-
3
-
-
0036957315
-
Ariadne: A secure on-demand routing protocol for ad hoc networks
-
Atlanta, USA, September
-
Y.-C. Hu, A. Perrig, and D. B. Johnson, "Ariadne: A secure on-demand routing protocol for ad hoc networks," in Proceedings of the 8th Annual International Conference on Mobile Computing and Networking (MobiCom '02), Atlanta, USA, September 2002, http://citeseer.nj.nec.com/article/hu02ariadne.html.
-
(2002)
Proceedings of the 8th Annual International Conference on Mobile Computing and Networking (MobiCom '02)
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
4
-
-
0036980294
-
Securing ad hoc routing protocols
-
Atlanta, USA: ACM Press, September
-
M. G. Zapata and N. Asokan, "Securing ad hoc routing protocols," in Proceedings of ACM Workshop on Wireless Security (WiSe '02). Atlanta, USA: ACM Press, September 2002, pp. 1-10, http://doi.acm.org/10.1145/570681.570682.
-
(2002)
Proceedings of ACM Workshop on Wireless Security (WiSe '02)
, pp. 1-10
-
-
Zapata, M.G.1
Asokan, N.2
-
5
-
-
0036980295
-
Self-organized network-layer security in mobile ad hoc networks
-
Atlanta, USA, September
-
H. Yang, X. Meng, and S. Lu, "Self-organized network-layer security in mobile ad hoc networks," in Proceedings of ACM Workshop on Wireless Security (WiSe'02), Atlanta, USA, September 2002.
-
(2002)
Proceedings of ACM Workshop on Wireless Security (WiSe'02)
-
-
Yang, H.1
Meng, X.2
Lu, S.3
-
6
-
-
84961572484
-
Sead: Secure efficient distance vector routing in mobile wireless ad hoc networks
-
June
-
Y.-C. Hu, D. B. Johnson, and A. Perrig, "Sead: Secure efficient distance vector routing in mobile wireless ad hoc networks," in Proceedings of 4th IEEE Workshop on Mobile Computing Systems and Applications (WMCSA '02), June 2002, pp. 3-13, http://citeseer.nj.nec.com/hu02sead.html.
-
(2002)
Proceedings of 4th IEEE Workshop on Mobile Computing Systems and Applications (WMCSA '02)
, pp. 3-13
-
-
Hu, Y.-C.1
Johnson, D.B.2
Perrig, A.3
-
7
-
-
0004118143
-
-
citeseer.nj.nec.com/551839.html.
-
K. Sanzgiri, B. Dahill, B. N. Levine, C. Shields, and E. M. Belding-Royer, "A secure routing protocol for ad hoc networks," citeseer.nj.nec.com/551839.html.
-
A Secure Routing Protocol for Ad Hoc Networks
-
-
Sanzgiri, K.1
Dahill, B.2
Levine, B.N.3
Shields, C.4
Belding-Royer, E.M.5
-
8
-
-
0033357103
-
Securing ad hoc networks
-
L. Zhou and Z. J. Haas, "Securing ad hoc networks," Journal of IEEE Networks, vol. 13, no. 6, pp. 24-30, 1999.
-
(1999)
Journal of IEEE Networks
, vol.13
, Issue.6
, pp. 24-30
-
-
Zhou, L.1
Haas, Z.J.2
-
9
-
-
0035704362
-
Providing robust and ubiquitous security support for mobile ad-hoc networks
-
J. Kong, P. Zerfos, H. Luo, S. Lu, and L. Zhang, "Providing robust and ubiquitous security support for mobile ad-hoc networks," in Proceedings of IEEE ICNP '01, 2001.
-
(2001)
Proceedings of IEEE ICNP '01
-
-
Kong, J.1
Zerfos, P.2
Luo, H.3
Lu, S.4
Zhang, L.5
-
11
-
-
21644446645
-
Self-organized public-key management for mobile ad hoc networks
-
Atlanta, USA, September
-
S. Capkun, L. Buttyan, and J.-P. Hubaux, "Self-organized public-key management for mobile ad hoc networks," in Proceedings of ACM Workshop on Wireless Security (WiSe '02), Atlanta, USA, September 2002, http://citeseer.nj.nec.com/capkun02selforganized.html.
-
(2002)
Proceedings of ACM Workshop on Wireless Security (WiSe '02)
-
-
Capkun, S.1
Buttyan, L.2
Hubaux, J.-P.3
-
12
-
-
84883869163
-
"Selfsecuring ad hoc wireless networks
-
H. Luo, P. Zerfos, J. Kong, S. Lu, and L. Zhang, "Selfsecuring ad hoc wireless networks," in Proceedings of IEEE ISCC '02, 2002.
-
(2002)
Proceedings of IEEE ISCC '02
-
-
Luo, H.1
Zerfos, P.2
Kong, J.3
Lu, S.4
Zhang, L.5
-
13
-
-
0347608169
-
A logic for uncertain probabilities
-
A. Josang, "A logic for uncertain probabilities," International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol. 9, no. 3, pp. 279-311, 2001.
-
(2001)
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
, vol.9
, Issue.3
, pp. 279-311
-
-
Josang, A.1
-
15
-
-
84857091711
-
Prospectives for modelling trust in information security
-
_, "Prospectives for modelling trust in information security," in Proceedings of Australasian Conference on Information Security and Privacy, 1997, pp. 2-13, http://citeseer.nj.nec.com/josang97prospectives.html.
