-
2
-
-
0028462933
-
Threshold cryptography
-
July/August
-
Y. Desmedt, "Threshold Cryptography," European Transactions on Telecommunications, vol. 5, no. 4, pp. 449-457, July/August 1994.
-
(1994)
European Transactions on Telecommunications
, vol.5
, Issue.4
, pp. 449-457
-
-
Desmedt, Y.1
-
3
-
-
0003339136
-
The digital distributed systems security architecture
-
M. Gasser, A. Goldstein, C. Kaufman, and B. Lampson, "The Digital Distributed Systems Security Architecture," Proc. of the 12th National Computer Security Conference, pp. 305-319, 1989.
-
(1989)
Proc. of the 12th National Computer Security Conference
, pp. 305-319
-
-
Gasser, M.1
Goldstein, A.2
Kaufman, C.3
Lampson, B.4
-
4
-
-
0003478316
-
The architecture of a network level intrusion detection system
-
Aug.
-
R. Heady, G. Luger, A. Maccabe, and M. Servilla, "The Architecture of a Network Level Intrusion Detection System," Technical report, University of New Mexico, Department of Computer Science, Aug. 1990.
-
(1990)
Technical Report, University of New Mexico, Department of Computer Science
-
-
Heady, R.1
Luger, G.2
Maccabe, A.3
Servilla, M.4
-
5
-
-
85177184451
-
Ariadne: A secure on-demand routing protocol for wireless ad hoc networks
-
Sep.
-
Y. Hu, A. Perrig, and D. Johnson, "Ariadne: A Secure On-Demand Routing Protocol for Wireless Ad Hoc Networks," ACM Mobicom, Sep. 2002.
-
(2002)
ACM Mobicom
-
-
Hu, Y.1
Perrig, A.2
Johnson, D.3
-
6
-
-
0041973497
-
Packet leashes: A defense against wormhole attacks in wireless ad hoc networks
-
April
-
Y. Hu, A. Perrig, and D. Johnson, "Packet Leashes: A Defense against Wormhole Attacks in Wireless Ad Hoc Networks," IEEE Infocom, April 2003.
-
(2003)
IEEE Infocom
-
-
Hu, Y.1
Perrig, A.2
Johnson, D.3
-
7
-
-
0035789229
-
The quest for security in mobile ad hoc networks
-
H. Hubaux, L. Buttyan, and S. Capkun, "The Quest for Security in Mobile Ad Hoc Networks," ACM MobiHoc, pp. 146-155, 2001.
-
(2001)
ACM MobiHoc
, pp. 146-155
-
-
Hubaux, H.1
Buttyan, L.2
Capkun, S.3
-
8
-
-
3142775262
-
ATM network performance
-
G. Kesidis, "ATM Network Performance," Kluwer Academic Publishers, Boston, MA, Second Edition, 1999.
-
(1999)
Kluwer Academic Publishers, Boston, MA, Second Edition
-
-
Kesidis, G.1
-
9
-
-
0028738680
-
Sensitivity analysis for discrete-time randomized service priority queues
-
G. Kesidis, P. Konstantopoulos, and M. Zazanis, "Sensitivity Analysis for Discrete-time Randomized Service Priority Queues," IEEE CDC Proc., 1994.
-
(1994)
IEEE CDC Proc.
-
-
Kesidis, G.1
Konstantopoulos, P.2
Zazanis, M.3
-
10
-
-
0035704362
-
Providing robust and ubiquitous security support for mobile ad-hoc networks
-
J. Kong, P. Zerfos, H. Luo, S. Lu, L. Zhang, "Providing Robust and Ubiquitous Security Support for Mobile Ad-hoc Networks," IEEE 9th International Conference on Network Protocols, 2001.
-
(2001)
IEEE 9th International Conference on Network Protocols
-
-
Kong, J.1
Zerfos, P.2
Luo, H.3
Lu, S.4
Zhang, L.5
-
11
-
-
1542298520
-
Detection and handling of mac layer misbehavior in wireless networks
-
Aug.
-
P. Kyasanur and N. Vaidya, "Detection and Handling of MAC Layer Misbehavior in Wireless Networks," Technical Report, UIUC, Aug. 2002.
-
(2002)
Technical Report, UIUC
-
-
Kyasanur, P.1
Vaidya, N.2
-
12
-
-
0000328529
-
Mitigating routing misbehavior in mobile ad hoc networks
-
Aug
-
S. Marti, T. Giuli, K. Lai, and M. Baker, "Mitigating Routing Misbehavior in Mobile Ad Hoc Networks," ACM MobiCom, Aug.
-
ACM MobiCom
-
-
Marti, S.1
Giuli, T.2
Lai, K.3
Baker, M.4
-
14
-
-
0028430224
-
Network intrusion detection
-
May/June
-
B. Mukherjee, L. Heberlein, and K. Levitt, "Network Intrusion Detection," IEEE Network, vol. 8, no. 3, pp. 26-41, May/June 1994.
