-
1
-
-
84946147994
-
Information service on scalable ad-hoc mobile wireless networks
-
Shanghai, China, Oct.
-
Lin H Y, Huang Y M. Information service on scalable ad-hoc mobile wireless networks. In Proc. the IEEE International Conference on Computer Networks and Mobile Computing, Shanghai, China, Oct. 2003, pp.190-196.
-
(2003)
Proc. the IEEE International Conference on Computer Networks and Mobile Computing
, pp. 190-196
-
-
Lin, H.Y.1
Huang, Y.M.2
-
2
-
-
15244362289
-
Password-only authenticated key establishment protocol without public key cryptography
-
Feb.
-
Ding L, Lai C S, Huang Y M. Password-only authenticated key establishment protocol without public key cryptography. IEE Electronic Letters, Feb. 2005, 41(4): 185-186.
-
(2005)
IEE Electronic Letters
, vol.41
, Issue.4
, pp. 185-186
-
-
Ding, L.1
Lai, C.S.2
Huang, Y.M.3
-
3
-
-
0034317075
-
Key agreement in ad hoc networks
-
Asokan N, Ginzboorg P. Key agreement in ad hoc networks. Computer Communications, 2000, 23(17): 1627-1637.
-
(2000)
Computer Communications
, vol.23
, Issue.17
, pp. 1627-1637
-
-
Asokan, N.1
Ginzboorg, P.2
-
4
-
-
0033748607
-
New multiparty authentication services and key agreement protocols
-
April
-
Ateniese G, Steiner M, Tsudik G. New multiparty authentication services and key agreement protocols. IEEE J. Selected Areas in Communications, April 2000, 18(4): 628-639.
-
(2000)
IEEE J. Selected Areas in Communications
, vol.18
, Issue.4
, pp. 628-639
-
-
Ateniese, G.1
Steiner, M.2
Tsudik, G.3
-
5
-
-
0035704362
-
Providing robust and ubiquitous security support for mobile ad-hoc networks
-
Riverside, California, USA, Nov.
-
Kong J, Zerfos P, Luo H et al. Providing robust and ubiquitous security support for mobile ad-hoc networks. In Proc. the 9th Int. Conf. Network Protocols, Riverside, California, USA, Nov. 2001, pp.251-260.
-
(2001)
Proc. the 9th Int. Conf. Network Protocols
, pp. 251-260
-
-
Kong, J.1
Zerfos, P.2
Luo, H.3
-
6
-
-
84948986047
-
Security-aware adaptive dynamic source routing protocol
-
Tampa, Florida, USA, Nov.
-
Ghazizadeh S, Ilghami O, Sirin E, Yaman F. Security-aware adaptive dynamic source routing protocol. In Proc. the 27th Annual IEEE Conference on Local Computer Networks, Tampa, Florida, USA, Nov. 2002, pp.751-760.
-
(2002)
Proc. the 27th Annual IEEE Conference on Local Computer Networks
, pp. 751-760
-
-
Ghazizadeh, S.1
Ilghami, O.2
Sirin, E.3
Yaman, F.4
-
7
-
-
0035789243
-
Security-aware ad hoc routing for wireless networks
-
Long Beach, California, USA, Aug.
-
Yi S, Naldurg P, Kravets R. Security-aware ad hoc routing for wireless networks. In Proc. the 2nd ACM Symposium on Mobile Ad Hoc Networking and Computing, Long Beach, California, USA, Aug. 2001, pp.299-302.
-
(2001)
Proc. the 2nd ACM Symposium on Mobile Ad Hoc Networking and Computing
, pp. 299-302
-
-
Yi, S.1
Naldurg, P.2
Kravets, R.3
-
8
-
-
26444471877
-
Resilient cluster-organizing key management and secure routing protocol for mobile ad hoc networks
-
Sept.
-
Lin H Y, Huang Y M, Wang T I. Resilient cluster-organizing key management and secure routing protocol for mobile ad hoc networks. IEICE Trans. Communications, Sept. 2005, E88-B(9): 3598-3613.
-
(2005)
IEICE Trans. Communications
, vol.E88-B
, Issue.9
, pp. 3598-3613
-
-
Lin, H.Y.1
Huang, Y.M.2
Wang, T.I.3
-
9
-
-
0033357103
-
Securing ad hoc networks
-
Nov./Dec.
-
Zhou L, Haas Z. Securing ad hoc networks. IEEE Network Magazine, Nov./Dec. 1999, 13(6): 24-30.
-
(1999)
IEEE Network Magazine
, vol.13
, Issue.6
, pp. 24-30
-
-
Zhou, L.1
Haas, Z.2
-
10
-
-
2342542302
-
CLTC: A cluster-based topology control framework for ad hoc networks
-
Jan.-Feb.
-
Shen C C, Srisathapornphat C, Liu R et al. CLTC: A cluster-based topology control framework for ad hoc networks. IEEE Trans. Mobile Computing, Jan.-Feb. 2004, 3(1): 18-32.
