-
2
-
-
21644434924
-
Security in ad hoc networks: A general intrusion detection architecture enhancing trust based approaches
-
Ciudad Real, Spain
-
P. Albers et al., Security in ad hoc networks: A general intrusion detection architecture enhancing trust based approaches, in: Wireless Information Systems, Ciudad Real, Spain (2002).
-
(2002)
Wireless Information Systems
-
-
Albers, P.1
-
3
-
-
0032218239
-
Communication complexity of group key distribution
-
(San Francisco, California, United States), ISBN: 1-58113-007-4
-
Becker and Wille, Communication complexity of group key distribution, in: Proceedings of the 5th ACM Conference on Computer and Communications Security (San Francisco, California, United States, 1998) pp. 1-6, ISBN: 1-58113-007-4.
-
(1998)
Proceedings of the 5th ACM Conference on Computer and Communications Security
, pp. 1-6
-
-
Becker1
Wille2
-
4
-
-
0002863367
-
Valuation of trust in open networks
-
(Brighton, UK), LNCS 875, Springer-Verlag
-
T. Beth, M. Borcherding and B. Klein, Valuation of trust in open networks, in: Proceedings of the European Symposium on Research in Computer Security (ESORICS), (Brighton, UK, 1994) pp. 3-18, LNCS 875, Springer-Verlag.
-
(1994)
Proceedings of the European Symposium on Research in Computer Security (ESORICS)
, pp. 3-18
-
-
Beth, T.1
Borcherding, M.2
Klein, B.3
-
5
-
-
84976804419
-
How to exchange (secret) keys
-
M. Blum, How to exchange (secret) keys, ACM Transactions on Computer Systems 1(2) (1983) 175-193.
-
(1983)
ACM Transactions on Computer Systems
, vol.1
, Issue.2
, pp. 175-193
-
-
Blum, M.1
-
6
-
-
0242696192
-
Performance analysis of the CONFIDANT protocol (Cooperation of nodes: Fairness in dynamic ad-hoc networks)
-
(Switzerland) June 9-11
-
S. Buchegger and J.-Y. Le Boudec, Performance analysis of the CONFIDANT protocol (Cooperation of nodes: Fairness in dynamic ad-hoc networks), in: MOBIHOC '02 (Switzerland) (June 9-11 2002).
-
(2002)
MOBIHOC '02
-
-
Buchegger, S.1
Le Boudec, J.-Y.2
-
7
-
-
0037885580
-
Nodes bearing grudges: Towards routing security, fairness, and robustness in mobile ad hoc networks
-
(Canary Islands, Spain), Jan.
-
S. Buchegger and J.-Y. Le Boudec, Nodes bearing grudges: towards routing security, fairness, and robustness in mobile ad hoc networks, in: Proceedings of the Tenth Euromicro Workshop on Parallel, Distributed, Network-based Processing (Canary Islands, Spain), (Jan. 2002) pp. 403-410.
-
(2002)
Proceedings of the Tenth Euromicro Workshop on Parallel, Distributed, Network-based Processing
, pp. 403-410
-
-
Buchegger, S.1
Le Boudec, J.-Y.2
-
8
-
-
11244250305
-
The effect of rumor spreading in reputation systems for mobile ad-hoc networks
-
Sophia-Antipolis, France, March
-
S. Buchegger and J.-Y. Le Boudec, The effect of rumor spreading in reputation systems for mobile ad-hoc networks, in: Proceedings of WiOpt '03, Modeling and Optimization in Mobile Ad Hoc and Wireless Networks (Sophia-Antipolis, France, March 2003).
-
(2003)
Proceedings of WiOpt '03, Modeling and Optimization in Mobile Ad Hoc and Wireless Networks
-
-
Buchegger, S.1
Le Boudec, J.-Y.2
-
9
-
-
84948991087
-
A secure and efficient conference key distribution system
-
A.D. Santis (ed.), vol. 950 of Lecture Notes in Computer Science, Springer-Verlag
-
M.V.D. Burmester and Y. Desmedt, A secure and efficient conference key distribution system, in: A.D. Santis (ed.), Advances in Cryptology-EUROCRYPT "94, vol. 950 of Lecture Notes in Computer Science, (Springer-Verlag, 1995) pp. 275-286.
-
(1995)
Advances in Cryptology-EUROCRYPT "94
, pp. 275-286
-
-
Burmester, M.V.D.1
Desmedt, Y.2
-
11
-
-
4444314479
-
Mobility helps security in ad hoc networks
-
(Annapolis, Maryland, USA), June 1-3
-
S. Čapkun, J-P Hubaux, and L. Buttyán, Mobility helps security in ad hoc networks, in: MobiHoc '03, (Annapolis, Maryland, USA), June 1-3.
-
MobiHoc '03
-
-
Čapkun, S.1
Hubaux, J.-P.2
Buttyán, L.3
-
14
-
-
85032188633
-
Society and group oriented cryptography: A new concept
-
Y. Desmedt, Society and group oriented cryptography: A new concept, in: Advances in Cryptology - Crypto'87 (1987) p. 120-127.
