-
1
-
-
84861251732
-
A hybrid approach for enhanced security in ad hoc networks
-
Department of Computer science and Engineering, University at Buffalo
-
A. Balasubramanian, S.Mishra, and R.Sridhar, "A Hybrid Approach for Enhanced Security in Ad hoc Networks," Tech. Rep. 2004-09, Department of Computer science and Engineering, University at Buffalo, http://www.cse.buffalo. edu/tech-reports/, 2004.
-
(2004)
Tech. Rep.
, vol.2004
, Issue.9
-
-
Balasubramanian, A.1
Mishra, S.2
Sridhar, R.3
-
2
-
-
0033357103
-
Securing ad hoc networks
-
L. Zhou and Z. J. Haas, "Securing Ad Hoc Networks," IEEE Network, vol. 13, no. 6, pp. 24-30, 1999.
-
(1999)
IEEE Network
, vol.13
, Issue.6
, pp. 24-30
-
-
Zhou, L.1
Haas, Z.J.2
-
3
-
-
17144398990
-
MOCA: Mobile certificate authority for wireless ad hoc networks
-
(Maryland), April
-
S. Yi and R. Kravets, "MOCA: Mobile Certificate Authority for Wireless Ad Hoc Networks," in Annual PKI Research Workshop Program, (Maryland), April 2003.
-
(2003)
Annual PKI Research Workshop Program
-
-
Yi, S.1
Kravets, R.2
-
5
-
-
0035704362
-
Providing robust and ubiquitous security support for mobile ad hoc networks
-
IEEE Computer Society
-
J. Kong, P. Zerfos, H. Luo, S. Lu, and L. Zhang, "Providing robust and ubiquitous security support for mobile ad hoc networks," in Proceedings of the Ninth International Conference on Network Protocols (ICNP'01), p. 251, IEEE Computer Society, 2001.
-
(2001)
Proceedings of the Ninth International Conference on Network Protocols (ICNP'01)
, pp. 251
-
-
Kong, J.1
Zerfos, P.2
Luo, H.3
Lu, S.4
Zhang, L.5
-
6
-
-
0035789229
-
The quest for security in mobile ad hoc networks
-
ACM Press
-
J.-P. Hubaux, L. Buttyan, and S. Capkun, "The Quest for Security in Mobile Ad hoc Networks," in Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing, pp. 146-155, ACM Press, 2001.
-
(2001)
Proceedings of the 2nd ACM International Symposium on Mobile Ad Hoc Networking & Computing
, pp. 146-155
-
-
Hubaux, J.-P.1
Buttyan, L.2
Capkun, S.3
-
7
-
-
0034317075
-
Key-agreement in ad-hoc networks
-
N. Asokan and P. Ginzboorg, "Key-Agreement in Ad-hoc Networks," Computer Communications, vol. 23, no. 17, pp. 1627-1637, 2000.
-
(2000)
Computer Communications
, vol.23
, Issue.17
, pp. 1627-1637
-
-
Asokan, N.1
Ginzboorg, P.2
-
8
-
-
0032218234
-
Authenticated group key agreement and friends
-
ACM Press
-
G. Ateniese, M. Steiner, and G. Tsudik, "Authenticated group key agreement and friends," in Proceedings of the 5th ACM conference on Computer and communications security, pp. 17-26, ACM Press, 1998.
-
(1998)
Proceedings of the 5th ACM Conference on Computer and Communications Security
, pp. 17-26
-
-
Ateniese, G.1
Steiner, M.2
Tsudik, G.3
-
9
-
-
8344229909
-
A cluster-based security architecture for ad hoc networks
-
March
-
M. Bechler, H.-J. Hof, D. Kraft, F. Pahlke, and L. Wolf, "A Cluster-Based Security Architecture for Ad Hoc Networks," in Proceedings of the 23rd IEEE Infocom, March 2004.
-
(2004)
Proceedings of the 23rd IEEE Infocom
-
-
Bechler, M.1
Hof, H.-J.2
Kraft, D.3
Pahlke, F.4
Wolf, L.5
-
10
-
-
24944454552
-
What could we submit next year to WiSe
-
(San Diego, USA), September
-
J-P.Hubaux, "What could we submit next year to WiSe," in Invited talk,Second Workshop on Wireless Security (WiSe), (San Diego, USA), September 2003.
-
(2003)
Invited Talk,Second Workshop on Wireless Security (WiSe)
-
-
Hubaux, J.-P.1
-
12
-
-
0029720059
-
Diffie-hellman key distribution extended to group communication
-
(New Delhi, India), ACM Press
-
M. Steiner, G. Tsudik, and M. Waidner, "Diffie-hellman key distribution extended to group communication," in Proceedings of the 3rd ACM conference on Computer and communications security, (New Delhi, India), pp. 31-37, ACM Press, 1996.
-
(1996)
Proceedings of the 3rd ACM Conference on Computer and Communications Security
, pp. 31-37
-
-
Steiner, M.1
Tsudik, G.2
Waidner, M.3
-
13
-
-
0017930809
-
A method for obtaining digital signatures and public key cryptosystems
-
Feb.
-
R. L. Rivest, A. Shamir, and L. Adleman, "A Method for Obtaining Digital Signatures and Public Key Cryptosystems," Communications of the Association for Computing Machinery, vol. 21, pp. 120-126, Feb. 1978.
-
(1978)
Communications of the Association for Computing Machinery
, vol.21
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
15
-
-
0018545449
-
How to share a secret
-
A.Shamir, "How to Share a Secret," Communications of the ACM, vol. 22(11), pp. 612-613, 1979.
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
16
-
-
0031652485
-
GloMoSim: A library for parallel simulation of large-scale wireless networks
-
X. Zeng, R. Bagrodia, and M. Gerla, "GloMoSim: A Library for Parallel Simulation of Large-Scale Wireless Networks," in Workshop on Parallel and Distributed Simulation, pp. 154-161, 1998.
-
(1998)
Workshop on Parallel and Distributed Simulation
, pp. 154-161
-
-
Zeng, X.1
Bagrodia, R.2
Gerla, M.3
|