메뉴 건너뛰기




Volumn , Issue , 2001, Pages 146-155

The quest for security in mobile ad hoc networks

Author keywords

[No Author keywords available]

Indexed keywords

INTERNET; MOBILE TELECOMMUNICATION SYSTEMS; RESEARCH; SECURITY OF DATA;

EID: 0035789229     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/501436.501437     Document Type: Conference Paper
Times cited : (576)

References (29)
  • 4
    • 0027693935 scopus 로고
    • Diversity coding for transparent self-healing and fault-tolerant communication networks
    • E. Ayanoglu et al. Diversity coding for transparent self-healing and fault-tolerant communication networks. IEEE Transactions on Communications, 41(11), 1993.
    • (1993) IEEE Transactions on Communications , vol.41 , Issue.11
    • Ayanoglu, E.1
  • 6
    • 0034158886 scopus 로고    scopus 로고
    • Key establishment protocols for secure mobile communications: A critical survey
    • C. Boyd and A. Mathuria. Key establishment protocols for secure mobile communications: a critical survey. Computer Communications, 23:575-587, 2000.
    • (2000) Computer Communications , vol.23 , pp. 575-587
    • Boyd, C.1    Mathuria, A.2
  • 7
    • 25844488399 scopus 로고    scopus 로고
    • Enforcing service availability in mobile ad hoc networks
    • L. Buttyáu and J.-P. Hubanx. Enforcing service availability in mobile ad hoc networks. In Proceedings of MobiHOC, 2000.
    • (2000) Proceedings of MobiHOC
    • Buttyáu, L.1    Hubanx, J.-P.2
  • 11
    • 0023092944 scopus 로고
    • A design concept for reliable mobile radio networks with frequency hopping signaling
    • A. Ephremides, J. Wieselthier, and D. Baker. A design concept for reliable mobile radio networks with frequency hopping signaling. Proceedings of the IEEE, 1987.
    • (1987) Proceedings of the IEEE
    • Ephremides, A.1    Wieselthier, J.2    Baker, D.3
  • 12
    • 0035363950 scopus 로고    scopus 로고
    • Spontaneous networking: An application-oriented approach to ad hoc networking
    • June
    • L. M. Feeney, B. Ahlgren, and A. Westerlund. Spontaneous networking: an application-oriented approach to ad hoc networking. IEEE Communications Magazine, June 2001.
    • (2001) IEEE Communications Magazine
    • Feeney, L.M.1    Ahlgren, B.2    Westerlund, A.3
  • 22
    • 0031078841 scopus 로고    scopus 로고
    • Trusting mobile user devices and security modules
    • February
    • A. Pfitzmann, B. Pfitzmann, and M. Waidner. Trusting mobile user devices and security modules. IEEE Computer, February 1997.
    • (1997) IEEE Computer
    • Pfitzmann, A.1    Pfitzmann, B.2    Waidner, M.3
  • 24
    • 0001827537 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • A. Shamir. Identity-based cryptosystems and signature schemes. In Proceedings of CRYPTO'84, 1984.
    • (1984) Proceedings of CRYPTO'84
    • Shamir, A.1
  • 26
    • 0004081447 scopus 로고    scopus 로고
    • Princeton University Press
    • D. Watts. Small Worlds. Princeton University Press, 1999.
    • (1999) Small Worlds
    • Watts, D.1
  • 27
    • 0034546898 scopus 로고    scopus 로고
    • Intrusion detection in wireless ad-hoc networks
    • Y. Zhang and W. Lee. Intrusion detection in wireless ad-hoc networks. In Proceedings of MOBICOM, 2000.
    • (2000) Proceedings of MOBICOM
    • Zhang, Y.1    Lee, W.2
  • 28
    • 0033357103 scopus 로고    scopus 로고
    • Securing ad hoc networks
    • November/December
    • L. Zhou and Z. Haas. Securing ad hoc networks. IEEE Network, 13(6):24-30, November/December 1999.
    • (1999) IEEE Network , vol.13 , Issue.6 , pp. 24-30
    • Zhou, L.1    Haas, Z.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.