-
2
-
-
0036688074
-
-
AKYILDIZ, I. F., SU, W., SANKARASUBRAMANIAM, Y., AND CAYIBCI. 2002. A survey on sensor networks. IEEE Commun. Mag. 40, 8 (Aug.), 102-114.
-
AKYILDIZ, I. F., SU, W., SANKARASUBRAMANIAM, Y., AND CAYIBCI. 2002. A survey on sensor networks. IEEE Commun. Mag. 40, 8 (Aug.), 102-114.
-
-
-
-
4
-
-
0027693935
-
Diversity coding for transparent self-healing and fault-tolerant communication networks
-
AYANOGLU, E., I, C.-L., GITLIN, R. D., AND MAZO, J. E. 1993. Diversity coding for transparent self-healing and fault-tolerant communication networks. IEEE Trans. Commun. 41, 11, 1677-1686.
-
(1993)
IEEE Trans. Commun
, vol.41
, Issue.11
, pp. 1677-1686
-
-
AYANOGLU, E.I.C.-L.1
GITLIN, R.D.2
MAZO, J.E.3
-
6
-
-
0000893265
-
An optimal class of symmetric key generation systems
-
BLOM, R. 1985. An optimal class of symmetric key generation systems. In Proceedings of EUROCRYPT'84.
-
(1985)
Proceedings of EUROCRYPT'84
-
-
BLOM, R.1
-
7
-
-
0842289235
-
Bootstrapping security associations for routing in mobile ad-hoc networks
-
BOBBA, R. B., ESCHENAUER, L., GLIGOR, V. D., AND ARBAUGH, W. 2003. Bootstrapping security associations for routing in mobile ad-hoc networks. In Proceedings of the IEEE Global Telecommunications Conference.
-
(2003)
Proceedings of the IEEE Global Telecommunications Conference
-
-
BOBBA, R.B.1
ESCHENAUER, L.2
GLIGOR, V.D.3
ARBAUGH, W.4
-
10
-
-
85028765277
-
Perfectly-secure key distribution for dynamic conferences
-
BUNDO, C., DE SANTIS, A., HERZBERG, A., KUTTEN, S., VACCARO, U., AND YUNG, M. 1993. Perfectly-secure key distribution for dynamic conferences. In Proceedings of CRYPTO'92.
-
(1993)
Proceedings of CRYPTO'92
-
-
BUNDO, C.1
DE SANTIS, A.2
HERZBERG, A.3
KUTTEN, S.4
VACCARO, U.5
YUNG, M.6
-
12
-
-
0042660545
-
Stimulating cooperation in self-organizing mobile ad hoc networks
-
BUTTYAN, L. AND HUBAUX, J. P. 2003. Stimulating cooperation in self-organizing mobile ad hoc networks. ACM Mobile Netw. Appl. 8, 5, 579-592.
-
(2003)
ACM Mobile Netw. Appl
, vol.8
, Issue.5
, pp. 579-592
-
-
BUTTYAN, L.1
HUBAUX, J.P.2
-
13
-
-
31344438973
-
Proc. IEEE (Special Issue on Cryptography and Security) 94
-
2
-
CAGALJ, M., CAPKUN, S., AND HUBAUX, J. 2006. Key agreement in peer-to-peer wireless networks. Proc. IEEE (Special Issue on Cryptography and Security) 94, 2, 467-478.
-
(2006)
, pp. 467-478
-
-
CAGALJ, M.1
CAPKUN, S.2
HUBAUX, J.3
-
15
-
-
0242678584
-
Self-organized public-key management for mobile ad hoc networks
-
CAPKUN, S., BUTTYAN, L., AND HUBAUX, J.-P. 2003b. Self-organized public-key management for mobile ad hoc networks. IEEE Trans. Mobile Comput. 2, 1, 52-64.
-
(2003)
IEEE Trans. Mobile Comput
, vol.2
, Issue.1
, pp. 52-64
-
-
CAPKUN, S.1
BUTTYAN, L.2
HUBAUX, J.-P.3
-
16
-
-
32844466166
-
Mobility helps peer-to-peer security
-
CAPKUN, S., HUBAUX, J., AND BUTTYAN, L. 2006. Mobility helps peer-to-peer security. IEEE Trans. Mobile Comput. 5, 1, 43-51.
