[1]
A Survey of Security for Mobile Ad Hoc NetWorks Ping Yi, Yichuan Jiang Acta Electronica Sinica 2005.5 893—899 in chinese
Google Scholar
[2]
Lidong Zhou , Zygmunt J Haas. Securing ad hoc networks [J ] . IEEE Networks Special Issue on Network Security ,1999 ,13 (6) :24 - 30.
DOI: 10.1109/65.806983
Google Scholar
[3]
Zheng Yan. Security in Ad Hoc Networks[ DB/ OL ] . http :/ / citeseer. nj. nec. com/ 536945. html.
Google Scholar
[4]
Lidong Zhou , Zygmunt J Haas. Securing ad hoc networks [ J ] . IEEE Networks Special Issue on Network Security ,1999 ,13 (6) :24 - 30.
DOI: 10.1109/65.806983
Google Scholar
[5]
Jean-Pierre Hubaux ,Levente Buttyan ,Srdjan Capkun. The quest for security in mobile Ad Hoc networks[A] . Proc of the 2001 ACM International Symposium on Mobile ad hoc networking &computing 2001[C] . Long Beach ,CA ,USA ,2001. 146 - 155.
DOI: 10.1145/501416.501437
Google Scholar
[6]
Srdjan Capkun ,Levente Nuttyan ,Jean-Pierre Hubaux. Self-organized public-key Management for mobile ad hoc networks[J ] . IEEE Transactions on mobile computing , January-March ,2003 ,2(1) :52 - 64.
DOI: 10.1109/tmc.2003.1195151
Google Scholar
[7]
Shamir A .How to Share a Secret Communications of the ACM 22,1979,612-613
DOI: 10.1145/359168.359176
Google Scholar
[8]
Fokine K. Key Management in Ad Hoc Networds LITH-ISY-EX-3322-2002,2002-09-28-
Google Scholar
[9]
Jean 2 Pierre Hubaux ,Levente Buttyan ,Srdjan Capkun. The quest for se 2 curity in mobile Ad Hoc networks[A] . Proc of the 2001 ACM Interna 2 tional Symposium on Mobile ad hoc networking &computing 2001[ C] .Long Beach ,CA ,USA ,2001. 146 - 155.
DOI: 10.1145/501416.501437
Google Scholar
[10]
Srdjan Capkun ,Levente Nuttyan ,Jean 2 Pierre Hubaux. Self 2 organized public 2 key Management for mobile ad hoc networks[J ] . IEEE Transac 2 tions on mobile computing ,January 2 March ,2003 ,2 (1) :52 - 64.
DOI: 10.1109/tmc.2003.1195151
Google Scholar