期刊文献+

浅议Ad Hoc无线网络安全策略

Research on Security Schemes in Ad-Hoc Wireless Network
原文传递
导出
摘要 本文分析了Ad Hoc无线网络安全要求和安全策略,随后从分布式组密钥管理策略和分层分组式组密钥管理策略提出了Ad Hoc无线网络的安全策略。 This article has analyzed Ad the Hoc wireless network security request and the security policy,afterward proposed Ad from the distributional group key management strategy and the lamination grouping type group key management strategy the hoc wireless network security schemes.
作者 滕萍
出处 《网络安全技术与应用》 2011年第2期26-27,共2页 Network Security Technology & Application
关键词 AD HOC 无线网络 安全策略 Ad Hoc Wireless network Security schemes
  • 相关文献

参考文献4

二级参考文献28

  • 1麻晓园,陈前斌,李云.移动Adhoc网络中的密钥管理[J].通信技术,2003,36(10):121-123. 被引量:3
  • 2郭建锋,赵晓芳,陈鹏.基于Axis的Web服务认证模块的设计和实现[J].计算机应用研究,2004,21(12):290-292. 被引量:5
  • 3孙超,陈钢.基于Agent技术的统一身份认证系统[J].计算机应用研究,2005,22(3):138-140. 被引量:12
  • 4[1]Steve Graham.Building Web Services with Java[M] .北京:机械工业出版社,2003.19-79,94-96,233-262,288-331.
  • 5[2]Bilal Siddiqui.Web Services Security:PartⅠ- Ⅳ[EB/OL].http://webservices.xml.com/pub/a/ws/2003/03/04/security.html,2003-04.
  • 6[5]William Stallings.Cryptography and Network Security:Principles and Practices(Third Edition)[M].北京:电子工业出版社,2004.335-338.
  • 7[1]SHMIR A.Identity-based cryptosystems and signature schemes[C]// Proc of Cryptology-Crypto 84.CA:Springer-Verlag,1984:47-53.
  • 8[2]KHALILIi A,KATZ J.Toward secure key distribution in truly Ad-Hoc networks[C] //Proc of The Symposium on Applications and the Internet Workshops,Berlin:Springer-Verlag,2003:342-346.
  • 9[3]DENG H,MUKHERJEE A,AGRAWAL D P.Threshold and identity-based key management and authentication for wireless Ad Hoc networks[C]//Proc of IEEE International Conferences on Information Technology (ITCC04).2004:107-110.
  • 10[4]PEDERSEN T.A threshold cryptosystem without a trusted party[J].Computer Science.Berlin:Springer-Verlag,1991,547(10):522 -526.

共引文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部