-
(2006)
IEEE Trans. Mobile Comput
, vol.5
, Issue.1
, pp. 43-51
-
-
CAPKUN, S.1
HUBAUX, J.2
BUTTYAN, L.3
-
17
-
-
1542269147
-
Manycast: Exploring the space between anycast and multicast in ad hoc networks
-
CARTER, C., YI, S., RATANCHANDANI, P., AND KRAVETS, R. 2003. Manycast: Exploring the space between anycast and multicast in ad hoc networks. In Proceedings of the 9th Annual International Conference on Mobile Computing and Networking (MOBICOM'03).
-
(2003)
Proceedings of the 9th Annual International Conference on Mobile Computing and Networking (MOBICOM'03)
-
-
CARTER, C.1
YI, S.2
RATANCHANDANI, P.3
KRAVETS, R.4
-
20
-
-
25844435733
-
PIKE: Peer intermediaries for key establishment in sensor networks
-
CHAN, H. AND PERRIG, A. 2005. PIKE: Peer intermediaries for key establishment in sensor networks. In Proceedings of INFOCOM'05.
-
(2005)
Proceedings of INFOCOM
, vol.5
-
-
CHAN, H.1
PERRIG, A.2
-
22
-
-
3042548790
-
A zonal algorithm for clustering ad hoc networks
-
CHEN, Y P. AND LIESTMAN, A. L. 2003. A zonal algorithm for clustering ad hoc networks. Int. J. Foundat. Comput. Sci. 14, 2, 305-322.
-
(2003)
Int. J. Foundat. Comput. Sci
, vol.14
, Issue.2
, pp. 305-322
-
-
CHEN, Y.P.1
LIESTMAN, A.L.2
-
24
-
-
0004118143
-
A secure routing protocol for ad hoc networks
-
Tech. rep. UM-CS-2001-037. University of Massachusetts, Amherst, MA
-
DAHILL, B., LEVINE, E., ROYER, E., AND SHIELDS, C. 2001. A secure routing protocol for ad hoc networks. Tech. rep. UM-CS-2001-037. University of Massachusetts, Amherst, MA.
-
(2001)
-
-
DAHILL, B.1
LEVINE, E.2
ROYER, E.3
SHIELDS, C.4
-
25
-
-
34147105030
-
-
M. S. thesis in Electronic Engineering. Department of Electrical, Electronic and Computer Engineering, University of Natal, Durban, South Africa
-
DEARHAM, N. J. 2003. Development, implementation and quantification of an ad-hoc routing protocol for mobile handheld terminals. M. S. thesis in Electronic Engineering. Department of Electrical, Electronic and Computer Engineering, University of Natal, Durban, South Africa.
-
(2003)
Development, implementation and quantification of an ad-hoc routing protocol for mobile handheld terminals
-
-
DEARHAM, N.J.1
-
27
-
-
0038061165
-
Redistributing secret shares to new access structures and its applications
-
Tech. rep. ISSE-TR-97-01. Department of Information and Software Engineering, School of Information Technology and Engineering, George Mason University, Fairfax, VA
-
DESMEDT, Y. AND JAJODIA, S. 1997. Redistributing secret shares to new access structures and its applications. Tech. rep. ISSE-TR-97-01. Department of Information and Software Engineering, School of Information Technology and Engineering, George Mason University, Fairfax, VA.
-
(1997)
-
-
DESMEDT, Y.1
JAJODIA, S.2
-
28
-
-
0020720357
-
On the security of public key protocols
-
DOLEV, D. AND YAO, A. C. 1983. On the security of public key protocols. IEEE Trans. Inform. Theor. 29, 2, 198-208.
-
(1983)
IEEE Trans. Inform. Theor
, vol.29
, Issue.2
, pp. 198-208
-
-
DOLEV, D.1
YAO, A.C.2
-
30
-
-
8344262333
-
A key management scheme for wireless sensor networks using deployment knowledge
-
DU, W., DENG, J., HAN, Y., CHEN, S., AND VAHSHNEY, P. 2004. A key management scheme for wireless sensor networks using deployment knowledge. In Proceedings of INFOCOM'04.
