[1]ZHOU L, HASS Z J. Securing Ad Hoc networks [J]. IEEE Network, Special Issue on Network Security,1999, 13(6): 24-30.[2]LUO H, ZEFROS P, KONG J, et al. Self-securing Ad Hoc wireless networks [C]// ISCC'02: Proceeding of the Seventh IEEE Symposium on Computers and Communications.Piscataway: IEEE Press, 2002: 548-555.[3]KONG J, ZEFROS P, LUO H, et al. Providing robust and ubiquitous security support for mobile Ad-Hoc networks [C]// ICNP'01: Proceeding of the 9th International Conference on Network Protocols. Piscataway: IEEE Press, 2001: 251-260.[4]LUO H, KONG J, ZERFOS P, et al. Ubiquitous and robust access control for mobile Ad Hoc networks [J]. ACM Transactions on Networking, 2004, 12(6): 1049-1063.[5]KHALILI A, KATZ J, ARBAUGH W A. Toward secure key distribution in truly Ad-Hoc networks [C]// SAINT'03: Proceedings of the Symposium on Applications and the Internet Workshops. Piscataway: IEEE Press, 2003: 342-346.[6]BONEH D, FRANKLIN M K. Identity-based encryption from the Weil pairing [J]. SIAM Journal of Computing, 2003, 32(3): 586-615.[7]DENG H, MUKHERJEE A, AGRAWAL D P. Threshold and identity-based key management and authentication for wireless Ad Hoc networks [C]// ITCC'04: Proceedings of 2004 International Conference on Information Technology: Coding and Computing. Piscataway: IEEE Press, 2004: 107-110.[8]杜春来,胡铭曾,张宏莉.在椭圆曲线域中基于身份认证的移动Ad Hoc密钥管理框架[J].通信学报,2007,28(12):53-59.[9]李慧贤,庞辽军,王育民.适合Ad Hoc网络无需安全信道的密钥管理方案[J].通信学报,2010,31(1):112-117.[10]谭乐,李婧婧,龙冬阳.基于组合公钥的移动自组网密钥管理方案[J].计算机工程,2009,35(10):132-134.[11]张玉臣,王亚弟,刘璟,等.Ad Hoc网络环境下分布式密钥管理[J].武汉大学学报:理学版,2009,55(1):85-88.[12]BONEH D, LYNN B, SHACHAM H. Short signatures from the Weil pairing[C]// Advances in Cryptology-Asiacrypt 2001, LNCS 2248. Berlin: Springer-Verlag, 2001: 514-532.[13]OSTROVSKY R, YUNG M. How to withstand mobile virus attacks [C] // Proceedings of the Tenth Annual ACM Symposium on Principles of Distributed Computing. New York: ACM Press, 1991: 51-59. |