-
1
-
-
4143071452
-
A survey of wireless security in mobile ad hoc networks: Challenges and available solutions
-
X. Chen, X. Huang, and D.-Z. Du, eds., Kluwer Publisher, Mar.
-
W. Lou and Y. Fang, "A Survey of Wireless Security in Mobile Ad Hoc Networks: Challenges and Available Solutions," Ad Hoc Wireless Networking, X. Chen, X. Huang, and D.-Z. Du, eds., Kluwer Publisher, Mar. 2003.
-
(2003)
Ad Hoc Wireless Networking
-
-
Lou, W.1
Fang, Y.2
-
2
-
-
0028514601
-
-
Sept.
-
B. Neuman and T. Tso, "Kerberos: An Authentication Service for Computer Networks," vol. 32, no. 9, pp. 33-38, Sept. 1994.
-
(1994)
Kerberos: An Authentication Service for Computer Networks
, vol.32
, Issue.9
, pp. 33-38
-
-
Neuman, B.1
Tso, T.2
-
3
-
-
0033357103
-
Securing ad hoc networks
-
L. Zhou and Z. J. Haas, "Securing Ad Hoc Networks," IEEE Networks, vol. 13, no. 6, pp. 24-30, 1999.
-
(1999)
IEEE Networks
, vol.13
, Issue.6
, pp. 24-30
-
-
Zhou, L.1
Haas, Z.J.2
-
4
-
-
0035704362
-
Providing robust and ubiquitous security support for mobile ad hoc networks
-
Nov.
-
J. Kong, P. Zerfos, H. Luo, S. Lu, and L. Zhang, "Providing Robust and Ubiquitous Security Support for Mobile Ad Hoc Networks," Proc. IEEE Int'l Conf. Network Protocols, Nov. 2001.
-
(2001)
Proc. IEEE Int'l Conf. Network Protocols
-
-
Kong, J.1
Zerfos, P.2
Luo, H.3
Lu, S.4
Zhang, L.5
-
5
-
-
84943517115
-
On the unitility of distributed cryptography in P2P and manets: The case of membership control
-
Nov.
-
M. Narasimha, G. Tsudik, and J.H. Yi, "On the Unitility of Distributed Cryptography in P2P and Manets: The Case of Membership Control," Proc. IEEE Int'l Conf. Network Protocols, Nov. 2003.
-
(2003)
Proc. IEEE Int'l Conf. Network Protocols
-
-
Narasimha, M.1
Tsudik, G.2
Yi, J.H.3
-
7
-
-
8344229909
-
A cluster-based security architecture for ad hoc networks
-
Mar.
-
M. Bechler, H.-J. Hof, D. Kraft, F. Pahlke, and L. Wolf, "A Cluster-Based Security Architecture for Ad Hoc Networks," Proc. IEEE INFOCOM, Mar. 2004.
-
(2004)
Proc. IEEE INFOCOM
-
-
Bechler, M.1
Hof, H.-J.2
Kraft, D.3
Pahlke, F.4
Wolf, L.5
-
8
-
-
11244320485
-
URSA: Ubiquitous and robust access control for mobile ad hoc networks
-
Dec.
-
H. Luo, J. Kong, P. Zerfos, S. Lu, and L. Zhang, "URSA: Ubiquitous and Robust Access Control for Mobile Ad Hoc Networks," IEEE/ACM Trans. Networking, vol. 12, no. 6, pp. 1049-1063, Dec. 2004.
-
(2004)
IEEE/ACM Trans. Networking
, vol.12
, Issue.6
, pp. 1049-1063
-
-
Luo, H.1
Kong, J.2
Zerfos, P.3
Lu, S.4
Zhang, L.5
-
9
-
-
85020598353
-
Identity based cryptosystems and signature schemes
-
A. Shamir, "Identity Based Cryptosystems and Signature Schemes," Proc. CRYPTO'84, pp. 47-53, 1984.
-
(1984)
Proc. CRYPTO'84
, pp. 47-53
-
-
Shamir, A.1
-
13
-
-
24144449947
-
AC-PKI: Anonymous and certificateless public-key infrastructure for mobile ad hoc networks
-
May
-
Y. Zhang, W. Liu, W. Lou, Y. Fang, and Y. Kwon, "AC-PKI: Anonymous and Certificateless Public-Key Infrastructure for Mobile Ad Hoc Networks," Proc. IEEE Int'l Conf. Comm, pp. 3515-3519, May 2005.
