메뉴 건너뛰기




Volumn 29, Issue 2, 2006, Pages 200-215

Erratum to "Secret instantiation in ad-hoc networks" [Computer Communications 29 (2006) 200-215] (DOI:10.1016/j.comcom.2005.05.017);Secret instantiation in ad-hoc networks

Author keywords

Ad hoc networks; Instantiating security; Scalability; Security; Sensor Networks

Indexed keywords

COMMUNICATION; CONTINUUM MECHANICS; DATA PRIVACY; NETWORK PROTOCOLS; USER INTERFACES;

EID: 30344441104     PISSN: 01403664     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comcom.2006.01.001     Document Type: Erratum
Times cited : (20)

References (24)
  • 3
    • 30344435127 scopus 로고    scopus 로고
    • Design of secure end-to-end protocols for mobile systems
    • V. Varadharajan, and Y. Mu Design of secure end-to-end protocols for mobile systems Wireless 1996
    • (1996) Wireless
    • Varadharajan, V.1    Mu, Y.2
  • 4
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • R. Needham, and M. Schroeder Using encryption for authentication in large networks of computers Communications of ACM 21 1978 993 999
    • (1978) Communications of ACM , vol.21 , pp. 993-999
    • Needham, R.1    Schroeder, M.2
  • 12
    • 0033357103 scopus 로고    scopus 로고
    • Securing ad hoc networks
    • L. Zhou, and Z. Haas Securing ad hoc networks IEEE Network 13 6 1999
    • (1999) IEEE Network , vol.13 , Issue.6
    • Zhou, L.1    Haas, Z.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.