메뉴 건너뛰기




Volumn 2, Issue , 2003, Pages 1331-1335

Data security in ad hoc networks using multipath routing

Author keywords

Ad hoc networks; Confidentiality; Routing; Security

Indexed keywords

AD HOC NETWORKS; INTRUSION DETECTION; NETWORK ROUTING; RADIO COMMUNICATION;

EID: 33745183661     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/PIMRC.2003.1260329     Document Type: Conference Paper
Times cited : (23)

References (27)
  • 2
    • 12744250315 scopus 로고    scopus 로고
    • Technical report, Electrical Engineering, Helsinki University of Technology, May
    • M. M. Lehmus, "Requirements of Ad hoc Network Protocols," Technical report, Electrical Engineering, Helsinki University of Technology, May 2000.
    • (2000) Requirements of Ad Hoc Network Protocols
    • Lehmus, M.M.1
  • 5
    • 0036684150 scopus 로고    scopus 로고
    • PKI: It's Not Dead, Just Resting
    • August
    • P. Gutmann, "PKI: It's Not Dead, Just Resting," IEEE Computer, pp. 41-49, August 2002.
    • (2002) IEEE Computer , pp. 41-49
    • Gutmann, P.1
  • 6
    • 79955580382 scopus 로고    scopus 로고
    • http://www.cert.org/tech-tips/denial-of-service.html
  • 11
    • 0001831930 scopus 로고    scopus 로고
    • The Resurrecting Duckling: Security Issues for Ad hoc Wireless Networks
    • F. Stajano and R. Anderson. "The Resurrecting Duckling: Security Issues for Ad hoc Wireless Networks," in Proc 1999, pp. 172-194.
    • Proc 1999 , pp. 172-194
    • Stajano, F.1    Anderson, R.2
  • 12
    • 80055069754 scopus 로고    scopus 로고
    • Security in Mobile Networks: Ad-hoc and Infrastructure
    • University of Florida, Dec
    • N. Ahuja and A. Menon, "Security in Mobile Networks : Ad-hoc and Infrastructure," Computer and Information Sciences, University of Florida, Dec 2001.
    • (2001) Computer and Information Sciences
    • Ahuja, N.1    Menon, A.2
  • 14
    • 79955614445 scopus 로고    scopus 로고
    • http://www.wireless-fr.org/b002-norme80211b.html
  • 16
    • 0034317075 scopus 로고    scopus 로고
    • Key Agreement in Ad hoc Networks
    • N. Asokan and P.Ginzboorg, "Key Agreement in Ad hoc Networks," Computer Communications, vol. 23(17), pp. 1627-1637, 2000.
    • (2000) Computer Communications , vol.23 , Issue.17 , pp. 1627-1637
    • Asokan, N.1    Ginzboorg, P.2
  • 17
    • 84949953635 scopus 로고    scopus 로고
    • The Resurrecting Duckling - What Next?
    • th Security Protocols Workshop, SpringerVerlag, Berlin
    • th Security Protocols Workshop, Lecture Notes in Computer Science 2133, SpringerVerlag, Berlin, 2001, pp. 204-214.
    • (2001) Lecture Notes in Computer Science , vol.2133 , pp. 204-214
    • Stajano, F.1
  • 18
    • 85023809951 scopus 로고
    • Threshold Cryptography
    • CRYPTO '89, Springer-Verlag
    • Y. Desmedt, "Threshold Cryptography," In CRYPTO '89, vol. 435 of LNCS, pp. 307-315, Springer-Verlag, 1990.
    • (1990) LNCS , vol.435 , pp. 307-315
    • Desmedt, Y.1
  • 19
    • 0033357103 scopus 로고    scopus 로고
    • Securing Ad hoc Networks
    • L. Zhou and Z. J. Haas, "Securing Ad hoc Networks," IEEE Network, vol. 13(6), pp. 24-30, 1999.
    • (1999) IEEE Network , vol.13 , Issue.6 , pp. 24-30
    • Zhou, L.1    Haas, Z.J.2
  • 22
    • 12744276083 scopus 로고    scopus 로고
    • Intrusion Detection Techniques for Mobile Wireless Networks
    • Y. Zhang, W. Lee and Y. Huang, "Intrusion Detection Techniques for Mobile Wireless Networks," ACM MONET Journal 2002
    • (2002) ACM MONET Journal
    • Zhang, Y.1    Lee, W.2    Huang, Y.3
  • 25
    • 12744271540 scopus 로고
    • Also Dec.
    • Also ACM Operating System Review, vol.23(25), pp.1-13, Dec.1989.
    • (1989) ACM Operating System Review , vol.23 , Issue.25 , pp. 1-13
  • 27
    • 79955621071 scopus 로고    scopus 로고
    • http://www.cmpe.boun.edu.tr/ emre/research/msthesis


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.