-
2
-
-
3042583499
-
Secure group communication using robust contributory key agreement
-
5
-
Amir, Y., & Kim, Y., et al. (2004). Secure group communication using robust contributory key agreement. IEEE Journal Transactions on Parallel and Distributed Systems, 15(5), 468-480.
-
(2004)
IEEE Journal Transactions on Parallel and Distributed Systems
, vol.15
, pp. 468-480
-
-
Amir, Y.1
Kim, Y.2
-
3
-
-
43149113294
-
-
National Security Agency, RFC 2627
-
Baugher, M., Canetti, R., Dondeti, L., & Lindholm, F. (2005). Key management for multicast: issues and architecture. National Security Agency, RFC 2627.
-
(2005)
Key Management for Multicast: Issues and Architecture
-
-
Baugher, M.1
Canetti, R.2
Dondeti, L.3
Lindholm, F.4
-
4
-
-
0035365149
-
Self-organization in mobile ad-hoc networks: The approach of terminodes
-
1
-
Blazevic, L., Buttyan, L., Capkun, S., Giordano, S., Hubaux, J.-P., & Le Boudec, J.-Y. (2001). Self-organization in mobile ad-hoc networks: the approach of terminodes. IEEE Communications Magazine, 39(1), 166-173.
-
(2001)
IEEE Communications Magazine
, vol.39
, pp. 166-173
-
-
Blazevic, L.1
Buttyan, L.2
Capkun, S.3
Giordano, S.4
Hubaux, J.-P.5
Le Boudec, J.-Y.6
-
7
-
-
15744371024
-
SAKM: A scalable and adaptive key management approach for multicast communications
-
Challal, Y., et al. (2004). SAKM: A scalable and adaptive key management approach for multicast communications. In ACM SIGCOMM computer communications review.
-
(2004)
ACM SIGCOMM Computer Communications Review
-
-
Challal, Y.1
-
8
-
-
0242414397
-
Key management approaches to offer data confidentiality for secure multicast
-
5
-
Chan, K.-C., & Chan, S.-H.G. (2003). Key management approaches to offer data confidentiality for secure multicast. IEEE Journal on Network, 17(5), 30-39.
-
(2003)
IEEE Journal on Network
, vol.17
, pp. 30-39
-
-
Chan, K.-C.1
Chan, S.-H.G.2
-
12
-
-
0742294233
-
Ad hoc networking: Imperatives and challenges
-
Chlamtac, I., Conti, M., & Liu, J. (2003). Ad hoc networking: imperatives and challenges. Ad Hoc Networks, 1, 13-64.
-
(2003)
Ad Hoc Networks
, vol.1
, pp. 13-64
-
-
Chlamtac, I.1
Conti, M.2
Liu, J.3
-
14
-
-
0035728669
-
Secure group communications for wireless networks
-
Virginia, USA, October 2001
-
DeCleene, B., Dondeti, L., Griffin, S., Hardjono, T., Kiwior, D., Kurose, J., Towsley, D., Vasudevan, S., & Zhang, C. (2001). Secure group communications for wireless networks. In IEEE military communications conference (MILCOM'01). Virginia, USA, October 2001.
-
(2001)
IEEE Military Communications Conference (MILCOM'01)
-
-
Decleene, B.1
Dondeti, L.2
Griffin, S.3
Hardjono, T.4
Kiwior, D.5
Kurose, J.6
Towsley, D.7
Vasudevan, S.8
Zhang, C.9
-
17
-
-
20544465992
-
An overview of security issues for multihop mobile ad hoc networks
-
ISBN:0-931695-25-3
-
Ghosh, T., et al. (2004). An overview of security issues for multihop mobile ad hoc networks. In Technology advances, strategies, and change drivers. ISBN:0-931695-25-3.
-
(2004)
Technology Advances, Strategies, and Change Drivers
-
-
Ghosh, T.1
-
18
-
-
4143065848
-
A secure on-demand routing protocol for ad hoc networks
-
Georgia, USA
-
Hu, Y., et al. (2002). A secure on-demand routing protocol for ad hoc networks. In ACM MOBICOM, Georgia, USA.
-
(2002)
ACM MOBICOM
-
-
Hu, Y.1
-
19
-
-
1842693650
-
Packet leashes: A defense against wormhole attacks in wireless networks
-
USA
-
Hu, Y., et al. (2002). Packet leashes: a defense against wormhole attacks in wireless networks. In IEEE INFOCOM, USA.
-
(2002)
IEEE INFOCOM
-
-
Hu, Y.1
-
20
-
-
0035789229
-
The quest for security in mobile ad hoc networks
-
Long Beach, CA, USA, October 2001
-
Hubaux, J. P., Buttyán, L., & Capkun, S. (1999). The quest for security in mobile ad hoc networks. In Proceedings of the 2nd ACM international symposium on mobile ad hoc networking and computing. Long Beach, CA, USA, October 2001.