-
(2004)
Proceedings of INFOCOM
, vol.4
-
-
DU, W.1
DENG, J.2
HAN, Y.3
CHEN, S.4
VAHSHNEY, P.5
-
31
-
-
3042783638
-
A pairwise key pre-distribution scheme for wireless sensor networks
-
CCS
-
DU, W., DENG, J., HAN, Y. S., AND VARSHNEY, P. K. 2003. A pairwise key pre-distribution scheme for wireless sensor networks. In Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS).
-
(2003)
Proceedings of the 10th ACM Conference on Computer and Communications Security
-
-
DU, W.1
DENG, J.2
HAN, Y.S.3
VARSHNEY, P.K.4
-
32
-
-
23244467182
-
A pairwise key pre-distribution scheme for wireless sensor networks
-
DU, W., DENG, J., HAN, Y. S., VARSHNEY, P. K., KATZ, J., AND KHALILI, A. 2005. A pairwise key pre-distribution scheme for wireless sensor networks. ACM Trans. Inform. Syst. Secur. 8, 2, 228-258.
-
(2005)
ACM Trans. Inform. Syst. Secur
, vol.8
, Issue.2
, pp. 228-258
-
-
DU, W.1
DENG, J.2
HAN, Y.S.3
VARSHNEY, P.K.4
KATZ, J.5
KHALILI, A.6
-
37
-
-
49049089688
-
Secure distributed key generation for discrete-log based cryptosystems
-
GENNARO, R., JARECKI, S., KRAWCZYK, H., AND RABIN, T. 1999. Secure distributed key generation for discrete-log based cryptosystems. In Proceedings of the Conference on Advances in Cryptology (EUROCRYPT'99).
-
(1999)
Proceedings of the Conference on Advances in Cryptology (EUROCRYPT'99)
-
-
GENNARO, R.1
JARECKI, S.2
KRAWCZYK, H.3
RABIN, T.4
-
38
-
-
0038233161
-
Wireless ad hoc networks
-
J. Proakis, Ed. John Wiley, New York, NY
-
HAAS, Z. J., DENG, J., LIANG, B., PAPADIMITRATOS, P., AND SAJAMA, S. 2002. Wireless ad hoc networks. In Encyclopedia of Telecommunications, J. Proakis, Ed. John Wiley, New York, NY.
-
(2002)
Encyclopedia of Telecommunications
-
-
HAAS, Z.J.1
DENG, J.2
LIANG, B.3
PAPADIMITRATOS, P.4
SAJAMA, S.5
-
41
-
-
0000299804
-
Proactive secret sharing or: How to cope with perpetual leakage
-
HERZBERG, A., JARACKI, S., KRAWCZYK, H., AND YUNG, M. 1995. Proactive secret sharing or: How to cope with perpetual leakage. In Proceedings of the Conference on Advances in Cryptology (CRYPTO'95).
-
(1995)
Proceedings of the Conference on Advances in Cryptology (CRYPTO'95)
-
-
HERZBERG, A.1
JARACKI, S.2
KRAWCZYK, H.3
YUNG, M.4
-
44
-
-
14844314204
-
Location-aware key management scheme for wireless sensor networks
-
SASN
-
HUANG, D., MEHTA, M., MEDHI, D., AND HAHN, L. 2004. Location-aware key management scheme for wireless sensor networks. In Proceedings of the ACM Workshop on Security for Ad Hoc and Sensor Networks (SASN).
-
(2004)
Proceedings of the ACM Workshop on Security for Ad Hoc and Sensor Networks
-
-
HUANG, D.1
MEHTA, M.2
MEDHI, D.3
HAHN, L.4
-
46
-
-
0000629443
-
Dynamic source routing in ad-hoc wireless networks
-
T. Imielinski and H. Korth, Eds. Kluwer Academic Publishers
-
JOHNSON, D. B. AND MALTZ, D. A. 1996. Dynamic source routing in ad-hoc wireless networks. In Mobile Computing, T. Imielinski and H. Korth, Eds. Kluwer Academic Publishers, 153-181.
-
(1996)
Mobile Computing
, pp. 153-181
-
-
JOHNSON, D.B.1
MALTZ, D.A.2
-
48
-
-
28444488609
-
Secure, redundant, and fully distributed key management scheme for mobile ad hoc networks: An analysis
-
JOSHI, D., NAMUDURI, K., AND PENDSE, R. 2005. Secure, redundant, and fully distributed key management scheme for mobile ad hoc networks: An analysis. EURASIP J. Wireless Commun. Netw. 4, 579-589.