-
(2005)
Proc. IEEE Int'l Conf. Comm
, pp. 3515-3519
-
-
Zhang, Y.1
Liu, W.2
Lou, W.3
Fang, Y.4
Kwon, Y.5
-
14
-
-
0018545449
-
How to share a secret
-
A. Shamir, "How to Share a Secret," Comm. ACM, vol. 22, no. 11, pp. 612-613, 1979.
-
(1979)
Comm. ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
15
-
-
85023809951
-
Threshold cryptosystems
-
Aug.
-
Y. Desmedt and Y. Frankel, "Threshold Cryptosystems," Proc. CRYPTO '89, pp. 307-315, Aug. 1989.
-
(1989)
Proc. CRYPTO '89
, pp. 307-315
-
-
Desmedt, Y.1
Frankel, Y.2
-
16
-
-
24944445508
-
-
NIST, Federal Information Processing Standards PUBlication 180-1, Apr.
-
NIST, "Digital Hash Standard,"Federal Information Processing Standards PUBlication 180-1, Apr. 1995.
-
(1995)
Digital Hash Standard
-
-
-
17
-
-
25844443821
-
Anonymous communications in mobile ad hoc networks
-
Mar.
-
Y. Zhang, W. Liu, and W. Lou, "Anonymous Communications in Mobile Ad Hoc Networks," Proc. IEEE INFOCOM '05, pp. 1940-1951, Mar. 2005,
-
(2005)
Proc. IEEE INFOCOM '05
, pp. 1940-1951
-
-
Zhang, Y.1
Liu, W.2
Lou, W.3
-
18
-
-
15244339622
-
Authenticated routing for ad hoc networks
-
Mar.
-
K. Sanzgiri, D. LaFlamme, B. Dahill, B. Levine, C. Shields, and E. Belding-Royer, "Authenticated Routing for Ad Hoc Networks," IEEE J. Selected Areas Comm., vol. 23, no. 3, pp. 598-610, Mar. 2005.
-
(2005)
IEEE J. Selected Areas Comm.
, vol.23
, Issue.3
, pp. 598-610
-
-
Sanzgiri, K.1
LaFlamme, D.2
Dahill, B.3
Levine, B.4
Shields, C.5
Belding-Royer, E.6
-
19
-
-
0242678584
-
Self-organized public key management for mobile ad hoc networks
-
Jan.-Mar.
-
S. Capkun, L. Buttyan, and J.-P. Hubaux, "Self-Organized Public Key Management for Mobile Ad Hoc Networks," IEEE Trans. Mobile Computing, vol. 2, no. 1, pp. 52-64, Jan.-Mar. 2003.
-
(2003)
IEEE Trans. Mobile Computing
, vol.2
, Issue.1
, pp. 52-64
-
-
Capkun, S.1
Buttyan, L.2
Hubaux, J.-P.3
-
22
-
-
0017930809
-
A method for obtaining digital signatures and public key cryptosystems
-
Feb.
-
R. Rivest, A. Shamir, and L. Adleman, "A Method for Obtaining Digital Signatures and Public Key Cryptosystems," Comm. ACM, vol. 21, no. 2, pp. 120-126, Feb. 1978.
-
(1978)
Comm. ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
-
23
-
-
0003508562
-
-
NIST, Federal Information Processing Standards Publication 186-2, Feb.
-
NIST, "Digital Signature Standard," Federal Information Processing Standards Publication 186-2, Feb. 2000.
-
(2000)
Digital Signature Standard
-
-
-
25
-
-
7744225358
-
Efficient identity-based security schemes for ad hoc network routing protocols
-
M. Bohio and A. Miri, "Efficient Identity-Based Security Schemes for Ad Hoc Network Routing Protocols," Elsevier Ad Hoc Networks J., vol. 2, no. 3, pp. 309-317, 2004.
-
(2004)
Elsevier Ad Hoc Networks J.
, vol.2
, Issue.3
, pp. 309-317
-
-
Bohio, M.1
Miri, A.2
-
26
-
-
33748622050
-
MASK: Anonymous on-demand routing in mobile ad hoc networks
-
Sept.
-
Y. Zhang, W. Liu, W. Lou, and Y. Fang, "MASK: Anonymous On-Demand Routing in Mobile Ad Hoc Networks," IEEE Trans. Wireless Comm., vol. 5, no. 9, pp. 2376-2385, Sept. 2006.