-
(1999)
Proceedings of the 2nd ACM International Symposium on Mobile Ad Hoc Networking and Computing
-
-
Hubaux, J.P.1
Buttyán, L.2
Capkun, S.3
-
22
-
-
0035704362
-
Providing robust and ubiquitous security support for mobile ad hoc networks
-
Jiejun, K., Petros, Z., Haiyun, L., Songwu, L., & Lixia, Z. (2001). Providing robust and ubiquitous security support for mobile ad hoc networks. In Proceedings of the ninth international conference on network protocols.
-
(2001)
Proceedings of the Ninth International Conference on Network Protocols
-
-
Jiejun, K.1
Petros, Z.2
Haiyun, L.3
Songwu, L.4
Lixia, Z.5
-
23
-
-
0035577649
-
Moving from security to distributed trust in ubiquitous computing environments
-
12
-
Kagal, L., Finin, T., & Joshi, A. (2001). Moving from security to distributed trust in ubiquitous computing environments. IEEE Computer, 34(12), 154-157.
-
(2001)
IEEE Computer
, vol.34
, pp. 154-157
-
-
Kagal, L.1
Finin, T.2
Joshi, A.3
-
24
-
-
33845889547
-
Detecting unauthorized and compromised nodes in mobile ad hoc networks
-
3
-
Komninos, N., Vergados, D., & Douligeris, C. (2007). Detecting unauthorized and compromised nodes in mobile ad hoc networks. Ad Hoc Networks, 5(3), 289-298.
-
(2007)
Ad Hoc Networks
, vol.5
, pp. 289-298
-
-
Komninos, N.1
Vergados, D.2
Douligeris, C.3
-
25
-
-
35148860651
-
-
Wiley-InterScience Press New York Special issue of wireless communications and mobile computing
-
Kong, J., Luo, H., Xu, K., Gu, D. L., Gerla, M., & Lu, S. (2002). Adaptive security for multi-layer ad-hoc networks. New York: Wiley-InterScience Press. Special issue of wireless communications and mobile computing.
-
(2002)
Adaptive Security for Multi-layer Ad-hoc Networks
-
-
Kong, J.1
Luo, H.2
Xu, K.3
Gu, D.L.4
Gerla, M.5
Lu, S.6
-
27
-
-
0032136173
-
Location tracking, and trajectory prediction in wireless ATM networks
-
Liu, T., Bahl, P., & Chlamtac, I. (2001). Location tracking, and trajectory prediction in wireless ATM networks. IEEE Journal on Selected Areas in Communications, 16, 922-936.
-
(2001)
IEEE Journal on Selected Areas in Communications
, vol.16
, pp. 922-936
-
-
Liu, T.1
Bahl, P.2
Chlamtac, I.3
-
28
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
Marti, S., Guli, T., Lai, K., & Baker, M. (2000). Mitigating routing misbehavior in mobile ad hoc networks. In Proceedings of the 6th annual international conference on mobile computing and networking (MobiCom) (pp. 6-11).
-
(2000)
Proceedings of the 6th Annual International Conference on Mobile Computing and Networking (MobiCom)
, pp. 6-11
-
-
Marti, S.1
Guli, T.2
Lai, K.3
Baker, M.4
-
30
-
-
1842665110
-
Intrusion detection in wireless ad hoc networks
-
1
-
Mishra, A., Nadkarni, K., & Patcha, A. (2004). Intrusion detection in wireless ad hoc networks. IEEE Journal Personal Communications on Wireless Communication, 11(1), 48-60.
-
(2004)
IEEE Journal Personal Communications on Wireless Communication
, vol.11
, pp. 48-60
-
-
Mishra, A.1
Nadkarni, K.2
Patcha, A.3
-
33
-
-
0242527360
-
Path set selection in mobile ad hoc networks
-
Lausanne, Switzerland
-
Papadimitratos, P., Haas, Z. J., & Sirer, E. G. (2002). Path set selection in mobile ad hoc networks. In Proceedings of the 3rd ACM international symposium on mobile ad hoc networking and computing (pp. 1-11). Lausanne, Switzerland.
-
(2002)
Proceedings of the 3rd ACM International Symposium on Mobile Ad Hoc Networking and Computing
, pp. 1-11
-
-
Papadimitratos, P.1
Haas, Z.J.2
Sirer, E.G.3
-
34
-
-
33646552392
-
Routing and intrusion detection in ad hoc networks
-
Kauai Island, USA
-
Patwardhan, A., Parker, J., Joshi, A., Iorga, M., & Karygiannis, T. (2005). Routing and intrusion detection in ad hoc networks. In Proceedings of the third IEEE international conference on pervasive computing and communications (pp. 191-199). Kauai Island, USA.
-
(2005)
Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications
, pp. 191-199
-
-
Patwardhan, A.1
Parker, J.2
Joshi, A.3
Iorga, M.4
Karygiannis, T.5
-
35
-
-
0003843664
-
-
IETF RFC, IETF
-
Perkins, C., Belding-Royer, E., & Das, S. (2003). Ad hoc on-demand distance-vector routing (AODV). IETF RFC, IETF.
-
(2003)
Ad Hoc On-demand Distance-vector Routing (AODV)
-
-
Perkins, C.1
Belding-Royer, E.2
Das, S.3
-
37
-
-
0345565893
-
A survey of key management for secure group communication
-
Rafeali, S., & Hutchison, D. (2003). A survey of key management for secure group communication. ACM Computing Surveys (CSUR), 309-329.
