A Framework for Integrated Internet and Ad hoc Network Security ” 2004 IEEE [ 33 ]Bo Xing “Power Consumption of Security Measures in Mobile Devices” ICS243G-Network and Computer Security [ 34 ]Hao Yang, Haiyun Luo, Fan Ye, Songwu Lu, and Lixia Zhang ,“SECURITY IN MOBILE AD HOC NETWORKS: CHALLENGES AND SOLUTIONS ” IEEE Wireless Communications , February 2004 [ 35 ]Eun-Jun Yoon, Eun-Kyung Ryu, and Kee-Young Yoo “Further Improvement of an Efficient Password Based Remote User Authentication Scheme Using Smart Cards” IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2004 [ 36 ]Stephen S. Yau and Xinyu Zhang, “A Middleware Service for Secure Group Communication in Mobile Ad Hoc Networks” Computer Software and Applications Conference, 2003. COMPSAC [ 37 ]Yanchao Zhang, Wenjing Lou, Yuguang Fang “SIP: A Secure Incentive Protocol against Selfishness in Mobile Ad Hoc Networks ” WCNC 2004 / IEEE Communications Society [ 38 ]Muxiang ZHANG “Further Analysis of Password Authenticated Key Exchange Protocol Based on RSA for Imbalanced Wireless Networks” Applied Cryptography and Network Security: Second International Conference, ACNS 2004 Yellow Mountain, China, June 8-11, 29. Proceedings [ 39 ]Sencun Zhu, Sanjeev Setia, Shouhuai Xu Sushil Jajodia “GKMPAN: An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks” Proceedings of the First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services(MobiQuitous’04) [ 40 ]L Zhou, ZJ Haas “Securing Ad Hoc Networks” IEEE NETWORK, 1999 [ 41 ]F Zhu, M Mutka, L Ni “Facilitating secure ad hoc service discovery in public environment” COMPSAC-NEW YORK-, 28 [ 42 ]賴溪松、韓亮、張真誠 ,”近代密碼學及其應用” ,近代密碼學及應用 P14-10~14—16 [ 43 ]劉興華、黃景彰,”執行權管制系統的設計標準—ISO/IEC 1211-3介紹”, http://www.iicm.org.tw/communication/c2_3/page04.doc [ 44 ]”移動自組織網路:無需基礎設施的點對點通信 ”, http://www.gzit.gov.cn/_webnews/view.asp?id=XW21465143172147 [ 45 ]“The Gnutella Protocol Specification v0.4 Document Revision .2“ , http://www.clip2.com [ 46 ]Dr. Gene Tsudik ,Jeong H. Yi, Nitesh Saxena,”Peer Group Admission Control”http://sconce.ics.uci.edu/gac/ [ 47 ]Robert H''obbes'' Zakon,” Hobbes'' Internet Timeline v4.0”, http://www.zakon.org/robert/internet/timeline/HIT-big5.html
|