JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE) ›› 2018, Vol. 53 ›› Issue (7): 51-59.doi: 10.6040/j.issn.1671-9352.2.2017.258
Previous Articles Next Articles
CUI Zhao-yang, SUN Jia-qi, XU Song-yan, JIANG Xin
CLC Number:
[1] 刘昕. 军用无人机自组网技术研究[D]. 南京:南京理工大学,2014. LIU Xin. Study of MANET for military UAVs[D]. Nanjing: Nanjing University of Science and Technology, 2014. [2] 王东,张广政,穆武第.多无人机协同作战通信自组网技术[J].飞行导弹,2012,22(1):59-63. WANG Dong, ZHANG Guangzheng, MU Wudi. Ad Hoc technology of Multi-UAV collaborative communication [J].Winged Missiles Journal, 2012, 22(1):59-63. [3] 钱权.无线Ad Hoc网络安全[M]. 清华大学出版社,2009:14-20. QIAN Quan. Security of wireless Ad Hoc network[M]. Beijing: Tsinghua University Press, 2009:14-20. [4] SIVAGURUNATHAN S, PRATHAPCHANDRAN K. Trust and cluster based authentication schemes in mobile Ad Hoc networks—A review[C] // International Conference on Power Signals Control and Computations. IEEE, 2014:1-5. [5] ZGHURSKYI O, BUNIN S. A survey of clustering protocols for MANET with weighted metric for cluster head selection[C] // Problems of Infocommunications Science and Technology, 2014 First International Scientific-Practical Conference. IEEE, 2014:54-56. [6] BENTALEB A, HAROUS S, BOUBETRA A. A weight based clustering scheme for mobile Ad hoc networks[C] //MoMM '13 Proceedings of International Conference on Advances in Mobile Computing & Multimedia. 2013:161-166. [7] KAPUR R K, KHATRI S K. Secure data transfer in MANET using symmetric and asymmetric cryptography[C] // International Conference on Reliability, INFOCOM Technologies and Optimization. IEEE, 2015:1-5. [8] SINGHAL S, DANIEL A K. Cluster head selection protocol under node degree, competence level and goodness factor for mobile Ad Hoc network usingai technique[C] // International Conference on Advanced Computing & Communication Technologies. IEEE, 2014:415-420. [9] 李荣森. 无线Ad Hoc网络安全关键技术研究[D].长沙:国防科学技术大学,2013. LI Rongsen. Reasearch on key technology of wireless Ad Hoc network security[D].Changsha:Nationl University of Defense Technology, 2013. [10] GUILLEMINAULT C, SUZUKI M. Secure routing with an integrated localized key management protocol in MANETs[C] // IEEE, International Conference on Advanced Information NETWORKING and Applications. IEEE Computer Society, 2014:605-612. [11] SCHNEIER B. Applied cryptography, secondedition: protocols, algorithms, and source code in C[J]. Government Information Quarterly, 1997, 13(3):336. [12] ROY M, CHOWDHURY C, NEOGY S. Developing secured MANET using trust[C] // Fourth International Conference on Advances in Computing and Communications. IEEE, 2014:183-186. |
[1] | ZHANG Jian-biao, LI Zhi-gang, LIU Guo-jie, WANG Chao, WANG Wei. Process active dynamic measurement method for Windows environment [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(7): 46-50. |
[2] | SUN Liang, CHEN Xiao-chun, ZHONG Yang, LIN Zhi-peng, REN Tong. Secure startup mechanism of server based on trusted BMC [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(1): 89-94. |
[3] | SU Yang. Reconfigurable design of Galois field multiplication in symmetric cryptography [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(6): 76-83. |
[4] | CUI Xiao-yu, ZHAO Bo, FAN Pei-ru, XIAO Yu. A key management mechanism basedon TrustZone architecture [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(6): 92-98. |
[5] | LIU Long-fei, YANG Xiao-yuan. On the linear complexity of a new generalized cyclotomic sequence with length p3 over GF(l) [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(3): 24-31. |
[6] | LI Xiao-ce, PAN Xiao-zhong, MAI Tao-tao. Multi-component property based remote attestation [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(9): 53-58. |
[7] | XU Sheng-wei. A new quantum secret sharing scheme [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(9): 36-40. |
[8] | . Cryptanalysis and improvement of two kind of certificateless aggregate signature schemes [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(7): 107-114. |
[9] | ZHAI Peng, LI Deng-dao. The fuzzy clustering algorithm based on inclusion index of Gausian membership function [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(5): 102-105. |
[10] | ZHAO Bin, HE Jing-sha, ZHANG Yi-xuan. The method of determining decision attribute weight based on information entropy and membership [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(3): 86-90. |
[11] | LIU Da-fu, SU Yang. Research on evidence-based software trustworthiness metrics model [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(11): 58-65. |
[12] | GAO Xiao-bo, FANG Xian-mei, LI Shi-jun. Trust-aware product recommendation based on factorization machine [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(1): 89-94. |
[13] | FAN Ai-wan, XIA Dong-liang, YANG Zhao-feng. Security analysis and improvement of two certificateless aggregate signature schemes [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2015, 50(09): 42-48. |
[14] | ZHU Rui. E-commerce community clustering model based on trust [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2015, 50(05): 18-22. |
[15] | JIANG Wei-jin, XU Yu-hui, GUO Hong, XU Yu-sheng. A multi-dimensional evidence dynamic trust computing model based on multi-agent [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2015, 50(01): 1-11. |
|