-
(1997)
Proceedings of Australasian Conference on Information Security and Privacy
, pp. 2-13
-
-
-
16
-
-
84880467894
-
The eigentrust algorithm for reputation management in p2p networks
-
Budapest, Hungary
-
S. D. Kamvar, M. T. Schlosser, and H. Garcia-Molna, "The eigentrust algorithm for reputation management in p2p networks," in Proceedings of the 12th International World Wide Web Conference (WWW '03), Budapest, Hungary, 2003.
-
(2003)
Proceedings of the 12th International World Wide Web Conference (WWW '03)
-
-
Kamvar, S.D.1
Schlosser, M.T.2
Garcia-Molna, H.3
-
17
-
-
0002863367
-
Valuation of trust in open networks
-
Brighton, UK: Springer-Verlag
-
T. Beth, M. Borcherding, and B. Klein, "Valuation of trust in open networks," in Proceedings of the European Symposium on Research in Computer Security. Brighton, UK: Springer-Verlag, 1994, pp. 3-18.
-
(1994)
Proceedings of the European Symposium on Research in Computer Security
, pp. 3-18
-
-
Beth, T.1
Borcherding, M.2
Klein, B.3
-
18
-
-
0027266208
-
Trust relationships in secure systems - A distributed authentication perspec live
-
R. Yahalom, B. Klein, and T. Beth, 'Trust relationships in secure systems - a distributed authentication perspec live," in Proceedings of IEEE Computer Society Symposium on Research in Security and Privacy (RSP '93), 1993, pp. 150-164.
-
(1993)
Proceedings of IEEE Computer Society Symposium on Research in Security and Privacy (RSP '93)
, pp. 150-164
-
-
Yahalom, R.1
Klein, B.2
Beth, T.3
-
21
-
-
4544301639
-
Trust propagation in small worlds
-
E. Gray, J.-M. Seigneur, Y. Chen, and C. Jensen, "Trust propagation in small worlds," in Proceedings of the 1st International Conference on Trust Management, 2002, http://citeseer.nj.nec.com/575876.html.
-
(2002)
Proceedings of the 1st International Conference on Trust Management
-
-
Gray, E.1
Seigneur, J.-M.2
Chen, Y.3
Jensen, C.4
-
22
-
-
3142519532
-
On trust establishment in mobile ad-hoc networks
-
Cambridge, UK: Springer-Verlag, April
-
L. Eschenauer, V. D. Gligor, and J. Baras, "On trust establishment in mobile ad-hoc networks," in Proceedings of the Security Protocols Workshop. Cambridge, UK: Springer-Verlag, April 2002, http://citeseer.nj.nec.com/eschenauer02trust.html.
-
(2002)
Proceedings of the Security Protocols Workshop
-
-
Eschenauer, L.1
Gligor, V.D.2
Baras, J.3
-
24
-
-
0000629443
-
Dynamic source routing protocol in ad hoc wireless networks
-
T. Imielinski and H. Korth, Eds. Boston, USA: Kluwer Academic Publishers, ch. 5
-
D. B. Johnson and D. A. Maltz, "Dynamic source routing protocol in ad hoc wireless networks," in Mobile Computing, T. Imielinski and H. Korth, Eds. Boston, USA: Kluwer Academic Publishers, 1996, ch. 5, pp. 153-181.
-
(1996)
Mobile Computing
, pp. 153-181
-
-
Johnson, D.B.1
Maltz, D.A.2
-
25
-
-
85031307530
-
Highly dynamic destination-sequenced distance-vector routing (dsdv) for mobile computers
-
London, UK: ACM Press
-
C. E. Perkins and P. Bhagwat, "Highly dynamic destination-sequenced distance-vector routing (dsdv) for mobile computers," in Proceedings of the ACM Conference on Communications Architectures, Protocols and Applications (SIGCOMM '94). London, UK: ACM Press, 1994, pp. 234-244, http://doi.acm.org/10.1145/190314.190336.
-
(1994)
Proceedings of the ACM Conference on Communications Architectures, Protocols and Applications (SIGCOMM '94)
, pp. 234-244
-
-
Perkins, C.E.1
Bhagwat, P.2
-
26
-
-
0034546898
-
Intrusion detection in wireless ad-hoc networks
-
Boston, Massachusetts, USA: ACM Press
-
Y. Zhang and W. Lee, "Intrusion detection in wireless ad-hoc networks," in Proceedings of the 6th ACM Annual International Conference on Mobile Computing and Networking (MobiCom '00). Boston, Massachusetts, USA: ACM Press, 2000, pp. 275-283, http://doi.acm.org/10.1145/345910.345958.
-
(2000)
Proceedings of the 6th ACM Annual International Conference on Mobile Computing and Networking (MobiCom '00)
, pp. 275-283
-
-
Zhang, Y.1
Lee, W.2
-
27
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
S. Marti, T. J. Giuli, K. Lai, and M. Baker, "Mitigating routing misbehavior in mobile ad hoc networks," in Proceedings of Mobile Computing and Networking (MobiCom '00)), 2000, pp. 255-265, http://citeseer.nj.nec.com/marti00mitigating.html.
-
(2000)
Proceedings of Mobile Computing and Networking (MobiCom '00)
, pp. 255-265
-
-
Marti, S.1
Giuli, T.J.2
Lai, K.3
Baker, M.4
|