-
(2006)
IEEE Trans. Wireless Comm.
, vol.5
, Issue.9
, pp. 2376-2385
-
-
Zhang, Y.1
Liu, W.2
Lou, W.3
Fang, Y.4
-
27
-
-
84874324906
-
Identify-based encryption from the weil pairing
-
D. Boneh and M. Franklin, "Identify-Based Encryption from the Weil Pairing," Proc. CRYPTO '01, pp. 213-229, 2001.
-
(2001)
Proc. CRYPTO '01
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
28
-
-
0037623983
-
Identify-based encryption from the weil pairing
-
Mar.
-
D. Boneh and M. Franklin, "Identify-Based Encryption from the Weil Pairing," SIAM J. Computing, vol. 32, no. 3, pp. 586-615, Mar. 2003.
-
(2003)
SIAM J. Computing
, vol.32
, Issue.3
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.2
-
29
-
-
84937428623
-
Efficient algorithms for pairing-based cryptosystems
-
P. Barreto, H. Kim, B. Bynn, and M. Scott, "Efficient Algorithms for Pairing-Based Cryptosystems," Proc. CRYPTO '02, pp. 354-368, 2002.
-
(2002)
Proc. CRYPTO '02
, pp. 354-368
-
-
Barreto, P.1
Kim, H.2
Bynn, B.3
Scott, M.4
-
30
-
-
85015284120
-
Energy aware lossless data compression
-
May
-
K. Barr and K. Asanovic, "Energy Aware Lossless Data Compression," Proc. First Int'l Conf. Mobile Systems, Applications, and Services (MobiSys '03), pp. 231-244, May 2003,
-
(2003)
Proc. First Int'l Conf. Mobile Systems, Applications, and Services (MobiSys '03)
, pp. 231-244
-
-
Barr, K.1
Asanovic, K.2
-
31
-
-
4544363339
-
SIP: A Secure Incentive Protocol against selfishness in mobile ad hoc networks
-
Mar.
-
Y. Zhang, W. Lou, and Y. Fang, "SIP: A Secure Incentive Protocol Against Selfishness in Mobile Ad Hoc Networks," Proc. IEEE Wireless Comm. and Networking Conf., pp. 1679-1684, Mar. 2004.
-
(2004)
Proc. IEEE Wireless Comm. and Networking Conf.
, pp. 1679-1684
-
-
Zhang, Y.1
Lou, W.2
Fang, Y.3
-
32
-
-
84957083549
-
Adaptive security for threshold cryptosystems
-
Aug.
-
R. Canetti, R. Gennaro, S. Jarecki, H. Krawczyk, and T. Rabin, "Adaptive Security for Threshold Cryptosystems," Proc. CRYPTO '99, pp. 98-115, Aug. 1999.
-
(1999)
Proc. CRYPTO '99
, pp. 98-115
-
-
Canetti, R.1
Gennaro, R.2
Jarecki, S.3
Krawczyk, H.4
Rabin, T.5
-
33
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
Aug.
-
S. Marti, T. Giuli, K. Lai, and M. Baker, "Mitigating Routing Misbehavior in Mobile Ad Hoc Networks," Proc. ACM MobiCom, Aug. 2000.
-
(2000)
Proc. ACM MobiCom
-
-
Marti, S.1
Giuli, T.2
Lai, K.3
Baker, M.4
-
34
-
-
0034546898
-
Intrusion detection in wireless ad-hoc networks
-
Aug.
-
Y. Zhang and W. Lee, "Intrusion Detection in Wireless Ad-Hoc Networks," Proc. ACM MobiCom '00, Aug. 2000.
-
(2000)
Proc. ACM MobiCom '00
-
-
Zhang, Y.1
Lee, W.2
-
35
-
-
84957626176
-
Proactive secret sharing or: How to cope with perpetual leakage
-
A. Herzberg, S. Jarecki, H. Krawczyk, and M. Yung, "Proactive Secret Sharing or: How to Cope with Perpetual Leakage," Proc. CRYPTO '95, pp. 339-352, 1995.
-
(1995)
Proc. CRYPTO '95
, pp. 339-352
-
-
Herzberg, A.1
Jarecki, S.2
Krawczyk, H.3
Yung, M.4
-
36
-
-
0027726717
-
Random oracles are practical: A paradigm for designing efficient protocols
-
Nov.
