-
1
-
-
84884730529
-
An optimal class of symmetric key generation systems
-
Advances in Cryptography: EUROCRYPT
-
R. Blom. An optimal class of symmetric key generation systems. In Advances in Cryptography: EUROCRYPT, volume 209 of Lecture Notes in Computer Science, pages 335-338, 1985.
-
(1985)
Lecture Notes in Computer Science
, vol.209
, pp. 335-338
-
-
Blom, R.1
-
2
-
-
0031703272
-
Detecting disruptive routers: A distributed network monitoring approach
-
K. A. Bradley, S. Cheung, N. Puketza, B. Mukherjee, and R. A. Olsson. Detecting disruptive routers: A distributed network monitoring approach. In IEEE Symposium on Security and Privacy, pages 115-124, 1998.
-
(1998)
IEEE Symposium on Security and Privacy
, pp. 115-124
-
-
Bradley, K.A.1
Cheung, S.2
Puketza, N.3
Mukherjee, B.4
Olsson, R.A.5
-
5
-
-
0004116989
-
-
MIT Press, Cambridge, MA, 2nd edition
-
T. H. Cormen, C. E. Leiserson, R. L. Rivest, and C. Stein. Introduction to Algorithms. MIT Press, Cambridge, MA, 2nd edition, 2001.
-
(2001)
Introduction to Algorithms
-
-
Cormen, T.H.1
Leiserson, C.E.2
Rivest, R.L.3
Stein, C.4
-
7
-
-
3042783638
-
A pairwise key pre-distribution scheme for wireless sensor networks
-
W. Du, J. Deng, Y. S. Han, and P. K. Varshney. A pairwise key pre-distribution scheme for wireless sensor networks. In 10th ACM Conf. on Computer and Communication Security (CCS), pages 42-51, 2003.
-
(2003)
10th ACM Conf. on Computer and Communication Security (CCS)
, pp. 42-51
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Varshney, P.K.4
-
10
-
-
0242388942
-
-
John Wiley & Sons, New York, NY
-
M. T. Goodrich and R. Tamassia. Algorithm Design: Foundations, Analysis, and Internet Examples. John Wiley & Sons, New York, NY, 2002.
-
(2002)
Algorithm Design: Foundations, Analysis, and Internet Examples
-
-
Goodrich, M.T.1
Tamassia, R.2
-
12
-
-
0033296081
-
Lowering security overhead in link state routing
-
R. C. Hauser, T. Przygienda, and G. Tsudik. Lowering security overhead in link state routing. Computer Networks, 31(8):885-894, 1999.
-
(1999)
Computer Networks
, vol.31
, Issue.8
, pp. 885-894
-
-
Hauser, R.C.1
Przygienda, T.2
Tsudik, G.3
-
15
-
-
0004216472
-
-
Prentice-Hall, Englewood Cliffs, NJ
-
C. Kaufman, R. Perlman, and M. Speciner. Network Security: Private Communication in a Public World. Prentice-Hall, Englewood Cliffs, NJ, 1995.
-
(1995)
Network Security: Private Communication in A Public World
-
-
Kaufman, C.1
Perlman, R.2
Speciner, M.3
-
16
-
-
84867338222
-
Secure boarder gateway protocol (S-BGP) - Real world performance and deployment issues
-
S. Kent, C. Lynn, J. Mikkelson, and K. Seo. Secure boarder gateway protocol (S-BGP) - real world performance and deployment issues. In Symposium on Network and Distributed Systems Security (NDSS '00), pages 103-116, 2000.
-
(2000)
Symposium on Network and Distributed Systems Security (NDSS '00)
, pp. 103-116
-
-
Kent, S.1
Lynn, C.2
Mikkelson, J.3
Seo, K.4
-
17
-
-
0035704362
-
Providing robust and ubiquitous security support for mobil ad-hoc networks
-
J. Konh, P. Zerfos, H. Luo, S. Lu, and L. Zhang. Providing robust and ubiquitous security support for mobil ad-hoc networks. In 9th IEEE Int. Conf. on Network Protocols (ICNP), pages 251-260, 2001.
