|
[1]B. Aziz, E. Nourdine and E. K. Mohamed, “A Recent Survey on Key Management Schemes in MANET,” in Proceedings of the 3rd International Conference of Information and Communication Technologies, pp. 1-6, Apr. 2008. [2]M. Bechler, H.J Hof, D. Kraft, F. Pahlke, and L. Wolf, “A Cluster-Based Security Architecture for Ad-hoc Networks,” in Proceedings of the 20th Annual Joint Conference of the IEEE Computer and Communications Societies, Vol. 4, pp. 2383-2403, Mar. 2004. [3]J. Bound and P. Roque, “IPv6 Anycasting Service: Minimum Requirements for End Nodes,” IETF Internet Draft, draft-bound-anycast-00.txt, Jun. 1996. [4]C. Carter, S. Yi, P. Ratanchandani, and R. Kravets, “Manycast Exploring the Space Between Anycast and Multicast in Ad-hoc Networks,” in Proceedings of the 9th Annual International Conference on Mobile Computing and Networking, pp. 273-286, Sep. 2003. [5]S. C. Chen, C. R. Dow, S. K. Chen, J.H. Lin, and S.F. Hwang, “An Efficient Anycasting Scheme in Ad-hoc Wireless Networks,” in Proceedings of the Consumer Communications and Networking Conference, pp. 178-183, Jan. 2005. [6]A. Conta and S. Deering, “Internet Control Message Protocol (ICMPv6) for the Internet Protocol Version 6 (IPv6) Specification,” RFC 2463, Dec. 1998. [7]Y. Desmedt and Y. Frankel, “Threshold Cryptosystems,” in Proceedings of Advances in Cryptography, pp. 307-315, Jul. 1989. [8]C. R. Dow, C. J. Li, S. C. Chen, and S. F. Hwang, “An Efficient Anycast Scheme for Discovering K Services in Wireless Ad-hoc Networks,” in Proceedings of 12th Mobile Computing Workshop, Mar. 2006. [9]P. Hsuan, C. R. Dow, S. C. Chen, S. F. Hwang, and S. K. Chen “Design and Implementation of IPv6 based Anycast System for Mobile Ad-hoc Networks,” Journal of Internet Technology , Vol. 9, No. 3, Aug. 2008. [10]P. S. Gemmell, “An Introduction to Threshold Cryptography,” RSA Laboratories’ CryptoBytes, Vol. 2, No. 3, pp. 7-11, 1997. [11]G. C. Hadjichristofi, W. J. Adams, and N. J. Davis IV, “A Framework for Key Management in Mobile Ad-hoc Networks,” in Proceedings of International Conference on Information Technology: Coding and Computing, Vol. 2, pp. 568-573, Apr. 2005. [12]A. Z. Ghalwash, A. A. A. Youssif, S. H. Hashad and R. Doss, “Self Adjusted Security Architecture for Mobile Ad Hoc Networks(MANETs),” in Proceedings of the 6th International Conference on Computer and Information Science, pp. 682 - 687, Jul. 2007. [13]R. Hinden and S. Deering, “IP Version 6 Addressing Architecture,” RFC 2373, Jul. 1998. [14]Y. Kim, D. Mazzocchi, and G. Tsudik, “Admission Control in Peer Groups,” in Proceedings of 2nd IEEE International Symposium of Network Computing and Applications, pp. 131-139, Apr. 2003. [15]H. Miura and M. K. Yamamoto, “Server Selection Policy in Active Anycast,” IEICE Transaction on Communication, Vol. E84.B, No. 10, Oct. 2001. [16]A. Nakaniwa, H. Niimi, K. Inui, H. Ebara, and H. Okada, “Server and Route Selection Method for QoS-based Anycast Protocol,” in Proceedings of the 2003 IEEE Global Telecommunications Conference, Vol. 6, pp. 3063-3067, Dec. 2003. [17]M. OE and S. Yamagugi, “Implementation and Evaluation of IPv6 Anycast,” in Proceeding of 10th Annual Internet Society Conference, Jul. 2000. [18]C. Partridge, T. Mendez, and W. Milliken, “Host Anycasting Service,” RFC 1546, Nov. 1993. [19]A. Shamir, “How to Share a Secret,” Communications of the ACM, Vol. 22, No. 11, pp. 612-612, Nov. 1979. [20]S. Weber and C. Liang, “A Survey of Anycast in IPv6 Networks,” IEEE Communications Magazine, Vol. 42, No. 1, pp. 127-132, Jan. 2004. [21]B. Wu and J. Wu, “k-anycast Routing Schemes for Mobile Ad-hoc Networks,” in Proceedings of the 20th International of Parallel and Distributed Processing Symposium, Apr. 2006. [22]Y. S. Yen, C. C. Hsu, and H. C. Chao, “Distributed Balancing with Application-layer Anycast for Home Agent Discovery on the Mobile IPv6,” in Proceedings of the 2005 International Conference of Wireless Networks, Communications and Mobile Computing, Vol. 2, pp. 1277-1282, Jun. 2005. [23]S. Yi and R. Kravets, “MOCA: Mobile Certificate Authority for Wireless Ad-hoc Networks,” in Proceedings of the 2nd Annual PKI Research Workshop, Apr. 2003. [24]S. Yu, W. Zhou, and Y. Wu, “Research on Network Anycast,” in Proceedings of the 5th International Conference of Algorithms and Architectures for Parallel Processing, pp. 154-161, Oct. 2002 [25]L. Zhou and Z. J. Haas. “Securing Ad-hoc Networks,” IEEE Network, Vol. 13 Issue 6, Nov. 1999. [26]Shamir’s Secret Sharing Scheme: http://point-at-infinity.org/ssss/ [27]OpenSSL Project: http://www.openssl.org/
|