-
(2005)
EURASIP J. Wireless Commun. Netw
, vol.4
, pp. 579-589
-
-
JOSHI, D.1
NAMUDURI, K.2
PENDSE, R.3
-
49
-
-
0008482739
-
ID-based secret-key cryptography
-
JOYE, M. AND YEN, S.-M. 1998. ID-based secret-key cryptography. ACM Operat. Syst. Rev. 32, 4, 33-39.
-
(1998)
ACM Operat. Syst. Rev
, vol.32
, Issue.4
, pp. 33-39
-
-
JOYE, M.1
YEN, S.-M.2
-
50
-
-
0023139974
-
The DARPA Packet Radio Network Protocol
-
JUBIN, J. AND TORNOW, J. D. 1987. The DARPA Packet Radio Network Protocol. IEEE 75, 1, 21-32.
-
(1987)
IEEE 75
, vol.1
, pp. 21-32
-
-
JUBIN, J.1
TORNOW, J.D.2
-
53
-
-
3142512728
-
Tree-based group key agreement
-
KIM, Y., PERRIG, A., AND TSUDIK, G. 2004. Tree-based group key agreement. ACM Trans. Inform. Syst. Sec. 7, 1, 60-96.
-
(2004)
ACM Trans. Inform. Syst. Sec. 7
, vol.1
, pp. 60-96
-
-
KIM, Y.1
PERRIG, A.2
TSUDIK, G.3
-
54
-
-
0035704362
-
Providing robust and ubiquitous security support for mobile ad-hoc networks
-
KONG, J., ZERFOS, P., LUO, H., LU, S., AND ZHANG, L. 2001. Providing robust and ubiquitous security support for mobile ad-hoc networks. In Proceedings of the Ninth International Conference on Network Protocols (ICNP'01).
-
(2001)
Proceedings of the Ninth International Conference on Network Protocols (ICNP'01)
-
-
KONG, J.1
ZERFOS, P.2
LUO, H.3
LU, S.4
ZHANG, L.5
-
55
-
-
0033181509
-
t, n) Threshold digital signature with traceability property
-
LEE, W.-B. AND CHANG, C.-C. 1999. (t, n) Threshold digital signature with traceability property. J. Inform. Sci. Eng. 15, 5, 669-678.
-
(1999)
J. Inform. Sci. Eng
, vol.15
, Issue.5
, pp. 669-678
-
-
LEE, W.-B.1
CHANG, C.-C.2
-
57
-
-
84890041672
-
Group-oriented (t, n) threshold digital signature schemes with traceable signers
-
ISEC
-
LI, Z.-C., ZHANG, J.-M., LUO, J., SONG, W., AND DAI, Y.-Q. 2001. Group-oriented (t, n) threshold digital signature schemes with traceable signers. In Proceedings of Topics in Electronic Commerce, Second International Symposium (ISEC 2001).
-
(2001)
Proceedings of Topics in Electronic Commerce, Second International Symposium
-
-
LI, Z.-C.1
ZHANG, J.-M.2
LUO, J.3
SONG, W.4
DAI, Y.-Q.5
-
61
-
-
16644374371
-
Establishing pairwise keys in distributed sensor networks
-
LIU, D., NING, P., AND RONGFANG, L. 2005b. Establishing pairwise keys in distributed sensor networks. ACM Trans. Inform. Syst. Sec. 8, 1, 41-77.
-
(2005)
ACM Trans. Inform. Syst. Sec. 8
, vol.1
, pp. 41-77
-
-
LIU, D.1
NING, P.2
RONGFANG, L.3
-
62
-
-
84883869163
-
Self-securing ad hoc wireless networks
-
LUO, H., ZERFOS, P., KONG, J., LU, S., AND ZHANG, L. 2002. Self-securing ad hoc wireless networks. In Proceedings of the Seventh International Symposium on Computers and Communications (ISCC'02).
-
(2002)
Proceedings of the Seventh International Symposium on Computers and Communications (ISCC'02)
-
-
LUO, H.1
ZERFOS, P.2
KONG, J.3
LU, S.4
ZHANG, L.5
-
64
-
-
84944878354
-
-
CRC Press, Boca Raton, FL
-
MENEZES, A., VAN OORSCHOT, P., AND VANSTONE, S. 1996. Handbook in Applied Cryptography. CRC Press, Boca Raton, FL.
