-
1
-
-
0033357103
-
Securing ad hoc networks
-
Nov./Dec
-
L. Zhou and Z. Haas, "Securing ad hoc networks," IEEE Network Magazine, vol. 13, no. 6, pp. 24-30, Nov./Dec. 1999.
-
(1999)
IEEE Network Magazine
, vol.13
, Issue.6
, pp. 24-30
-
-
Zhou, L.1
Haas, Z.2
-
2
-
-
0000328529
-
Mitigating routing misbehavior in mobile ad hoc networks
-
August
-
S. Marti, T. Giuli, K. Lai, and M. Baker, "Mitigating routing misbehavior in mobile ad hoc networks," in Proceedings of MobiCom 2000, August 2000, p. 255265.
-
(2000)
Proceedings of MobiCom 2000
, pp. 255265
-
-
Marti, S.1
Giuli, T.2
Lai, K.3
Baker, M.4
-
4
-
-
0032290722
-
Resilient authentication using path independence
-
December
-
M. K. Reiter and S. G. Stubblebine, "Resilient authentication using path independence," IEEE Transactions on Computers, vol. 47, no. 12, pp. 1351-1362, December 1998.
-
(1998)
IEEE Transactions on Computers
, vol.47
, Issue.12
, pp. 1351-1362
-
-
Reiter, M.K.1
Stubblebine, S.G.2
-
6
-
-
84947294004
-
Modelling a public-key infrastructure
-
Proceedings 1996 European Symposium on Research in Computer SecurityESORICS' 96, of
-
U. Maurer, "Modelling a public-key infrastructure," in Proceedings 1996 European Symposium on Research in Computer Security(ESORICS' 96), volume 1146 of Lecture Notes in Computer Science, 1996, pp. 325-350.
-
(1996)
Lecture Notes in Computer Science
, vol.1146
, pp. 325-350
-
-
Maurer, U.1
-
11
-
-
0029700344
-
Decentralized trust management
-
May
-
M. Blaze, J. Feigenbaum, and J. Lacy, "Decentralized trust management," in Proceedings of the 1996 IEEE Symposium on Security and Privacy, May 1996, pp. 164-173.
-
(1996)
Proceedings of the 1996 IEEE Symposium on Security and Privacy
, pp. 164-173
-
-
Blaze, M.1
Feigenbaum, J.2
Lacy, J.3
-
12
-
-
0033724294
-
Access control meets public key infrastructure or: Assigning roles to strangers
-
May
-
A. Herzberg, Y. Mass, J. Michaeli, D. Naor, and Y. Ravid, "Access control meets public key infrastructure or: Assigning roles to strangers," in Proceedings of the 2000 IEEE Symposium on Security and Privacy, May 2000, pp. 2-14.
-
(2000)
Proceedings of the 2000 IEEE Symposium on Security and Privacy
, pp. 2-14
-
-
Herzberg, A.1
Mass, Y.2
Michaeli, J.3
Naor, D.4
Ravid, Y.5
-
13
-
-
0035680371
-
Certificate chain discovery in spki/sdsi
-
D. Clarke, J.-E. Elien, C. Ellison, M. Fredette, A. Morcos, and R. L. Rivest, "Certificate chain discovery in spki/sdsi," Journal of Computer Security, vol. 9, no. 4, pp. 285-322, 2001.
-
(2001)
Journal of Computer Security
, vol.9
, Issue.4
, pp. 285-322
-
-
Clarke, D.1
Elien, J.-E.2
Ellison, C.3
Fredette, M.4
Morcos, A.5
Rivest, R.L.6
-
17
-
-
25844465866
-
HADOF: Defense against routing disruptions in mobile ad hoc networks
-
March
-
Wei Yu, Yan Sun, and K.J. Ray Liu, "HADOF: Defense against routing disruptions in mobile ad hoc networks," in Proceedings of IEEE INFOCOM'05, March 2005.
-
(2005)
Proceedings of IEEE INFOCOM'05
-
-
Yu, W.1
Sun, Y.2
Ray Liu, K.J.3
-
18
-
-
33846579442
-
-
D. B. Johnson and D. A. Maltz, Dynamic source routing in ad hoc wireless networks, mobile computing, In Moible Computing, edited by Tomasz Imielinski and Hank Korth, Kluwer Academic Publishers, pp. 153-181, 1996.
-
D. B. Johnson and D. A. Maltz, "Dynamic source routing in ad hoc wireless networks, mobile computing," In Moible Computing, edited by Tomasz Imielinski and Hank Korth, Kluwer Academic Publishers, pp. 153-181, 1996.
-
-
-
|