Ramanathan R and Redi J. A brief overview of mobile Adhoc networks: challenges and directions [J]. IEEECommunications Magazine, 2002, 40(5): 20-22.[2]Zhou Li-dong and Haas Z J. Securing Ad hoc networks [J].IEEE Networks Special Issue on Network Security, 1999, 13(6): 24-30.[3]Kong J J, Zerfos P, and Luo H Y, et al.. Providing robust andubiquitous security support for mobile Ad hoc networks [C].IEEE 9th International Conference on Network Protocols,Riverside, California, USA, 2001: 251-260.[4]Herzberg A, Jakobsson M, and Jarecki S, et al.. Proactivepublic-key and signature schemes [C]. Proc of the 4th AnnualConference on Computer Communications Security, Zurich,Switzerland, 1997: 100-110.[5]葛蒙, 赵曦滨, 林国恩. 适用于移动自组织网的鲁棒性密钥管理[J]. 清华大学学报(自然科学版), 2008, 48(7): 1194-1197.Ge Meng, Zhao Xi-bin, and Lam Kwok-yan. Robust keymanagement for mobile Ad hoc networks [J]. Journal ofTsinghua University (Science and Technology), 2008, 48(7):1194-1197.[6]王化群, 张力军, 赵君喜. Ad hoc网络中基于环Zn上椭圆曲线和RSA的密钥管理[J]. 通信学报, 2006, 27(3): 1-6.Wang Hua-qun, Zhang Li-jun, and Zhao Jun-xi. Keymanagement based on elliptic curves over the ring Zn andRSA in Ad hoc networks [J]. Journal on Communications,2006, 27(3): 1-6.[7]熊焰, 苗付友, 张伟超, 等. 移动自组网中基于多跳步加密签名函数签名的分布式认证[J]. 电子学报, 2003, 31(2): 161-165.Xiong Yan, Miao Fu-you, Zhang Wei-chao, et al.. Securedistributed authentication based on multi-hop signing withencrypted signature functions in mobile Ad hoc networks [J].Acta Electronica Sinica, 2003, 31(2): 161-165.[8]Pietro R D, Mancini L V, and Zanin G. Efficient andadaptive threshold signatures for Ad hoc networks [J].Electronic Notes in Theoretical Computer Science.2007,171(1):93-105[9]安辉耀, 卢锡城, 彭伟. 移动自组网中一种基于簇的多路径路由算法[J]. 软件学报, 2007, 18(4): 987-995.An Hui-yao, Lu Xi-cheng, and Peng Wei. A cluster-basedmultipath routing algorithm in mobile Ad hoc networks [J].Journal of Software, 2007, 18(4): 987-995.[10]Gerla M and Tsai J T C. Multicluster, mobile, multimediaradio network [J]. ACM/Baltzer Journal of WirelessNetworks, 1995, 1(3): 225-265.[11]Dong Y, and Sui Ai-fen, et al.. Providing distributedcertificate authority service in cluster-based mobile Ad hocnetworks [J].Computer Communications.2007, 30(11/12):2442-2452[12]Bechler M, Hof H J, and Kraft D, et al.. A cluster-basedsecurity architecture for Ad hoc networks [C]. Proc of the23rd IEEE INFOCOM'04, Hong Kong, China, 2004, 4:2393-2403.[13]Pedersen T. A threshold cryptosystem without a trustedparty[C]. Proceeding of Crypto 91, Brighton, UK, 1991:522-526.[14]Spiewak D and Fusenig V, et al.. The importance of locationon trust in mobile networks [J]. WSEAS Transactions onCommunications, 2008, 7(5): 349-360.
|