메뉴 건너뛰기




Volumn 2005, Issue , 2005, Pages 279-283

Link layer security for SAHN protocols

Author keywords

[No Author keywords available]

Indexed keywords

BROADBAND NETWORKS; INTERCONNECTION NETWORKS; INTERFACES (COMPUTER); MOBILE COMPUTING; SECURITY OF DATA; TELECOMMUNICATION TRAFFIC; TRANSCEIVERS;

EID: 33646788423     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/PERCOMW.2005.43     Document Type: Conference Paper
Times cited : (5)

References (13)
  • 1
    • 1642326644 scopus 로고    scopus 로고
    • Bypassing the home computing bottleneck: The Suburban Area network
    • Feb
    • R. Pose, C. Kopp. Bypassing the Home Computing Bottleneck: The Suburban Area Network. 3rd Australasian Computer Architecture Conference, pages 87-100, Feb 1998.
    • (1998) 3rd Australasian Computer Architecture Conference , pp. 87-100
    • Pose, R.1    Kopp, C.2
  • 2
    • 0016081585 scopus 로고
    • Capability-based addressing
    • R. S. Fabry. Capability-based addressing. Commun. ACM, 17(7):403-412, 1974.
    • (1974) Commun. ACM , vol.17 , Issue.7 , pp. 403-412
    • Fabry, R.S.1
  • 3
    • 0005755840 scopus 로고    scopus 로고
    • Password-capabilities: Their evolution from the password-capability system into Walnut and beyond
    • G Heiser, editor. IEEE Computer Society Press, Jan
    • R D Pose. Password-capabilities: their evolution from the password-capability system into Walnut and Beyond. In G Heiser, editor, ACSAC, volume 23, pages 105-113. IEEE Computer Society Press, Jan 2001.
    • (2001) ACSAC , vol.23 , pp. 105-113
    • Pose, R.D.1
  • 4
    • 7744241279 scopus 로고    scopus 로고
    • IEEE 802.11 over multi-hop wireless networks: Problems and new perspectives
    • Karthikeyan Sundaresan, Hung-Yun Hsieh, Raghupathy Sivakumar. IEEE 802.11 over multi-hop wireless networks: problems and new perspectives. Elsevier, pages 109-132, 2004.
    • (2004) Elsevier , pp. 109-132
    • Sundaresan, K.1    Hsieh, H.-Y.2    Sivakumar, R.3
  • 5
    • 1942455360 scopus 로고    scopus 로고
    • Design and implementation of a private and public key crypto processor and its application to a security system
    • Feb
    • Ho Won Kim and Sunggu Lee. Design and implementation of a private and public key crypto processor and its application to a security system. IEEE Transactions on Consumer Electronics, 50(1):214-224, Feb 2004.
    • (2004) IEEE Transactions on Consumer Electronics , vol.50 , Issue.1 , pp. 214-224
    • Ho Won Kim1    Lee, S.2
  • 6
    • 33646813770 scopus 로고    scopus 로고
    • Infineon Technologies. http://www.infineon.com.
  • 7
    • 3142699811 scopus 로고    scopus 로고
    • A 10-Gbps full-AES crypto design with a twisted BDD S-Box architecture
    • July
    • S. Morioka and A. Satoh. A 10-Gbps full-AES crypto design with a twisted BDD S-Box architecture. IEEE Transactions on VLSI systems, 12(7):686-691, July 2004.
    • (2004) IEEE Transactions on VLSI Systems , vol.12 , Issue.7 , pp. 686-691
    • Morioka, S.1    Satoh, A.2
  • 8
    • 0035271246 scopus 로고    scopus 로고
    • Authenticated ad hoc routing at the link layer for mobile systems
    • Jim Binkley and William Trost. Authenticated ad hoc routing at the link layer for mobile systems. Wireless Network, 7(2): 139-145, 2001.
    • (2001) Wireless Network , vol.7 , Issue.2 , pp. 139-145
    • Binkley, J.1    Trost, W.2
  • 9
    • 0035789243 scopus 로고    scopus 로고
    • Security-aware ad hoc routing for wireless networks
    • Seung Yi, Prasad Naldurg, Robin Kravets. Security-Aware Ad hoc Routing for Wireless Networks. In MobiHoc, 2001.
    • (2001) MobiHoc
    • Yi, S.1    Naldurg, P.2    Kravets, R.3
  • 10
    • 84904904836 scopus 로고    scopus 로고
    • A secure routing protocol for ad hoc networks
    • IEEE Computer Society
    • Kimaya Sanzgiri and Bridget Dahill and Brian Neil Levine and Clay Shields and Elizabeth M. Belding-Royer. A Secure Routing Protocol for Ad Hoc Networks. In ICNP, pages 78-89. IEEE Computer Society, 2002.
    • (2002) ICNP , pp. 78-89
    • Sanzgiri, K.1    Dahill, B.2    Levine, B.N.3    Shields, C.4    Belding-Royer, E.M.5
  • 11
    • 84943745348 scopus 로고    scopus 로고
    • Secure link state routing for mobile ad hoc networks
    • Jan
    • Zygmunt J. Haas Panagiotis Papadimitratos. Secure link state routing for mobile ad hoc networks. In SAINT, pages 27-31, Jan 2003.
    • (2003) SAINT , pp. 27-31
    • Papadimitratos, Z.J.H.P.1
  • 12
    • 0035704362 scopus 로고    scopus 로고
    • Providing robust and ubiquitous security support for mobile ad hoc networks
    • IEEE Computer Society, Nov
    • Jiejun Kong, Petros Zerfos, Haiyun Luo, Songwu Lu, Lixia Zhang. Providing Robust and Ubiquitous Security Support for Mobile Ad Hoc Networks. In ICNP, pages 251-260. IEEE Computer Society, Nov 2001.
    • (2001) ICNP , pp. 251-260
    • Kong, J.1    Zerfos, P.2    Luo, H.3    Lu, S.4    Zhang, L.5
  • 13
    • 0034590150 scopus 로고    scopus 로고
    • A novel authentication scheme for ad hoc networks wireless
    • Lakshmi Venkatraman and Dharma P. Agrawal. A novel authentication scheme for ad hoc networks wireless. In WCNC, volume 3. pages 1268-1273, 2000.
    • (2000) WCNC , vol.3 , pp. 1268-1273
    • Venkatraman, L.1    Agrawal, D.P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.