-
(1996)
Handbook in Applied Cryptography
-
-
MENEZES, A.1
VAN OORSCHOT, P.2
VANSTONE, S.3
-
66
-
-
84978970834
-
Carnet: A scalable ad hoc wireless network system
-
MORRIS, R., JANNOTTI, J., KAASHOEK, F., LI, J., AND DECOUTO, D. 2000. Carnet: A scalable ad hoc wireless network system. In Proceedings of the 9th ACM SIGOPS European Workshop.
-
(2000)
Proceedings of the 9th ACM SIGOPS European Workshop
-
-
MORRIS, R.1
JANNOTTI, J.2
KAASHOEK, F.3
LI, J.4
DECOUTO, D.5
-
73
-
-
34147146557
-
-
M. S. thesis in Electronic Engineering, Department of Electrical, Electronic and Computer Engineering, University of Natal, Durban, South Africa
-
QUAZI, T. A.-M. 2003. Design and implementation of an on-demand ad-hoc routing algorithm for a positional communication system. M. S. thesis in Electronic Engineering, Department of Electrical, Electronic and Computer Engineering, University of Natal, Durban, South Africa.
-
(2003)
Design and implementation of an on-demand ad-hoc routing algorithm for a positional communication system
-
-
QUAZI, T.A.-M.1
-
74
-
-
85014332650
-
Security in embedded systems: Design challenges
-
RAVI, S., RAGHUNATHAN, A., KOCHER, P., AND HATTANGADY, S. 2004. Security in embedded systems: Design challenges. ACM Trans. Embedd. Comput. Syst. 3, 3, 461-491.
-
(2004)
ACM Trans. Embedd. Comput. Syst. 3
, vol.3
, pp. 461-491
-
-
RAVI, S.1
RAGHUNATHAN, A.2
KOCHER, P.3
HATTANGADY, S.4
-
76
-
-
33644643460
-
Node cooperation in hybrid ad hoc networks
-
SALEM, N. B., BUTTYAN, L., HUBAUX, J.-P., AND JAKOBSSON, M. 2005. Node cooperation in hybrid ad hoc networks. IEEE Trans. Mob. Comput. B, 4, 365-376.
-
(2005)
IEEE Trans. Mob. Comput. B
, vol.4
, pp. 365-376
-
-
SALEM, N.B.1
BUTTYAN, L.2
HUBAUX, J.-P.3
JAKOBSSON, M.4
-
77
-
-
0018545449
-
How to share a secret
-
SHAMIR, A. 1979. How to share a secret. Commun. ACM 22, 11, 612-613.
-
(1979)
Commun. ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
SHAMIR, A.1
-
78
-
-
0034247455
-
Key agreement in dynamic peer groups
-
STEINER, M., TSUDIK, G., AND WAIDNER, M. 2000. Key agreement in dynamic peer groups. IEEE Trans. Parall. Distrib. Syst. 11, 8, 769-780.
-
(2000)
IEEE Trans. Parall. Distrib. Syst
, vol.11
, Issue.8
, pp. 769-780
-
-
STEINER, M.1
TSUDIK, G.2
WAIDNER, M.3
-
79
-
-
0036986445
-
Survivable mobile wireless networks: Issues, challenges, and research directions
-
STERBENZ, J. P. G., KRISHNAN, R., HAIN, R. R., JACKSON, A. W., LEVIN, D., RAMANATHAN, R., AND ZAO, J. 2002. Survivable mobile wireless networks: Issues, challenges, and research directions. In Proceedings of the ACM Workshop on Wireless Security (WiSe'02).
-
(2002)
Proceedings of the ACM Workshop on Wireless Security (WiSe'02)
-
-
STERBENZ, J.P.G.1
KRISHNAN, R.2
HAIN, R.R.3
JACKSON, A.W.4
LEVIN, D.5
RAMANATHAN, R.6
ZAO, J.7
-
82
-
-
0002644727
-
Attacks on threshold signature schemes with traceable signers
-
TSENG, Y.-M. AND JAN, J.-K. 1999. Attacks on threshold signature schemes with traceable signers. Inform. Process. Lett. 71, 1, 1-4.
