-
1
-
-
84947251443
-
-
F. Stajano, R.J. Anderson, The resurrecting duckling: security issues for ad-hoc wireless networks, in: Proceedings of the 7th International Workshop on Security Protocols, 2000, pp. 172-194.
-
-
-
-
2
-
-
34548818188
-
-
N. Shankar, D. Balfanz, Enabling secure ad-hoc communication using contextaware security services, in: Proceedings of Workshop on Security in Ubiquitous Computing (4 UBICOMP), 2002.
-
-
-
-
3
-
-
0018545449
-
How to share a secret?
-
Shamir A. How to share a secret?. Communications of the ACM 22 11 (1979) 612-613
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
4
-
-
0022199386
-
-
B. Chor, S. Goldwasse, S. Micali, B. Awerbuch, Verifiable secret sharing and achieving simultaneity in the presence of faults, in: Proceedings of 26th IEEE Annual Symposium on the Foundations of Computer Science (FOCS), 1985, pp. 383-395.
-
-
-
-
5
-
-
0023538330
-
-
P. Feldman, A practical scheme for non-interactive verifiable secret sharing, in: Proceedings of 28th IEEE Symposium on Foundations of Foundations of Computer Science, 1987, pp. 427-437.
-
-
-
-
6
-
-
84982943258
-
Non-interactive and information-theoretic secure verifiable secret sharing
-
Proceedings of Crypto'91, Springer-Verlag
-
Pedersen T.P. Non-interactive and information-theoretic secure verifiable secret sharing. Proceedings of Crypto'91. LNCS vol. 576 (1991), Springer-Verlag 129-140
-
(1991)
LNCS
, vol.576
, pp. 129-140
-
-
Pedersen, T.P.1
-
7
-
-
84948954277
-
Practical threshold signatures
-
Proceedings of Eurocrypt 2000, Springer-Verlag
-
Shoup V. Practical threshold signatures. Proceedings of Eurocrypt 2000. LNCS vol. 1807 (2000), Springer-Verlag 207-220
-
(2000)
LNCS
, vol.1807
, pp. 207-220
-
-
Shoup, V.1
-
8
-
-
84947926543
-
Robust threshold DSS signatures
-
Proceedings of Eurocrypt'96, Springer-Verlag
-
Gennaro R., Jarecki S., Krawczyk H., and Rabin T. Robust threshold DSS signatures. Proceedings of Eurocrypt'96. LNCS vol. 1070 (1996), Springer-Verlag 354-371
-
(1996)
LNCS
, vol.1070
, pp. 354-371
-
-
Gennaro, R.1
Jarecki, S.2
Krawczyk, H.3
Rabin, T.4
-
9
-
-
0033357103
-
Securing ad hoc networks
-
Zhou L., and Haas Z.J. Securing ad hoc networks. IEEE Network Magazine 13 6 (1999) 24-30
-
(1999)
IEEE Network Magazine
, vol.13
, Issue.6
, pp. 24-30
-
-
Zhou, L.1
Haas, Z.J.2
-
10
-
-
0345755816
-
-
J. Kong, H. Luo, K. Xu, D.L. Gu, M. Gerla, S. Lu, Adaptive security for multi-layer ad-hoc networks, in: Special Issue of Wireless Communications and Mobile Computing, Wiley Interscience Press, 2002.
-
-
-
-
11
-
-
3142670764
-
-
B. Lehane, L. Doyle, D. O'Mahony, Shared rsa key generation in a mobile ad hoc network, in: Proceedings of IEEE Military Communications Conference (MILCOM 2003), 2003, pp. 814-819.
-
-
-
-
12
-
-
84943807207
-
-
A. Khalili, J. Katz, W.A. Arbaugh, Toward secure key distribution in truly ad-hoc networks, in: Proceedings of 2003 Symposium on Applications and the Internet Workshops, 2003, pp. 342-346.
-
-
-
-
13
-
-
13244255381
-
-
S. Yi, R. Kravits, Composite key management for ad hoc networks, in: Proceedings of the First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services (MOBIQUITOUS 2004), 2004, pp. 52-61.
-
-
-
-
14
-
-
20344362166
-
-
G. Xu, L. Iftode, Locality driven key management architecture for mobile ad-hoc networks, in: Proceedings for the 1st IEEE International Conference on Mobile Ad-hoc and Sensor Systems, 2004.
-
-
-
-
15
-
-
84883869163
-
-
H. Luo, P. Zerfos, J. Kong, S. Lu, L. Zhang, Self-securing ad hoc wireless networks, in: Proceedings of the Seventh International Symposium on Computers and Communications (ISCC'02), 2002, pp. 567-574.