-
(2003)
ACM Computing Surveys (CSUR)
, pp. 309-329
-
-
Rafeali, S.1
Hutchison, D.2
-
39
-
-
84904904836
-
A secure routing protocol for ad hoc networks
-
USA
-
Sanzgiri, K., Dahill, B., Levine, B. N., Shields, C., & Belding-Royer, E. M. (2002). A secure routing protocol for ad hoc networks. In Proceedings of the 10th IEEE international conference on network protocols (ICNP'02). USA.
-
(2002)
Proceedings of the 10th IEEE International Conference on Network Protocols (ICNP'02)
-
-
Sanzgiri, K.1
Dahill, B.2
Levine, B.N.3
Shields, C.4
Belding-Royer, E.M.5
-
40
-
-
4544317724
-
Wireless intrusion detection and response: A classic study using main-in-the-middle attack
-
Atlanta, USA
-
Schmoyer, T. R., Lim, Y. X., & Owen, H. L. (2004). Wireless intrusion detection and response: A classic study using main-in-the-middle attack. In Proceedings of the 2004 international conference on wireless communications and networking (WCNC) (pp. 883-888). Atlanta, USA.
-
(2004)
Proceedings of the 2004 International Conference on Wireless Communications and Networking (WCNC)
, pp. 883-888
-
-
Schmoyer, T.R.1
Lim, Y.X.2
Owen, H.L.3
-
41
-
-
0003198066
-
Kronos: A scalable group re-keying approach for secure multicast
-
Setia, S., et al. (2000). Kronos: A scalable group re-keying approach for secure multicast. In IEEE symposium on security and privacy.
-
(2000)
IEEE Symposium on Security and Privacy
-
-
Setia, S.1
-
43
-
-
0029720059
-
Key distribution extended to group communication
-
New Delhi, India
-
Steiner, M., Tsudik, G., Waidner, M., & Hellman, D. (1996). Key distribution extended to group communication. In Proceedings of the third ACM conference on computer and communications security (pp. 31-37). New Delhi, India.
-
(1996)
Proceedings of the Third ACM Conference on Computer and Communications Security
, pp. 31-37
-
-
Steiner, M.1
Tsudik, G.2
Waidner, M.3
Hellman, D.4
-
46
-
-
34547743395
-
A hierarchical key management scheme for secure group communications in mobile ad hoc networks
-
10
-
Wang, N.-C., & Fang, S.-Z. (2007). A hierarchical key management scheme for secure group communications in mobile ad hoc networks. The Journal of Systems and Softwar, 80(10), 1667-1677.
-
(2007)
The Journal of Systems and Softwar
, vol.80
, pp. 1667-1677
-
-
Wang, N.-C.1
Fang, S.-Z.2
-
47
-
-
0033893174
-
Secure group communication using key graphs
-
1
-
Wong, C. K., Gouda, M., & Lam, S. S. (2000). Secure group communication using key graphs. IEEE/ACM Journal Transactions on Networking, 8(1), 16-30.
-
(2000)
IEEE/ACM Journal Transactions on Networking
, vol.8
, pp. 16-30
-
-
Wong, C.K.1
Gouda, M.2
Lam, S.S.3
-
48
-
-
1842815887
-
Security in Mobile Ad Hoc networks: Challenges and solutions
-
February 2004
-
Yang, H., Luo, H., Ye, F., Lu, S., & Zhang, L. (2004). Security in Mobile Ad Hoc networks: challenges and solutions. In IEEE wireless communications (pp. 38-47). February 2004.
-
(2004)
IEEE Wireless Communications
, pp. 38-47
-
-
Yang, H.1
Luo, H.2
Ye, F.3
Lu, S.4
Zhang, L.5
-
49
-
-
0035020319
-
Mobility-based predictive call admission control and bandwidth reservation in wireless cellular networks
-
USA
-
Yu, F., & Leung, V. C. M. (2001). Mobility-based predictive call admission control and bandwidth reservation in wireless cellular networks. IEEE INFOCOM, USA (pp. 518-526).
-
(2001)
IEEE INFOCOM
, pp. 518-526
-
-
Yu, F.1
Leung, V.C.M.2
-
50
-
-
0034546898
-
Intrusion detection in wireless ad-hoc networks
-
Boston, MA, USA
-
Zhang, Y., & Lee, W. (2000). Intrusion detection in wireless ad-hoc networks. In Proceedings of the 6th annual international conference on mobile computing (pp. 275-283). Boston, MA, USA.
-
(2000)
Proceedings of the 6th Annual International Conference on Mobile Computing
, pp. 275-283
-
-
Zhang, Y.1
Lee, W.2
-
53
-
-
0033357103
-
Securing ad hoc networks
-
6
-
Zhou, L., & Haas, Z. J. (1999). Securing ad hoc networks. IEEE Network, 13(6), 24-30.
-
(1999)
IEEE Network
, vol.13
, pp. 24-30
-
-
Zhou, L.1
Haas, Z.J.2
|