-
1
-
-
84976295016
-
Distance-bounding protocols
-
S. Brands and D. Chaum. Distance-bounding protocols (extended abstract). In EUROCRYPT, pages 344-359, 1993.
-
(1993)
EUROCRYPT
, pp. 344-359
-
-
Brands, S.1
Chaum, D.2
-
2
-
-
0242696192
-
Performance analysis of the confidant protocol
-
ACM
-
S. Buchegger and J.-Y. L. Boudec. Performance analysis of the confidant protocol. In MobiHoc, pages 226-236. ACM, 2002.
-
(2002)
MobiHoc
, pp. 226-236
-
-
Buchegger, S.1
Boudec, J.-Y.L.2
-
3
-
-
4544259841
-
Sector: Secure tracking of node encounters in multi-hop wireless networks
-
S. Setia and V. Swarup, editors. ACM
-
S. Capkun, L. Buttyán, and J.-P. Hubaux. Sector: secure tracking of node encounters in multi-hop wireless networks. In S. Setia and V. Swarup, editors, SASN, pages 21-32. ACM, 2003.
-
(2003)
SASN
, pp. 21-32
-
-
Capkun, S.1
Buttyán, L.2
Hubaux, J.-P.3
-
4
-
-
27644488112
-
On the distribution and revocation of cryptographic keys in sensor networks
-
H. Chan, V. D. Gligor, A. Perrig, and G. Muralidharan. On the distribution and revocation of cryptographic keys in sensor networks. IEEE Trans. Dependable Secur. Comput., 2(3):233-247, 2005.
-
(2005)
IEEE Trans. Dependable Secur. Comput.
, vol.2
, Issue.3
, pp. 233-247
-
-
Chan, H.1
Gligor, V.D.2
Perrig, A.3
Muralidharan, G.4
-
5
-
-
0038487088
-
Random key predistribution schemes for sensor networks
-
pages 197-. IEEE Computer Society
-
H. Chan, A. Perrig, and D. X. Song. Random key predistribution schemes for sensor networks. In IEEE Symposium on Security and Privacy, pages 197-. IEEE Computer Society, 2003.
-
(2003)
IEEE Symposium on Security and Privacy
-
-
Chan, H.1
Perrig, A.2
Song, D.X.3
-
6
-
-
4544374484
-
A certificate revocation scheme for wireless ad hoc networks
-
New York, NY, USA. ACM Press
-
C. Crépeau and C. R. Davis. A certificate revocation scheme for wireless ad hoc networks. In SASN '03: Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks, pages 54-61, New York, NY, USA, 2003. ACM Press.
-
(2003)
SASN '03: Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks
, pp. 54-61
-
-
Crépeau, C.1
Davis, C.R.2
-
7
-
-
84947273682
-
The Sybil attack
-
P. Druschel, M. F. Kaashoek, and A. I. T. Rowstron, editors, IPTPS. Springer
-
J. R. Douceur. The Sybil attack. In P. Druschel, M. F. Kaashoek, and A. I. T. Rowstron, editors, IPTPS, volume 2429 of Lecture Notes in Computer Science, pages 251-260. Springer, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2429
, pp. 251-260
-
-
Douceur, J.R.1
-
8
-
-
3242802867
-
Robust incentive techniques for peer-to-peer networks
-
ACM Press
-
M. Feldman, K. Lai, I. Stoica, and J. Chuang. Robust incentive techniques for peer-to-peer networks. In EC '04: Proceedings of the 5th ACM conference on Electronic commerce, pages 102-111. ACM Press, 2004.
-
(2004)
EC '04: Proceedings of the 5th ACM Conference on Electronic Commerce
, pp. 102-111
-
-
Feldman, M.1
Lai, K.2
Stoica, I.3
Chuang, J.4
-
9
-
-
14844315770
-
Reputation-based framework for high integrity sensor networks
-
S. Setia and V. Swarup, editors. ACM
-
S. Ganeriwal and M. B. Srivastava. Reputation-based framework for high integrity sensor networks. In S. Setia and V. Swarup, editors, SASN, pages 66-77. ACM, 2004.
-
(2004)
SASN
, pp. 66-77
-
-
Ganeriwal, S.1
Srivastava, M.B.2
-
10
-
-
33847329743
-
An RFID distance bounding protocol
-
IEEE Computer Society
-
G. P. Hancke and M. G. Kuhn. An RFID distance bounding protocol. In IEEE SecureComm 2005, Athens, Greece, 5-9 September 2005, pages 67-73. IEEE Computer Society, 2005.