-
(1987)
Advances in Cryptology - Crypto'87
, pp. 120-127
-
-
Desmedt, Y.1
-
16
-
-
3142519532
-
On trust establishment in mobile ad hoc networks
-
Springer-Verlag, Cambridge, U.K. April
-
L. Eschenauer, V.D. Gligor and J. Baras, On trust establishment in mobile ad hoc networks, in: Proceedings of the Security Protocols Workshop, (Springer-Verlag, Cambridge, U.K. April 2002).
-
(2002)
Proceedings of the Security Protocols Workshop
-
-
Eschenauer, L.1
Gligor, V.D.2
Baras, J.3
-
19
-
-
20544465992
-
An overview of security issues for multihop mobile ad hoc networks
-
ISBN: 0-931695-25-3
-
T. Ghosh, K. Makki and N. Pisinou, An overview of security issues for multihop mobile ad hoc networks, Network Security: Technology Advances, Strategies, and Change Drivers (2004) ISBN: 0-931695-25-3.
-
(2004)
Network Security: Technology Advances, Strategies, and Change Drivers
-
-
Ghosh, T.1
Makki, K.2
Pisinou, N.3
-
22
-
-
1642624766
-
Key establishment in ad hoc networks
-
Lab of Theoretical Computer Science, Helsinki University of Technology
-
M. Hietalahti, Key establishment in ad hoc networks, Technical Report, Lab of Theoretical Computer Science, Helsinki University of Technology (2001).
-
(2001)
Technical Report
-
-
Hietalahti, M.1
-
24
-
-
0036957315
-
Ariadne: A secure on-demand routing protocol for ad-hoc networks
-
(Atlanta, Georgia, USA) Sept. 23-26
-
Y-C Hu, A. Perrig and D.B. Johnson, Ariadne: A secure on-demand routing protocol for ad-hoc networks, in:MobiCom '02, (Atlanta, Georgia, USA) (Sept. 23-26 2002)
-
(2002)
MobiCom '02
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
25
-
-
0035789229
-
The quest for security in mobile ad hoc networks
-
J-P Hubaux, L. Buttyán and S. Čapkun, The quest for security in mobile ad hoc networks, in: MOBIHOC (2001).
-
(2001)
MOBIHOC
-
-
Hubaux, J.-P.1
Buttyán, L.2
Čapkun, S.3
-
27
-
-
2642573748
-
Moving from security to distributed trust in ubiquitous computing environments
-
Dec.
-
L. Kagal, T. Finin and A. Joshi, Moving from security to distributed trust in ubiquitous computing environments, IEEE Computer, (Dec. 2001.)
-
(2001)
IEEE Computer
-
-
Kagal, L.1
Finin, T.2
Joshi, A.3
-
28
-
-
0035704362
-
Providing robust and ubiquitous security support for mobile ad-Hoc networks
-
J. Kong, P. Zerfos, H. Luo, S. Lu and L. Zhang, Providing robust and ubiquitous security support for mobile ad-Hoc networks, in: International Conference on Network Protocols (ICNP) (2001).
-
(2001)
International Conference on Network Protocols (ICNP)
-
-
Kong, J.1
Zerfos, P.2
Luo, H.3
Lu, S.4
Zhang, L.5
-
30
-
-
11244296240
-
A trust model based routing protocol for secure ad hoc networks
-
(Big Sky, Montana, USA). March 6-13
-
X. Li, M.R. Lyu and J. Liu, A trust model based routing protocol for secure ad hoc networks, in: Proceedings 2004 IEEE Aerospace Conference (Big Sky, Montana, USA). (March 6-13 2004).
-
(2004)
Proceedings 2004 IEEE Aerospace Conference
-
-
Li, X.1
Lyu, M.R.2
Liu, J.3
-
31
-
-
4143071452
-
A survey of wireless security in mobile ad hoc networks: Challenges and available solutions
-
X. Cheng, X. Huang and D.Z. Du (Eds.), (Kluwer Academic Publishers)
-
W. Lou and Y. Fang, A survey of wireless security in mobile ad hoc networks: challenges and available solutions in: X. Cheng, X. Huang and D.Z. Du (Eds.), Ad Hoc Wireless Networking (Kluwer Academic Publishers, 2003) pp. 319-364.
-
(2003)
Ad Hoc Wireless Networking
, pp. 319-364
-
-
Lou, W.1
Fang, Y.2
-
32
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
(Boston, Massachusetts, United States), August 06-11
-
S. Marti, T.J. Giuli, K. Lai and M. Baker, Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, in: Proceedings of the 6th Annual International Conference on Mobile Computing and Networking (MobiCom) (Boston, Massachusetts, United States), August 06-11, 2000.
