期刊文献+

一种双频混合无线自组网的设计与实现

下载PDF
导出
摘要 通过双频设计分别负责发送和接收使数据,使自组网的传输效率得以较大提高,通过自组网和有中心网络的混合组网,使得网络的组网规模和系统抗毁性均有较大提高。
出处 《计算机光盘软件与应用》 2014年第9期287-288,共2页 Computer CD Software and Application
  • 相关文献

参考文献1

二级参考文献15

  • 1李光松,韩文报.基于签密的Ad Hoc网络密钥管理[J].计算机工程与应用,2005,41(12):160-164. 被引量:7
  • 2Zhou L,Haas Z J.Securing Ad hoc networks[J].IEEE Networks Special Issue on Network Security, 1999, 13(6) :24-30.
  • 3Luo H,Zerfos P,Kong J.Self-securing Ad hoc wireless networks[C]// 7th IEEE Syrup on Computers and Commtmications,2002: 567-574.
  • 4Hubaux J P,Buttyan L,Capkun S.The quest for security in mobile Ad hoc networks[C]//Proc of the 2001 ACM International Symposium on Mobile Ad hoc Networking & Computing 2001, Long Beach,CA,USA,2001 : 146-155.
  • 5Yi S, Kravets R.Composite key management for ad hoc networks[C]//Proeeedings of the First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, 2004.
  • 6Khalili A, Katz J, Arbaugb W A.Towards secure key distribution in. truly Ad hoc networks[DB/OL]. (2003).http://www.gta. ufrj.br/-eric/tese/artigos/id.
  • 7Deng H, Mukherjee A, Agrawal D, Threshold and identity-based key management and authentication for wireless Ad hoc networks[C]// Proceedings of the International Conference on Information Technology:Coding and Computing(ITCC) ,2004: 107-111.
  • 8Zhang Chuan-rong,Xiao Hong,Threshold key management protocol in mobile Ad hoc networks using an /D-based signcryption scheme[C]//International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery,2009.
  • 9Cha J, Cheon J.An identity-based signature from gap Diffie-Hellman groups[C]//LNCS 2567: International Workshop on Practice and Theory in Public Key Cryptography.[S.l.]:Springer-Verlag, 2003 : 18-30.
  • 10Boneh D, Franklin M.Identity based encryption from the weil pairing[C]//LNCS 2139: Proceedings of Crypto' 01.[S.l.] : Springer- Verlag, 2001:213-229.

共引文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部