Author:
Yongfei Ye,Minghe Liu,Xinghua Sun,Xiao Zhang
Reference6 articles.
1. Y. Hu, A. Perrig, and D. Johnson. Ariadne. A Secure On-demand Routing Protocol for Ad Hoc Networks [J]. ACM MOBICOM, 2005, (1): 21–38.
2. Venkatramaman Lakshmi, Arrival Dharma P. Strategies for enhancing routing security in protocols for mobile ad hoc networks [J]. Journal of Parallel and Distributed Computing, 2003, 63(2): 214–227.
3. Zapata M Z, Asokan N. Securing Ad-Hoc Routing Protocols [A]. In: Proc. of the 2002 ACM Workshop on Wireless Security (WiSe2002) [C]. Singapore: IEEE Computer Society Press, 2002. 1–10.
4. Shamir A. How to Share a Secret [J]. Communications of the ACM, 1979, 24(11): 612–613.
5. Zhou L, Haas Z J. Securing Ad Hoc Networks [J]. IEEE Network, 1999, (13): 24–30