-
(2000)
Proceedings of the 6th Annual International Conference on Mobile Computing and Networking (MobiCom)
-
-
Marti, S.1
Giuli, T.J.2
Lai, K.3
Baker, M.4
-
35
-
-
84943745348
-
Secure link state routing for mobile ad hoc networks
-
in conjunction with the 2003 International Symposium on Applications and the Internet (Orlando, FL, Jan. 28)
-
P. Papadimitratos and Z.J. Haas, Secure link state routing for mobile ad hoc networks, in: Proc. IEEE Workshop on Security and Assurance in Adlioc Networks, in conjunction with the 2003 International Symposium on Applications and the Internet (Orlando, FL, Jan. 28, 2003).
-
(2003)
Proc. IEEE Workshop on Security and Assurance in Adlioc Networks
-
-
Papadimitratos, P.1
Haas, Z.J.2
-
37
-
-
21144452079
-
Collaborative trust based routing in multihop ad hoc networks
-
Athens Greece, May 9-14
-
N. Pisinou, T. Ghosh and K. Makki, Collaborative trust based routing in multihop ad hoc networks, in: Proceedings of Networking '04: Springer Verlag, Series: Lecture Notes in Computer Science, vol. 3042 (Athens Greece, May 9-14, 2004) pp. 1446-1451.
-
(2004)
Proceedings of Networking '04: Springer Verlag, Series: Lecture Notes in Computer Science
, vol.3042
, pp. 1446-1451
-
-
Pisinou, N.1
Ghosh, T.2
Makki, K.3
-
40
-
-
0018545449
-
How to share a secret
-
A. Shamir, How to share a secret, Commun. ACM 22 (1979) 612-613.
-
(1979)
Commun. ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
-
41
-
-
0030695529
-
Securing distance-vector routing protocols
-
San Diego, CA, Feb.
-
B.R. Smith, S. Murthy and J.J. Garcia-Luna-Aceves, Securing distance-vector routing protocols, in: Proceedings of Internet Society Symposium on Network and Distributed System Security (San Diego, CA, Feb. 1997).
-
(1997)
Proceedings of Internet Society Symposium on Network and Distributed System Security
-
-
Smith, B.R.1
Murthy, S.2
Garcia-Luna-Aceves, J.J.3
-
43
-
-
0029720059
-
Diffie-Hellman key distribution extended to group communication
-
New Delhi, India, 14-16 May
-
M. Steiner, G. Tsudik, and M. Waidner, Diffie-Hellman key distribution extended to group communication, in: Proc. 3rd ACM CCS (New Delhi, India, 14-16 May 1996) pp. 31-37.
-
(1996)
Proc. 3rd ACM CCS
, pp. 31-37
-
-
Steiner, M.1
Tsudik, G.2
Waidner, M.3
-
45
-
-
11244333253
-
Trust evaluation in adhoc networks
-
Philadelphia, Pennsylvania, USA Oct. 1
-
G. Theodorakopoulos and J.S. Baras, Trust evaluation in adhoc networks, in: WiSe'04 (Philadelphia, Pennsylvania, USA Oct. 1 2004).
-
(2004)
WiSe'04
-
-
Theodorakopoulos, G.1
Baras, J.S.2
-
48
-
-
4544265289
-
Distributed security: Ad hoc networks & beyond
-
Rhul, Sept.
-
K. Wrons, Distributed security: ad hoc networks & beyond, in: Ad Hoc Networks Security Pampas Workshop (Rhul, Sept. 2002) pp. 16-17.
-
(2002)
Ad Hoc Networks Security Pampas Workshop
, pp. 16-17
-
-
Wrons, K.1
-
50
-
-
0036980295
-
Self-organized network layer security in mobile ad hoc networks
-
(Atlanta, Georgia, USA) Sept. 28
-
H. Yang, X. Meng and S. Lu, Self-organized network layer security in mobile ad hoc networks, in: WiSe '02 (Atlanta, Georgia, USA) (Sept. 28 2002).
-
(2002)
WiSe '02
-
-
Yang, H.1
Meng, X.2
Lu, S.3
-
56
-
-
0036980294
-
Securing ad hoc routing protocols
-
Atlanta, Georgia, USA, Sept. 28
-
M.G. Zapata and N. Asokan, Securing Ad hoc Routing Protocols, in: WiSe'02 (Atlanta, Georgia, USA, Sept. 28, 2002).
-
(2002)
WiSe'02
-
-
Zapata, M.G.1
Asokan, N.2
-
57
-
-
0031652485
-
Glomosim: A library for parallel simulation of large-scale wireless networks
-
May 26-29, Alberta, Canada
-
X. Zeng, R. Bagrodia and M. Gerla, Glomosim: A library for parallel simulation of large-scale wireless networks, in: Proceedings of the 12th Workshop on Parallel and Distributed Simulations - PADS '98 (May 26-29, Alberta, Canada, 1998).
-
(1998)
Proceedings of the 12th Workshop on Parallel and Distributed Simulations - PADS '98
-
-
Zeng, X.1
Bagrodia, R.2
Gerla, M.3
-
58
-
-
0033357103
-
Securing ad hoc networks
-
Nov./Dec.
-
L. Zhou and Z.J. Haas, Securing ad hoc networks, IEEE Network (Nov./Dec. 1999).
-
(1999)
IEEE Network
-
-
Zhou, L.1
Haas, Z.J.2
|