-
(2001)
9th IEEE Int. Conf. on Network Protocols (ICNP)
, pp. 251-260
-
-
Konh, J.1
Zerfos, P.2
Luo, H.3
Lu, S.4
Zhang, L.5
-
21
-
-
84961751347
-
Retrofitting security into internet infrastructure protocols
-
IEEE Computer Society Press
-
S. Murphy, O. Gudmundsson, R. Mundy, and B. Wellington. Retrofitting security into internet infrastructure protocols. In DARPA Information Survivability Conference and Exposition (DISCEX), pages 3-17. IEEE Computer Society Press, 2000.
-
(2000)
DARPA Information Survivability Conference and Exposition (DISCEX)
, pp. 3-17
-
-
Murphy, S.1
Gudmundsson, O.2
Mundy, R.3
Wellington, B.4
-
25
-
-
0003973081
-
-
Addison-Wesley, Reading, MA, USA
-
R. Perlman. Interconnections, Second Edition: Bridges, Routers, Switches, and Internetworking Protocols. Addison-Wesley, Reading, MA, USA, 2000.
-
(2000)
Interconnections, Second Edition: Bridges, Routers, Switches, and Internetworking Protocols
-
-
Perlman, R.1
-
27
-
-
84904904836
-
A secure routing protocol for ad hoc networks
-
K. Sanzgiri, B. Dahill, B. N. Levine, C. Shields, and E. M. Belding-Royer. A secure routing protocol for ad hoc networks. In 10th IEEE Int. Conf. on Network Protocols (ICNP), pages 78-89, 2002.
-
(2002)
10th IEEE Int. Conf. on Network Protocols (ICNP)
, pp. 78-89
-
-
Sanzgiri, K.1
Dahill, B.2
Levine, B.N.3
Shields, C.4
Belding-Royer, E.M.5
-
28
-
-
0003851399
-
-
John Wiley and Sons, Inc., New York
-
B. Schneier. Applied Cryptography: protocols, algorithms, and source code in C. John Wiley and Sons, Inc., New York, 1994.
-
(1994)
Applied Cryptography: Protocols, Algorithms, and Source Code in C
-
-
Schneier, B.1
-
30
-
-
0000137420
-
Secure frameproof codes, key distribution patterns, group testing algorithms and related structures
-
D. R. Stinson, T. van Trung, and R. Wei. Secure frameproof codes, key distribution patterns, group testing algorithms and related structures. Journal of Statistical Planning and Inference, 86:595-617, 2000.
-
(2000)
Journal of Statistical Planning and Inference
, vol.86
, pp. 595-617
-
-
Stinson, D.R.1
Van Trung, T.2
Wei, R.3
-
34
-
-
84943553152
-
Establishing pairwise keys for secure communication in ad hoc networks: A probabilistic approach
-
S. Zhu, S. Xu, S. Setia, and S. Jajodia. Establishing pairwise keys for secure communication in ad hoc networks: A probabilistic approach. In 11th IEEE International Conference on Network Protocols (ICNP), pages 326-335, 2003.
-
(2003)
11th IEEE International Conference on Network Protocols (ICNP)
, pp. 326-335
-
-
Zhu, S.1
Xu, S.2
Setia, S.3
Jajodia, S.4
-
35
-
-
84943529186
-
LHAP: A lightweight hop-by-hop authentication protocol of ad-hoc networks
-
S. Zhu, S. Xu, S. Setia, and S. Jajodia. LHAP: A lightweight hop-by-hop authentication protocol of ad-hoc networks. In 23rd International Conference on Distributed Computing Systems, page 749, 2003.
-
(2003)
23rd International Conference on Distributed Computing Systems
, pp. 749
-
-
Zhu, S.1
Xu, S.2
Setia, S.3
Jajodia, S.4
|