-
(2005)
IEEE SecureComm 2005, Athens, Greece, 5-9 September 2005
, pp. 67-73
-
-
Hancke, G.P.1
Kuhn, M.G.2
-
11
-
-
0011255177
-
Internet X.509 public key infrastructure certificate and Certificate Revocation List (CRL) profile
-
(Proposed Standard), Apr. 2002. Updated by RFC 4325
-
R. Housley, W. Polk, W. Ford, and D. Solo. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. RFC 3280 (Proposed Standard), Apr. 2002. Updated by RFC 4325.
-
RFC
, vol.3280
-
-
Housley, R.1
Polk, W.2
Ford, W.3
Solo, D.4
-
12
-
-
0041973497
-
Packet leashes: A defense against wormhole attacks in wireless networks
-
Y.-C. Hu, A. Perrig, and D. B. Johnson. Packet leashes: A defense against wormhole attacks in wireless networks. In INFOCOM, 2003.
-
(2003)
INFOCOM
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
14
-
-
0035704362
-
Providing robust and ubiquitous security support for mobile ad hoc networks
-
IEEE Computer Society
-
J. Kong, P. Zerfos, H. Luo, S. Lu, and L. Zhang. Providing robust and ubiquitous security support for mobile ad hoc networks. In ICNP, pages 251-260. IEEE Computer Society, 2001.
-
(2001)
ICNP
, pp. 251-260
-
-
Kong, J.1
Zerfos, P.2
Luo, H.3
Lu, S.4
Zhang, L.5
-
15
-
-
27944459744
-
Detecting malicious beacon nodes for secure location discovery in wireless sensor networks
-
IEEE Computer Society
-
D. Liu, P. Ning, and W. Du. Detecting malicious beacon nodes for secure location discovery in wireless sensor networks. In ICDCS, pages 609-619. IEEE Computer Society, 2005.
-
(2005)
ICDCS
, pp. 609-619
-
-
Liu, D.1
Ning, P.2
Du, W.3
-
16
-
-
85113133621
-
Core: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks
-
B. Jerman-Blazic and T. Klobucar, editors, Communications and Multimedia Security. Kluwer
-
P. Michiardi and R. Molva. Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In B. Jerman-Blazic and T. Klobucar, editors, Communications and Multimedia Security, volume 228 of IFIP Conference Proceedings, pages 107-121. Kluwer, 2002.
-
(2002)
IFIP Conference Proceedings
, vol.228
, pp. 107-121
-
-
Michiardi, P.1
Molva, R.2
-
17
-
-
3042785862
-
The Sybil attack in sensor networks: Analysis & defenses
-
K. Ramchandran, J. Sztipanovits, J. C. Hou, and T. N. Pappas, editors. ACM
-
J. Newsome, E. Shi, D. X. Song, and A. Perrig. The Sybil attack in sensor networks: analysis & defenses. In K. Ramchandran, J. Sztipanovits, J. C. Hou, and T. N. Pappas, editors, IPSN, pages 259-268. ACM, 2004.
-
(2004)
IPSN
, pp. 259-268
-
-
Newsome, J.1
Shi, E.2
Song, D.X.3
Perrig, A.4
-
18
-
-
27544460282
-
Distributed detection of node replication attacks in sensor networks
-
IEEE Computer Society
-
B. Parno, A. Perrig, and V. D. Gligor. Distributed detection of node replication attacks in sensor networks. In IEEE Symposium on Security and Privacy, pages 49-63. IEEE Computer Society, 2005.
-
(2005)
IEEE Symposium on Security and Privacy
, pp. 49-63
-
-
Parno, B.1
Perrig, A.2
Gligor, V.D.3
-
19
-
-
0036738266
-
SPINS: Security protocols for sensor networks
-
A. Perrig, R. Szewczyk, J. D. Tygar, V. Wen, and D. E. Culler. SPINS: security protocols for sensor networks. Wirel. Netw., 8(5):521-534, 2002.
-
(2002)
Wirel. Netw.
, vol.8
, Issue.5
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Tygar, J.D.3
Wen, V.4
Culler, D.E.5
-
21
-
-
0242624675
-
A reputation-based trust model for peer-to-peer ecommerce communities
-
ACM
-
L. Xiong and L. Liu. A reputation-based trust model for peer-to-peer ecommerce communities. In ACM Conference on Electronic Commerce, pages 228-229. ACM, 2003.
-
(2003)
ACM Conference on Electronic Commerce
, pp. 228-229
-
-
Xiong, L.1
Liu, L.2
-
22
-
-
0033357103
-
Securing ad hoc networks
-
L. Zhou and Z. J. Haas. Securing ad hoc networks. IEEE Network, 13(6):24-30, 1999.
-
(1999)
IEEE Network
, vol.13
, Issue.6
, pp. 24-30
-
-
Zhou, L.1
Haas, Z.J.2
|