-
(2004)
IEEE Trans. Mobile Computing
, vol.3
, Issue.1
, pp. 18-32
-
-
Shen, C.C.1
Srisathapornphat, C.2
Liu, R.3
-
12
-
-
84944048103
-
Unconditionally secure proactive secret sharing scheme with combinatorial
-
Kingston, Canada, Aug.
-
Stinson D R, Wei R. Unconditionally secure proactive secret sharing scheme with combinatorial. In Proc. the 6th Annual International Workshop Selected Areas in Cryptography, Kingston, Canada, Aug. 1999, pp.200-214.
-
(1999)
Proc. the 6th Annual International Workshop Selected Areas in Cryptography
, pp. 200-214
-
-
Stinson, D.R.1
Wei, R.2
-
13
-
-
0018545449
-
How to share a secret
-
Shamir A. How to share a secret. Communications of the ACM, 1979, 22(11): 612-613.
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
14
-
-
0036957315
-
Ariadne: A secure on-demand routing protocol for ad hoc networks
-
Atlanta, USA, Sept.
-
Hu Y C, Perrig A, Johnson D B. Ariadne: A secure on-demand routing protocol for ad hoc networks. In Proc. 8th ACM International Conference on Mobile Computing and Networking, Atlanta, USA, Sept. 2002, pp.12-23.
-
(2002)
Proc. 8th ACM International Conference on Mobile Computing and Networking
, pp. 12-23
-
-
Hu, Y.C.1
Perrig, A.2
Johnson, D.B.3
-
15
-
-
0001827537
-
Identity-based cryptosystems and signature schemes
-
Santa Barbara, USA
-
Shamir A. Identity-based cryptosystems and signature schemes. In Proc. CRYPTO, Santa Barbara, USA, 1984, pp.47-53.
-
(1984)
Proc. CRYPTO
, pp. 47-53
-
-
Shamir, A.1
-
16
-
-
0003629990
-
-
NIST FIPS PUB 180. National Institute of Standards and Technology Draft, U.S. Department of Commerce
-
NIST FIPS PUB 180. Secure hash standard. National Institute of Standards and Technology Draft, U.S. Department of Commerce, 1993.
-
(1993)
Secure Hash Standard
-
-
-
18
-
-
34347349933
-
Ad hoc on demand distance vector (AODV) routing
-
New Orleans, LA, USA, Feb.
-
Perkins C E, Royer E M, Das S R. Ad hoc on demand distance vector (AODV) routing. In Proc. 2nd IEEE Workshop on Mobile Computing Systems and Applications, New Orleans, LA, USA, Feb. 1999, pp.90-100.
-
(1999)
Proc. 2nd IEEE Workshop on Mobile Computing Systems and Applications
, pp. 90-100
-
-
Perkins, C.E.1
Royer, E.M.2
Das, S.R.3
-
19
-
-
33745378852
-
A secure on-demand source routing with distributed authentication for trust-based ad hoc networks
-
SpringerVerlag
-
Hsieh M Y, Huang Y M. A secure on-demand source routing with distributed authentication for trust-based ad hoc networks. Lecture Notes in Computer Science 3779, SpringerVerlag, 2005, pp.343-350.
-
(2005)
Lecture Notes in Computer Science
, vol.3779
, pp. 343-350
-
-
Hsieh, M.Y.1
Huang, Y.M.2
-
20
-
-
0032621035
-
A review of current routing protocols for ad-hoc mobile wireless networks
-
Apr.
-
Royer E M, Toh C K. A review of current routing protocols for ad-hoc mobile wireless networks. IEEE Personal Communications Magazine, Apr. 1999, 6(2): 46-55.
-
(1999)
IEEE Personal Communications Magazine
, vol.6
, Issue.2
, pp. 46-55
-
-
Royer, E.M.1
Toh, C.K.2
-
21
-
-
0004118142
-
Dynamic source routing in ad hoc wireless networks
-
draft-ietfmanet-dsr-07.txt, Oct.
-
Broch J, Johnson D B, Maltz D A. Dynamic source routing in ad hoc wireless networks. IETF, Internet Draft, draft-ietfmanet-dsr-07.txt, Oct. 1999, http://www.ietf.org.
-
(1999)
Internet Draft
-
-
Broch, J.1
Johnson, D.B.2
Maltz, D.A.3
-
22
-
-
8344229909
-
A cluster-based security architecture for ad hoc networks
-
Hong Kong, Mar.
-
Bechler M, Hof H J, Kraft D et al. A cluster-based security architecture for ad hoc networks. In Proc. IEEE the Conf. Computer Communications, Hong Kong, Mar. 2004, 23(1): 2393-2403.
-
(2004)
Proc. IEEE the Conf. Computer Communications
, vol.23
, Issue.1
, pp. 2393-2403
-
-
Bechler, M.1
Hof, H.J.2
Kraft, D.3
-
23
-
-
0038706903
-
A generalized clustering algorithm for peer-to-peer networks
-
Bologna, Italy, July
-
Basagni S, Chlamtac I, Farago A. A generalized clustering algorithm for peer-to-peer networks. In Proc. Workshop on Algorithmic Aspects of Comm., Bologna, Italy, July 1997.