-
-
-
-
16
-
-
0035704362
-
-
J. Kong, P. Zerfos, H. Luo, S. Lu, L. Zhang, Providing robust and ubiquitous security support for mobile ad hoc networks, in: Proceedings of the 9th International Conference on Network Protocols (ICNP), 2001, pp. 251-260.
-
-
-
-
17
-
-
34548851762
-
-
S. Chokhani, W. Ford, R. Sabett, C. Merrill, Internet X.509 public key infrastructure certificate policy and certification practices framework, Internet Request for Comments (RFC 3647), November 2003.
-
-
-
-
20
-
-
0035789229
-
-
J.-P. Hubaux, L. Buttyan, S. Capkun, The quest for security in mobile ad hoc networks, in: Proceedings of ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 2001), 2001, pp. 146-155.
-
-
-
-
21
-
-
34548847222
-
-
R. Housley, W. Polk, W. Ford, D. Solo, Internet X.509 public key infrastructure certificate and certificate revocation list (CRL) profile, Internet Request for Comments (RFC 3280), April 2002.
-
-
-
-
22
-
-
34548854297
-
-
M. Myers, R. Ankney, A. Malpani, S. Galperin, C. Adams, X.509 internet public key infrastructure online certificate status protocol - OCSP, Internet Request for Comments (RFC 2560), June 1999.
-
-
-
-
23
-
-
0034590150
-
-
L. Venkatraman, D.P. Agrawal, A novel authentication scheme for ad hoc networks, in: Proceedings of IEEE Wireless Communications and Networking Conference (WCNC), vol. 3, 2000, pp. 1268-1273.
-
-
-
-
24
-
-
4544255199
-
-
A. Weimerskirch, D. Westhoff, Identity certified authentication for ad-hoc networks, in: Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks (SASN'03), 2003, pp. 33-40.
-
-
-
-
25
-
-
4544385707
-
-
T.S. Messerges, J. Cukier, T.A.M. Kevenaar, L. Puhl, R. Struik, E. Callaway, A security design for a general purpose, self-organizing, multihop ad hoc wireless network, in: Proceedings of the 1st ACM Workshop on Security of Ad hoc and Sensor Networks, 2003, pp. 1-11.
-
-
-
-
26
-
-
21644442546
-
-
S.L. Keoh, E. Lupu, M. Sloman, PEACE: a policy-based establishment of ad-hoc communities, in: Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC), 2004, pp. 386-395.
-
-
-
-
27
-
-
77953755238
-
-
M.C. Morogan, S. Muftic, Certificate management in ad hoc networks, in: Symposium on Applications and the Internet Workshops (SAINT 2003), 2003, pp. 337-341.
-
-
-
-
28
-
-
34548826013
-
-
R.R.S. Verma, D. O'Mahony, H. Tewari, Progressive authentication in ad hoc networks, in: Proceedings of the Fifth European Wireless Conference, 2004.
-
-
-
-
29
-
-
0036999160
-
-
C. Candolin, H. Kari, A security architecture for wireless ad hoc networks, in: Proceedings of IEEE Milcom 2002, 2002.
-
-
-
-
30
-
-
4544374484
-
-
C. Crépeau, C.R. Davis, A certificate revocation scheme for wireless ad hoc networks, in: Proceedings of 1st ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN 2003), 2003, pp. 54-61.
-
-
-
-
31
-
-
34548855403
-
-
C.R. Davis, A localized trust management scheme for ad hoc networks, in: 3rd International Conference on Networking (ICN'04), 2004, pp. 671-675.
-
-
-
-
32
-
-
0242696192
-
-
S. Buchegger, J. Le Boudec, Performance analysis of the CONFIDANT protocol, in: Proceedings of the 3rd ACM International Symposium on Mobile Ad hoc Networking and Computing (MobiHoc'02), 2002, pp. 226-236.
-
-
-
-
33
-
-
0002101577
-
Reputation systems
-
Resnick P., Kuwabara K., Zeckhauser R., and Friedman E. Reputation systems. Communications of the ACM 43 12 (2000) 45-48
-
(2000)
Communications of the ACM
, vol.43
, Issue.12
, pp. 45-48
-
-
Resnick, P.1
Kuwabara, K.2
Zeckhauser, R.3
Friedman, E.4
-
34
-
-
3042714261
-
-
J. Schneider, G. Kortuem, J. Jager, S. Fickas, Z. Segall, Disseminating trust information in wearable communities, in: Proceedings of 2nd International Symposium on Handheld and Ubitquitous Computing, 2000.
-
-
-
-
35
-
-
34548825166
-
-
L. Page, S. Brin, R. Motwani, T. Winograd, The pagerank citation ranking: bringing order to the web, in: 7th International World Wide Web Conference (WWW Consortium), 1998, pp. 161-172.
