Lidong Zhou and Zygmunt J. hass, "Security Of Ad-Hoc Networks", IEEE Wireless comm ,1999 View Artical
HaoYang, HaiyunLuo, Fan Ye, S. Lu, L.Zhang, "Security In Mobile Ad-Hoc Networks: Challenges and Solutions", IEEE Wireless comm ,2004 View Artical
K. Park, N.Ansari, N. Kato, "Certificate Revocation To Cope With False Accusations In MANETS", Proc. IEEE 71st Vehicular Technology Conf ,2010 View Artical
H. Yang, J. Shu, X. Meng, and S. Lu, "SCAN: Self-Organized Network-Layer Security in Mobile Ad- Hoc Networks", IEEE J. Selected Areas in Comm ,Vol.24 ,2006 View Artical
HaiynLuo, PetrosZerfos, Songwulu, LixiaZhang, "URSA: Ubiquitous and Robust Access control for Mobile Ad- Hoc Network", IEEE/ ACM, Transactions on Networking ,2004 View Artical
L. Zhou, B. Cchneider, and R. Van Renesse, "COCA: A Secure Distributed Online Certificate Authority", ACM, Trans. Computer System ,Vol.20 ,2002 View Artical
H. Chan, V. Gligor, A. Perrig, and G. Muralidharan, "On the distribution and Revocation of Cryptography Keys In Sensor Networks", IEEE Trans. Dependable and Secure Computing ,Vol.2 ,2005 View Artical
B. Kannhavong, H. Nakayama, A. Jamalipour, Y. Nemoto, and N. Kato, "A Survey of Routing Attacks in MANET", IEEE Wireless comm. Magazine ,2007 View Artical
Jia Xu, Ning Jin, Xizhong Lou, Ting Peng, qian Zhou, YanminChen, "Improvement of LEACH protocols for WSN ,2012 View Artical
P. Sakarindr and N. Ansari, "Security services in Group Communications Over Wireless Infrastructure Mobile Ad Hoc, and Wireless S", IEEE Wireless Comm ,Vol.14 ,2007 View Artical
M. Hegland, E.Winjum, C. Rong, and P.Spilling, "A Survey of Key Management in Ad Hoc Networks", IEEE Comm. Surveys and Tutorials ,2006 View Artical
P. Yi, Z: Dai, Y. Zhong, and S.Zhang, "Resisting Flooding Attacks in Ad Hoc Networks", Proc, Int?l conf. Information Technology: Coding a ,2005 View Artical
W.Liu, H. Nishiyama, N. Ansari, and N. Kato, "A Study on Certificate Revocation in Mobile AdHoc Network", Proc. IEEE Int?l Conf. Comm. (ICC), ,2011 View Artical
S. Micali, "Efficient CERtificate Revocation", Massachusetts Inst. Of Technology, Cambridge, MA, ,1996 View Artical
J. Lian, K. Naik, and G.B. Agnew, "A Framework for evaluating the performance of Cluster Algorithms for Hierarchical Networks", IEEE/ACM Trans. Networking ,Vol.15 ,2007 View Artical
T. Camp, J. Boleng, and V. Davies, "A Survey of Mobility Models for Ad Hoc Network Research", Wireless Comm. And Mobile Computing (WCMC) Special ,Vol.2 ,2002 View Artical
Bo-Chao Cheng, His-HsunYeh, and Ping-Hai Hsu, "Schedulability Analysis for Network Lifetime Wireless Sensor Network with High Energy First Clusteri ,2011 View Artical
J. A. Stankovic and K. Ramamrithan, Eds, "Tutorial on Hard Real-Time Systems.", IEEE Computer Society Press ,1988 View Artical
R. Madan, C.Shuguang, S.LandA.Goldsmith, "Cross-layer design for lifetime maximization in interference-limited wireless sensor networks", IEEE Infocom ,2005 View Artical