-
(1994)
IEEE Network
, vol.8
, Issue.3
, pp. 26-41
-
-
Mukherjee, B.1
Heberlein, L.2
Levitt, K.3
-
16
-
-
0033690336
-
Efficient authentication and signing of multicast streams over lossy channels
-
May
-
A. Perrig, R. Canetti, J. Tygar, and D. Song, "Efficient Authentication and Signing of Multicast Streams over Lossy Channels," IEEE Symposium on Security and Privacy, May 2000.
-
(2000)
IEEE Symposium on Security and Privacy
-
-
Perrig, A.1
Canetti, R.2
Tygar, J.3
Song, D.4
-
17
-
-
3142672450
-
Intrusion detection based on packet dropping patterns in multi-hop wireless networks
-
to appear in, San Francisco, Dec.
-
R. Rao and G. Kesidis, "Intrusion Detection Based on Packet Dropping Patterns in Multi-hop Wireless Networks," to appear in IEEE Globecom, San Francisco, Dec. 2002.
-
(2002)
IEEE Globecom
-
-
Rao, R.1
Kesidis, G.2
-
18
-
-
0842283101
-
A secure routing protocol for ad hoc networks
-
Nov.
-
K. Sanzgiri, B. Dahill, B. Levine, C. Shields, and E. Belding-Royer, "A Secure Routing Protocol for Ad Hoc Networks," IEEE Int'l Conf. on Network Protocols (ICNP), Nov. 2002.
-
(2002)
IEEE Int'l Conf. on Network Protocols (ICNP)
-
-
Sanzgiri, K.1
Dahill, B.2
Levine, B.3
Shields, C.4
Belding-Royer, E.5
-
19
-
-
0018545449
-
How to share a secret
-
A. Shamir, "How to Share a Secret," Communications of the ACM, vol. 22, no. 11, pp. 612-613, 1979.
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
20
-
-
0007473204
-
An introduction to intrusion detection
-
Apr.
-
A. Sundaram, "An Introduction to Intrusion Detection," ACM Crossroads Issue 2.4, Apr. 1996.
-
(1996)
ACM Crossroads Issue 2.4
-
-
Sundaram, A.1
-
21
-
-
0026154828
-
SPX: Global authentication using public key certificates
-
May
-
J. Tardo and K. Algappan, "SPX: Global Authentication Using Public Key Certificates," IEEE Symposium on Security and Privacy, pp. 232-244, May 1991.
-
(1991)
IEEE Symposium on Security and Privacy
, pp. 232-244
-
-
Tardo, J.1
Algappan, K.2
-
23
-
-
0036980295
-
Self-organized network-layer security in mobile ad hoc networks
-
Aug.
-
H. Yang, X. Meng, and S. Lu, "Self-Organized Network-Layer Security in Mobile Ad Hoc Networks," ACM Workshop on Wireless Security, Aug. 2002.
-
(2002)
ACM Workshop on Wireless Security
-
-
Yang, H.1
Meng, X.2
Lu, S.3
-
24
-
-
0034546898
-
Intrusion detection in wireless ad-hoc networks
-
Aug.
-
Y. Zhang and W. Lee, "Intrusion Detection in Wireless Ad-Hoc Networks," ACM Mobicom, pp. 275-283, Aug. 2000.
-
(2000)
ACM Mobicom
, pp. 275-283
-
-
Zhang, Y.1
Lee, W.2
-
25
-
-
0842266215
-
Malicious packet dropping: How it might impact the TCP performance and how we can detect it
-
X. Zhang, S. Wu, Z. Fu, and T. Wu, "Malicious Packet Dropping: How it Might Impact the TCP Performance and How We Can Detect It," IEEE ICNP, 2000.
-
(2000)
IEEE ICNP
-
-
Zhang, X.1
Wu, S.2
Fu, Z.3
Wu, T.4
-
26
-
-
0033357103
-
Securing ad hoc networks
-
November/December
-
L. Zhou and Z. Haas, "Securing Ad Hoc Networks," IEEE Network, vol. 13, no. 6, pp. 24-30, November/December 1999.
-
(1999)
IEEE Network
, vol.13
, Issue.6
, pp. 24-30
-
-
Zhou, L.1
Haas, Z.2
|