Security Model Research Based on Trusted Computing in Ad Hoc Network
With the rapid development of wireless networks, the Ad Hoc networks are widely used in many fields, but the current network security solu-tions for the Ad Hoc network are not competitive e-nough. So the critical technology of Ad Hoc net-work applications shall be how to implement the se-curity scheme. Here the discussions are focused on the specific solution against the security threats which the Ad Hoc networks will face, the method-ology of a management model which uses trusted computing technology to solve Ad Hoc network se-curity problems, and the analysis and verification for the security of this model.
Ad Hoc network trusted computing network security
Lin Zhuying Liu Xiaojie Lu Lin Shi Lei Xie Gang
School of Mathematics & Computer Science, Guizhou Normal University, Guiyang 550001, Guizhou Provin School of Mathematics & Computer Science, Guizhou Normal University, Guiyang 550001,Guizhou Provin Sony Ericsson Mobile Communications (China) Co., Ltd., Beijing 100102, P.R. China School of Mathematics & Computer Science, Guizhou Normal University, Guiyang 550001, Guizhou Provinc
国际会议
2011年中国计算机学会服务计算学术会议(CCF NCSC2011)
济南
英文
1-10
2011-08-18(万方平台首次上网日期,不代表论文的发表时间)