期刊文献+

移动Ad hoc空间网络的安全管理

Security Management of the Mobile Ad hoc Space Network
下载PDF
导出
摘要 由于移动Ad hoc空间网络自身资源的限制,使其需要一系列安全保障技术支持,尤其是军事、紧急救灾等场合。本文从密钥管理以及入侵检测两方面分析了现阶段各方案的优缺点。 Mobile Ad hoc space network due to its own resource constraints, so, it requires a series of security of technical support, in particular the military, emergency disaster relief and other occasions. In this paper, the key management and intrusion detection analysis of both the advantages and disadvantages of each program at the current stage are analyzed.
作者 王媛媛
出处 《办公自动化(综合月刊)》 2009年第11期36-37,共2页 Office Informatization
关键词 移动AD hoc空间网络 密钥管理 入侵检测 Mobile Ad hoc space network Key management Intrusion detection
  • 相关文献

参考文献5

二级参考文献37

  • 1Zhou L,Haas Z J.Securing Ad hoc Networks.IEEE Networks,1999,13(6):24~30 被引量:1
  • 2Desmedt Y.Threshold cryptography.European Transactions on Telecommunications,1994,5(4):449~457 被引量:1
  • 3Luo H,Zerfos P,Kong J,et al.Self-securing Ad Hoc Wireless Networks.In:7th IEEE Symp on Computers and Communications,2002.567~574 被引量:1
  • 4Luo H,Lu S.Ubiquitous and Robust Authentication Services for Ad Hoc Wireless Networks:[ UCLA-CSD-TR-200030].2000http://www.cs.ucla.edu/wing/publication/papers/Luo.TR200030.pdf 被引量:1
  • 5Hubaux J P,Buttyan L,Capkun S.Self-organized Public-Key Management for Mobile Ad hoc Networks.In:IEEE Transactions on Mobile Computing,2003.52~64 被引量:1
  • 6Hubaux J P,Buttyan L,Capkun S.The Quest for Security in Mobile Ad hoc Networks.http://www.gta.ufrj.br/~eric/tese/ar tigos/Quest ForSecurityInMobileAdhocNetworks.pdf 被引量:1
  • 7Khalili A,Katz J,Arbaugh W A.Towards Secure Key Distribution in Truly Ad Hoc Networks.In:Proc.of IEEE Workshop on Security and Assurance in Ad hoc Networks,2003.http://www.gta.ufrj.br/~eric/tese/artigos/id_threshold.ps.gz 被引量:1
  • 8Li Guangsong,Han Wenbao.A New Scheme for Key Management in Ad Hoc Networks.In:Proceeding of 4th International Conference on Networking,LNCS 3421,2005.242~249 被引量:1
  • 9Zhang Y,Lee W,Huang Y.Intrusion Detection Techniques for Mobile Wireless Networks.ACM/Kluwer Wireless Networks Journal,2003.545~556 被引量:1
  • 10Boyen X.Multipurpose Identity-Based Signcryption:A Swiss Army Knife for Identity-Based Cryptography.In:Proceedings of Crypto '03,LNCS 2729,2003.383~399 被引量:1

共引文献27

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部