-
-
-
-
36
-
-
84880467894
-
-
S.D. Kamvar, M.T. Schlosser, H. Garcia-Molina, The eigentrust algorithm for reputation management in p2p networks, in: Proceedings of the Twelfth International World Wide Web Conference, 2003.
-
-
-
-
37
-
-
84944078503
-
-
L. Xiong, L. Liu, A reputation-based trust model for peer-to-peer ecommerce communities, in: IEEE Conference on ECommerce (CEC'03), 2003, pp. 275-284.
-
-
-
-
38
-
-
0038717615
-
-
M. Gupta, P. Judge, M. Ammar, A reputation system for peer-to-peer networks, in: Proceedings of ACM 13th International Workshop on Network and Operating Systems Support for Digital Audio and Video, 2003.
-
-
-
-
39
-
-
35248858458
-
-
C.Y. Liau, X. Zhou, S. Bressan, K.-L. Tan, Efficient distributed reputation scheme for peer-to-peer systems, in: Proceedings of the 2nd International Human.Society@Internet, 2003, pp. 54-63.
-
-
-
-
40
-
-
34548852259
-
-
T.D. Huynh, N.R. Jennings, N.R. Shadbolt, Fire: an integrated trust and reputation model for open multi-agent systems, in: Proceedings of the 16th European Conference on Artificial Intelligence (ECAI), 2004, pp. 18-20.
-
-
-
-
41
-
-
84974678544
-
-
B. Yu, M.P. Singh, A social mechanism of reputation management in electronic communities, in: Proceedings of the 4th International Workshop on Cooperative Information Agents, 2000, pp. 154-165.
-
-
-
-
42
-
-
85094162508
-
-
A. Abdul-Rahman, S. Hailes, Supporting trust in virtual communities, in: Proceedings of Hawaii International Conference on System Sciences HICSS, 2000.
-
-
-
-
43
-
-
0035747559
-
-
K. Aberer, Z. Despotovic, Managing trust in a peer-2-peer information system, in: Proceedings of the Tenth International Conference on Information and Knowledge Management (CIKM01), 2001, pp. 310-317.
-
-
-
-
44
-
-
34548827392
-
-
Q. Zhang, T. Yu, K. Irwin, A classification scheme for trust functions in reputation-based trust management, in: Proceedings of ISWC Workshop on Trust, Security, and Reputation on the Semantic Web, 2004.
-
-
-
-
45
-
-
29844454971
-
-
J. Kong, X. Hong, Y. Yi, J.-S. Park, J. Liu, M. Gerla, A secure ad-hoc routing approach using localized self-healing communities, in: Proceedings of the 6th ACM International Symposium on Mobile Ad hoc Networking and Computing (MobiHoc'05), 2005, pp. 254-265.
-
-
-
-
46
-
-
0019634370
-
Password authentication with insecure communication
-
Lamport L. Password authentication with insecure communication. Communications of the ACM 24 11 (1981) 770-772
-
(1981)
Communications of the ACM
, vol.24
, Issue.11
, pp. 770-772
-
-
Lamport, L.1
-
47
-
-
34548839673
-
-
N.I. of Standards, Technology, Secure hash standard, Federal Information Processing Standards Publications (FIPS PUBS) 180-1, April 1995.
-
-
-
-
48
-
-
34548839162
-
-
R.L. Rivest, The md5 message-digest algorithm, Internet Request for Comments (RFC 1321), April 1992.
-
-
-
-
49
-
-
34548857683
-
-
H. Krawczyk, M. Bellare, R. Canetti, Hmac: Keyed-hashing for message authentication, Internet Request for Comments (RFC 2104), February 1997.
-
-
-
-
50
-
-
0242426103
-
The tesla broadcast authentication protocol
-
Perrig A., Canetti R., Tygar D., and Song D. The tesla broadcast authentication protocol. Cryptobytes (RSA Laboratories, Summer/Fall 2002) 5 2 (2002) 2-13
-
(2002)
Cryptobytes (RSA Laboratories, Summer/Fall 2002)
, vol.5
, Issue.2
, pp. 2-13
-
-
Perrig, A.1
Canetti, R.2
Tygar, D.3
Song, D.4
-
51
-
-
4544258840
-
-
Y. Huang, W. Lee, A cooperative intrusion detection system for ad hoc networks, in: Proceedings of ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN'03), 2003, pp. 135-147.
-
-
-
-
52
-
-
4143084830
-
-
H. Deng, Q.-A. Zeng, D.P. Agrawal, Svm-based intrusion detection system for wireless ad hoc networks, in: Proceedings of the IEEE 58th Vehicular Technology Conference (VTC 2003-Fall), 2003, pp. 2147-2151.
-
-
-
|