-
(1999)
Inform. Process. Lett
, vol.71
, Issue.1
, pp. 1-4
-
-
TSENG, Y.-M.1
JAN, J.-K.2
-
83
-
-
0032098148
-
Threshold signature schemes with traceable signers in group communications
-
WANG, C.-T., LIN, C.-H., AND CHANG, C.-C. 1998. Threshold signature schemes with traceable signers in group communications. Comput. Commun. 21, 8, 771-776.
-
(1998)
Comput. Commun
, vol.21
, Issue.8
, pp. 771-776
-
-
WANG, C.-T.1
LIN, C.-H.2
CHANG, C.-C.3
-
84
-
-
34147177188
-
On the security of two threshold signature schemes with traceable signers
-
WANG, G., HAN, X., AND ZHU, B. 2003. On the security of two threshold signature schemes with traceable signers. In Proceedings of Applied Cryptography and Network Security, First International Conference (ACNS 2003).
-
(2003)
Proceedings of Applied Cryptography and Network Security, First International Conference (ACNS 2003)
-
-
WANG, G.1
HAN, X.2
ZHU, B.3
-
86
-
-
34147126522
-
Secure and efficient key management in mobile ad hoc networks
-
WU, B., WU, J., FERNANDEZ, E. B., ILYAS, M., AND MAGLIVERAS, S. 2005a. Secure and efficient key management in mobile ad hoc networks. J. Netw. Comput. Appl.
-
(2005)
J. Netw. Comput. Appl
-
-
WU, B.1
WU, J.2
FERNANDEZ, E.B.3
ILYAS, M.4
MAGLIVERAS, S.5
-
87
-
-
33746299217
-
-
WU, B., WU, J., FERNANDEZ, E. B., AND MAGLIVERAS, S. 2005b. Secure and efficient key management in mobile ad hoc networks. In Proceedings of the First International Workshop on Systems and Network Security (SNS2005) (in conjunction with IPDPS).
-
WU, B., WU, J., FERNANDEZ, E. B., AND MAGLIVERAS, S. 2005b. Secure and efficient key management in mobile ad hoc networks. In Proceedings of the First International Workshop on Systems and Network Security (SNS2005) (in conjunction with IPDPS).
-
-
-
-
88
-
-
2342489478
-
Cryptanalysis of group-oriented (t, n) threshold digital signature schemes with traceable signers
-
WU, T.-S. AND HSU, C.-L. 2004. Cryptanalysis of group-oriented (t, n) threshold digital signature schemes with traceable signers. Comput. Stand. Interfac. 26, 5, 477-481.
-
(2004)
Comput. Stand. Interfac
, vol.26
, Issue.5
, pp. 477-481
-
-
WU, T.-S.1
HSU, C.-L.2
-
90
-
-
34147157884
-
-
YI, S. AND KHAVETS, R. 2001. Practical PKI for ad hoc wireless networks. Tech. rep. UIUCDCS-R-2002-2273, UILU-ENG-2002-1717. Department of Computer Science, University of Illinois at Urbana-Champaign, Urbana, IL.
-
YI, S. AND KHAVETS, R. 2001. Practical PKI for ad hoc wireless networks. Tech. rep. UIUCDCS-R-2002-2273, UILU-ENG-2002-1717. Department of Computer Science, University of Illinois at Urbana-Champaign, Urbana, IL.
-
-
-
-
91
-
-
34147093793
-
-
YI, S. AND KRAVETS, R. 2002a. Key management for heterogeneous ad hoc wireless networks. Tech. rep. UIUCDCS-R-2002-2290, UILU-ENG-2002-1734. Department of Computer Science, University of Illinois. at Urbana-Champaign, Urbana, IL.
-
YI, S. AND KRAVETS, R. 2002a. Key management for heterogeneous ad hoc wireless networks. Tech. rep. UIUCDCS-R-2002-2290, UILU-ENG-2002-1734. Department of Computer Science, University of Illinois. at Urbana-Champaign, Urbana, IL.
-
-
-
-
97
-
-
0033357103
-
-
ZHOU, L. AND HAAS, Z. J. 1999. Securing ad hoc networks. IEEE Netw. (Special Issue on Network Security) 13, 6, 24-30.
-
ZHOU, L. AND HAAS, Z. J. 1999. Securing ad hoc networks. IEEE Netw. (Special Issue on Network Security) 13, 6, 24-30.
-
-
-
|