Application of Certificate Chaining in Key Management of Ad Hoc Network
(1.The Department of Computer Teaching of Hunan Normal University,Changsha 410007,China;2.Institute of Information Management and Engineering of Jishou University,Zhangjiajie 427000,Hunan China)
[1] ZHOU Li-dong,ZYGMUNT J HAAS.Securing Ad Hoc Networks [J].IEEE Network Magazine,1999,13(6):24-30.[2] LUO H,ZERFOS P,KONG J,et al,Self-Securing Ad Hoc Wireless Networks [A].the Seventh IEEE Symposium on Computers and Communications (ISCC'02) [C].Italy:IEEE Computer Society,2002.567-574.[3] SRDJAN CAPKUN,LEVENTE BUTTYAN,JEAN-PIERRE Hubaux,Self-Organized Public-Key Management for Mobile Ad Hoc Networks [J].IEEE Transaction on Mobile Computer,2003,2(1):54-56.[4] 沈颖.基于WMANET安全机制分析 [M].Netinfo Security,2004.[5] YI S,KRAVETS R.Composite Key Management for Ad Hoc Networks [R].MobiQuitous:IEEE Computer Society,2004.[6] SHAMIR A.How to Shar a Secret [J].Assoc Comput Mach.,1979,22(11):612-163.[7] 郑少仁,王海涛.Ad Hoc网络技术 [M].北京:人民邮电出版社,2005.[8] 郑相全.无线自组网技术实用教程 [M].北京:清华大学出版社,2004.