-
M. Bellare and P. Rogaway, "Random Oracles are Practical: A Paradigm for Designing Efficient Protocols," Proc. ACM Conf. Computer and Comm. Security, pp. 62-73, Nov. 1993.
-
(1993)
Proc. ACM Conf. Computer and Comm. Security
, pp. 62-73
-
-
Bellare, M.1
Rogaway, P.2
-
37
-
-
33751505275
-
-
technical report, Dept. of Electrical and Computer Eng., Univ. of Florida, Gainesville, Apr.
-
Y. Zhang, W. Liu, W. Lou, and Y. Fang, "Securing Mobile Ad Hoc Networks with Certificateless Public Keys," technical report, Dept. of Electrical and Computer Eng., Univ. of Florida, Gainesville, Apr. 2006.
-
(2006)
Securing Mobile Ad Hoc Networks with Certificateless Public Keys
-
-
Zhang, Y.1
Liu, W.2
Lou, W.3
Fang, Y.4
-
39
-
-
0014814325
-
Space/time trade-offs in hash coding with allowable errors
-
July
-
B. Bloom, "Space/Time Trade-Offs in Hash Coding with Allowable Errors," Comm. ACM, vol. 13, no. 7, July 1970.
-
(1970)
Comm. ACM
, vol.13
, Issue.7
-
-
Bloom, B.1
-
41
-
-
0742292815
-
Ad hoc On-Demand Distance Vector (AODV) routing
-
July
-
C. Perkins, E. Belding-Royer, and S. Das, "Ad Hoc On-Demand Distance Vector (AODV) Routing," RFC 3561, July 2003.
-
(2003)
RFC
, vol.3561
-
-
Perkins, C.1
Belding-Royer, E.2
Das, S.3
-
43
-
-
0242696170
-
ANODR: Anonymous on Demand Routing with untraceable routes for mobile ad-hoc networks
-
Jun.
-
J. Kong and X. Hong, "ANODR: Anonymous on Demand Routing with Untraceable Routes for Mobile Ad-Hoc Networks," Proc. ACM MobiHoc '03, Jun. 2003.
-
(2003)
Proc. ACM MobiHoc '03
-
-
Kong, J.1
Hong, X.2
-
45
-
-
0031652485
-
GloMoSim: A library for parallel simulation of large scale wireless networks
-
May
-
X. Zeng, R. Bagrodia, and M. Gerla, "GloMoSim: A Library for Parallel Simulation of Large Scale Wireless Networks," Proc. 12th Workshop Paralkl and Distributed Simulations (PADS '98), pp. 154-161, May 1998.
-
(1998)
Proc. 12th Workshop Paralkl and Distributed Simulations (PADS '98)
, pp. 154-161
-
-
Zeng, X.1
Bagrodia, R.2
Gerla, M.3
-
46
-
-
84860044238
-
-
Shamus Software Ltd., Miracl library
-
Shamus Software Ltd., Miracl library, http://indigo.ie/~mscott/, 2005.
-
(2005)
-
-
-
47
-
-
0004102023
-
-
Aug.
-
R. Rivest, M. Robshaw, R. Sidney, and L. Yin, "The RC6 Block Cipher," v1.1, Aug. 1998, http://www.rsasecurity.com/rsalabs/rc6/.
-
(1998)
"The RC6 Block Cipher," V1.1
-
-
Rivest, R.1
Robshaw, M.2
Sidney, R.3
Yin, L.4
-
48
-
-
35048900981
-
On the selection of pairing-friendly groups
-
P. Barreto, B. Lynn, and M. Scott, "On the Selection of Pairing-Friendly Groups," Selected Areas in Cryptography - SAC '03, pp. 17-25, 2004.
-
(2004)
Selected Areas in Cryptography - SAC '03
, pp. 17-25
-
-
Barreto, P.1
Lynn, B.2
Scott, M.3
-
49
-
-
27244459151
-
-
submittted preprint
-
T. Kerins, W. Marnane, E. Popovici, and P. Barreto, "A Hardware Accelerator for Pairing Based Cryptosystems," submittted preprint, 2005, http://paginas.terra.com.br/informatica/paulobarreto.
-
(2005)
A Hardware Accelerator for Pairing Based Cryptosystems
-
-
Kerins, T.1
Marnane, W.2
Popovici, E.3
Barreto, P.4
|