-
2
-
-
12744250315
-
-
Technical report, Electrical Engineering, Helsinki University of Technology, May
-
M. M. Lehmus, "Requirements of Ad hoc Network Protocols," Technical report, Electrical Engineering, Helsinki University of Technology, May 2000.
-
(2000)
Requirements of Ad Hoc Network Protocols
-
-
Lehmus, M.M.1
-
4
-
-
0017018484
-
New Directions in Cryptography
-
November
-
W.Diffie, M. Hellman, "New Directions in Cryptography," IEEE Transactions on Information Theory, vol. IT-22(6), pp. 644-654, November 1976
-
(1976)
IEEE Transactions on Information Theory
, vol.IT-22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.2
-
5
-
-
0036684150
-
PKI: It's Not Dead, Just Resting
-
August
-
P. Gutmann, "PKI: It's Not Dead, Just Resting," IEEE Computer, pp. 41-49, August 2002.
-
(2002)
IEEE Computer
, pp. 41-49
-
-
Gutmann, P.1
-
6
-
-
79955580382
-
-
http://www.cert.org/tech-tips/denial-of-service.html
-
-
-
-
8
-
-
12744267797
-
-
Technical Report, Department of Computer Science, University of Kentucky, April
-
H. Li, Z. Chen, X. Qin, C. Li, H. Tan, "Secure Routing in Wired Networks and Wireless Ad Hoc Networks," Technical Report, Department of Computer Science, University of Kentucky, April 2002.
-
(2002)
Secure Routing in Wired Networks and Wireless Ad Hoc Networks
-
-
Li, H.1
Chen, Z.2
Qin, X.3
Li, C.4
Tan, H.5
-
9
-
-
0013294535
-
-
Technical Report, North Carolina State University, May
-
F. Wang, B. Vetter, and S. Wu, "Secure Routing Protocols: Theory and Practice," Technical Report, North Carolina State University, May 1997.
-
(1997)
Secure Routing Protocols: Theory and Practice
-
-
Wang, F.1
Vetter, B.2
Wu, S.3
-
10
-
-
0036957315
-
Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks
-
ACM, Atlanta, GA, September
-
Y. Hu and A. Perrig and D. Johnson, "Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks," in Proc of the Eighth Annual International Conference on Mobile Computing and Networking (MobiCom 2002), pp. 12-23, ACM, Atlanta, GA, September 2002.
-
(2002)
Proc of the Eighth Annual International Conference on Mobile Computing and Networking (MobiCom 2002)
, pp. 12-23
-
-
Hu, Y.1
Perrig, A.2
Johnson, D.3
-
11
-
-
0001831930
-
The Resurrecting Duckling: Security Issues for Ad hoc Wireless Networks
-
F. Stajano and R. Anderson. "The Resurrecting Duckling: Security Issues for Ad hoc Wireless Networks," in Proc 1999, pp. 172-194.
-
Proc 1999
, pp. 172-194
-
-
Stajano, F.1
Anderson, R.2
-
12
-
-
80055069754
-
Security in Mobile Networks: Ad-hoc and Infrastructure
-
University of Florida, Dec
-
N. Ahuja and A. Menon, "Security in Mobile Networks : Ad-hoc and Infrastructure," Computer and Information Sciences, University of Florida, Dec 2001.
-
(2001)
Computer and Information Sciences
-
-
Ahuja, N.1
Menon, A.2
-
14
-
-
79955614445
-
-
http://www.wireless-fr.org/b002-norme80211b.html
-
-
-
-
15
-
-
84994155710
-
A Distributed Trust Model
-
A. Abdul-Rahman and S. Hailes, "A Distributed Trust Model," in Proc 97 New security paradigms, Langdale, Cumbria, United Kingdom, Sep 23-26 1997, pp. 48-60.
-
Proc 97 New Security Paradigms, Langdale, Cumbria, United Kingdom, Sep 23-26 1997
, pp. 48-60
-
-
Abdul-Rahman, A.1
Hailes, S.2
-
16
-
-
0034317075
-
Key Agreement in Ad hoc Networks
-
N. Asokan and P.Ginzboorg, "Key Agreement in Ad hoc Networks," Computer Communications, vol. 23(17), pp. 1627-1637, 2000.
-
(2000)
Computer Communications
, vol.23
, Issue.17
, pp. 1627-1637
-
-
Asokan, N.1
Ginzboorg, P.2
-
17
-
-
84949953635
-
The Resurrecting Duckling - What Next?
-
th Security Protocols Workshop, SpringerVerlag, Berlin
-
th Security Protocols Workshop, Lecture Notes in Computer Science 2133, SpringerVerlag, Berlin, 2001, pp. 204-214.
-
(2001)
Lecture Notes in Computer Science
, vol.2133
, pp. 204-214
-
-
Stajano, F.1
-
18
-
-
85023809951
-
Threshold Cryptography
-
CRYPTO '89, Springer-Verlag
-
Y. Desmedt, "Threshold Cryptography," In CRYPTO '89, vol. 435 of LNCS, pp. 307-315, Springer-Verlag, 1990.
-
(1990)
LNCS
, vol.435
, pp. 307-315
-
-
Desmedt, Y.1
-
19
-
-
0033357103
-
Securing Ad hoc Networks
-
L. Zhou and Z. J. Haas, "Securing Ad hoc Networks," IEEE Network, vol. 13(6), pp. 24-30, 1999.
-
(1999)
IEEE Network
, vol.13
, Issue.6
, pp. 24-30
-
-
Zhou, L.1
Haas, Z.J.2
-
21
-
-
33749058050
-
Secure Routing for Mobile Ad Hoc Networks
-
P. Papadimitratos and Z.J. Haas, "Secure Routing for Mobile Ad Hoc Networks," SCS Comm. Networks and Distributed Systems Modeling and Simulation (CNDS 2002), San Antonio, TX, Jan. 27-31, 2002.
-
SCS Comm. Networks and Distributed Systems Modeling and Simulation (CNDS 2002), San Antonio, TX, Jan. 27-31, 2002
-
-
Papadimitratos, P.1
Haas, Z.J.2
-
22
-
-
12744276083
-
Intrusion Detection Techniques for Mobile Wireless Networks
-
Y. Zhang, W. Lee and Y. Huang, "Intrusion Detection Techniques for Mobile Wireless Networks," ACM MONET Journal 2002
-
(2002)
ACM MONET Journal
-
-
Zhang, Y.1
Lee, W.2
Huang, Y.3
-
25
-
-
12744271540
-
-
Also Dec.
-
Also ACM Operating System Review, vol.23(25), pp.1-13, Dec.1989.
-
(1989)
ACM Operating System Review
, vol.23
, Issue.25
, pp. 1-13
-
-
-
26
-
-
0027693935
-
Diversity Coding for Transparent Self-healing and Fault-tolerant
-
Nov
-
E. Ayanoglu, E. Chih-Lin, R. D. gitlin and J. E. Mazo, "Diversity Coding for Transparent Self-healing and Fault-tolerant," Communication networks, IEEE Transactions on Communications, vol. 41(11), pp.1677-1686, Nov 1993.
-
(1993)
Communication Networks, IEEE Transactions on Communications
, vol.41
, Issue.11
, pp. 1677-1686
-
-
Ayanoglu, E.1
Chih-Lin, E.2
Gitlin, R.D.3
Mazo, J.E.4
-
27
-
-
79955621071
-
-
http://www.cmpe.boun.edu.tr/ emre/research/msthesis
-
-
-
|