-
(1997)
Proc. Workshop on Algorithmic Aspects of Comm.
-
-
Basagni, S.1
Chlamtac, I.2
Farago, A.3
-
24
-
-
0002863367
-
Valuation of trust in open networks
-
Brighton, England, Nov.
-
Beth T, Borcherding M, Klein B. Valuation of trust in open networks. In Proc. the 3rd European Symp. Research in Computer Security, Brighton, England, Nov. 1994, pp.3-18.
-
(1994)
Proc. the 3rd European Symp. Research in Computer Security
, pp. 3-18
-
-
Beth, T.1
Borcherding, M.2
Klein, B.3
-
25
-
-
14844337112
-
Towards provable security for ad hoc routing protocols
-
Washington DC, USA, July
-
Butty'an L, Vajda L. Towards provable security for ad hoc routing protocols. In Proc. the end ACM Workshop on Security of Ad Hoc and Sensor Networks, Washington DC, USA, July 2004, pp.94-105.
-
(2004)
Proc. the End ACM Workshop on Security of Ad Hoc and Sensor Networks
, pp. 94-105
-
-
Butty'an, L.1
Vajda, L.2
-
26
-
-
15244339622
-
Authenticated routing for ad hoc networks
-
March
-
Sanzgiri K, Flamme D L, Dahill B et al. Authenticated routing for ad hoc networks. IEEE Journal on Selected Areas in Communication, March 2005, 23(3): 598-610.
-
(2005)
IEEE Journal on Selected Areas in Communication
, vol.23
, Issue.3
, pp. 598-610
-
-
Sanzgiri, K.1
Flamme, D.L.2
Dahill, B.3
-
27
-
-
0036957315
-
Ariadne: A secure on-demand routing protocol for ad hoc networks
-
Atlanta, Georgia, USA, Sept.
-
Hu Y C, Perrig A, Johnson D B. Ariadne: A secure on-demand routing protocol for ad hoc networks. In Proc. 8th ACM International Conference on Mobile Computing and Networking, Atlanta, Georgia, USA, Sept. 2002, pp.12-23.
-
(2002)
Proc. 8th ACM International Conference on Mobile Computing and Networking
, pp. 12-23
-
-
Hu, Y.C.1
Perrig, A.2
Johnson, D.B.3
-
28
-
-
0242678584
-
Self-organized public-key management for mobile ad hoc networks
-
Jan.
-
Capkun S, Buttyan L, Hubaux J P. Self-organized public-key management for mobile ad hoc networks. IEEE Trans. Mobile Computing, Jan. 2003, 2(1): 52-64.
-
(2003)
IEEE Trans. Mobile Computing
, vol.2
, Issue.1
, pp. 52-64
-
-
Capkun, S.1
Buttyan, L.2
Hubaux, J.P.3
-
29
-
-
0035789229
-
The quest for security in mobile ad hoc networks
-
Long Beach, CA, USA, Oct.
-
Hubaux J P, Buttyan L, Capkun S. The quest for security in mobile ad hoc networks. In Proc. ACM Symp. Mobile Ad Hoc Networking and Computing, Long Beach, CA, USA, Oct. 2001.
-
(2001)
Proc. ACM Symp. Mobile Ad Hoc Networking and Computing
-
-
Hubaux, J.P.1
Buttyan, L.2
Capkun, S.3
-
30
-
-
17144398990
-
MOCA: Mobile certificate authority for wireless ad hoc networks
-
Gaithersburg, Maryland, Apr.
-
Yi S, Kravets R. MOCA: Mobile certificate authority for wireless ad hoc networks. In Proc. the 2nd Annual PKI Research Workshop Program, Gaithersburg, Maryland, Apr. 2003, pp.52-64.
-
(2003)
Proc. the 2nd Annual PKI Research Workshop Program
, pp. 52-64
-
-
Yi, S.1
Kravets, R.2
-
31
-
-
84888068366
-
Two implementation methods of a 1024-bit RSA cryptoprocessor based on modified Montgomery algorithm
-
Sydney, Australia, May
-
Kwon T W, You C S, Heo W S et al. Two implementation methods of a 1024-bit RSA cryptoprocessor based on modified Montgomery algorithm. In Proc. IEEE Int. Symp. Circuits and Systems, Sydney, Australia, May 2001, pp.650-653.
-
(2001)
Proc. IEEE Int. Symp. Circuits and Systems
, pp. 650-653
-
-
Kwon, T.W.1
You, C.S.2
Heo, W.S.3
-
33
-
-
4544360748
-
-
NS-2. (last accessed March 12 2004)
-
NS-2. The network simulator. 1989 (last accessed March 12 2004), http://www.isi.edu/ /nsnam/ns/.
-
(1989)
The Network Simulator
-
-
|