3Yih-Chun Hu,Adrian Perrig,David B. Johnson. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks[J] 2005,Wireless Networks(1-2):21~38
二级参考文献11
1JOHNSON D B,MALTZ D,HU Y C.The dynamic source routing protocol for mobile ad hoc networks (DSR)[EB/OL].http://www.ietf.org/internet-drafts/draft-ietf-manet-dsr-10.txt,2005.
2HU Y C,PERRIG A,JOHNSON D B.Ariadne:a secure on-demand routing protocol for Ad hoc networks[A].Proceedings of the ACM Conference on Mobile Computing and Networking (Mobicom)[C].Westin Peachtree Plaza,2002.12-23.
3PAPADIMITRATOS P,HAAS Z.Secure routing for mobile Ad hoc networks[A].SCS Communication Networks and Distributed Systems(CNDS 2002)[C].San Antonio,TX,2002.27-31.
4ZAPATA M G.Secure ad hoc on-demand distance vector (SAODV)routing[EB/OL].http://ietfreport.isoc.org/idref/draft-guerrero-manetsaodv/.2005-07.
5PAPADIMITRATOS P,HAAS Z J.Secure link state routing for mobile ad hoc networks[EB/OL].http://people.ece.cornell.edu/haas/wnl/Publications/saahn03.pdf.2005.
6HU Y C,JOHNSON D B,PERRIG A.SEAD:secure efficient distance vector routing for mobile wireless ad hoc networks[J].Ad hoc Networks,2003,1(1):175-192.
7BUTTYAN L,VAJDA I.Towards provable security for ad hoc routing protocols[A].Proceedings of the 2nd ACM Workshop on Security of ad hoc and Sensor Networks[C].2005.
8MARSHALL J.An Analysis of the Secure Routing Protocol for Mobile ad hoc Network Route Discovery:Using Intuitive Reasoning and Formal Verfication to Identify Flaws[D].Florida:Florida State University,2003.
9THAYER F J,HERZOG J C,GUTTMAN J D.Strand spaces:why is asecurity protocol correct?[A].Proceedings of the 1998 IEEE Symposium on Security and Privacy[C].Los Alamitos:IEEE Computer Society Press,1998.160-171.
10THAYER F J,HERZOG J C,GUTTMAN J D.Strand spaces:proving security protocols correct[J].Journal of Computer Security,1999,7(2-3):191-230.