-
1
-
-
21644434924
-
Security in ad hoc networks: A general intrusion detection architecture enhancing trust based approaches
-
Apr.
-
P. Albers, O. Camp, J.-M. Percher, B. Jouga, L. Mé, and R. Puttini. Security in Ad Hoc Networks: a General Intrusion Detection Architecture Enhancing Trust Based Approaches. In Proceedings of the First International Workshop on Wireless Information Systems (WIS-2002), Apr. 2002.
-
(2002)
Proceedings of the First International Workshop on Wireless Information Systems (WIS-2002)
-
-
Albers, P.1
Camp, O.2
Percher, J.-M.3
Jouga, B.4
Mé, L.5
Puttini, R.6
-
4
-
-
0037699870
-
A call for the home media network
-
G. Bell and J. Gemmell. A call for the home media network. Communications of the ACM, 45(7):71-75, 2002.
-
(2002)
Communications of the ACM
, vol.45
, Issue.7
, pp. 71-75
-
-
Bell, G.1
Gemmell, J.2
-
5
-
-
0842326315
-
Bootstrapping security associations for routing in mobile ad-hoc networks
-
University of Maryland, May
-
R. B. Bobba, L. Eschenauer, V. Gligor, and W. Arbaugh. Bootstrapping security associations for routing in mobile ad-hoc networks. Technical report, University of Maryland, May 2002.
-
(2002)
Technical Report
-
-
Bobba, R.B.1
Eschenauer, L.2
Gligor, V.3
Arbaugh, W.4
-
8
-
-
3042550855
-
On trust establishment in mobile ad-hoc networks
-
University of Maryland
-
L. Eschenauer, V. D. Gligor, and J. Baras. On trust establishment in mobile ad-hoc networks. Technical report, University of Maryland, 2002.
-
(2002)
Technical Report
-
-
Eschenauer, L.1
Gligor, V.D.2
Baras, J.3
-
9
-
-
0035363950
-
Spontaneous networking: An application-oriented approach to ad hoc networking
-
June
-
L. Feeney, B. Ahlgren, and A. Westerlund. Spontaneous networking: an application-oriented approach to ad hoc networking. IEEE Communications Magazine, June 2001.
-
(2001)
IEEE Communications Magazine
-
-
Feeney, L.1
Ahlgren, B.2
Westerlund, A.3
-
11
-
-
0035789229
-
The quest for security in mobile ad hoc networks
-
Long Beach, CA, October
-
J. P. Hubaux, L. Buttyan, and S. Capkun. The quest for security in mobile ad hoc networks. In Proceedings of ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC), Long Beach, CA, October 2001.
-
(2001)
Proceedings of ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC)
-
-
Hubaux, J.P.1
Buttyan, L.2
Capkun, S.3
-
15
-
-
1642324009
-
Statistically unique and cryptographically verifiable (SUCV) identifiers and addresses
-
Feb.
-
C. Montenegro and C. Castelluccia. Statistically Unique and Cryptographically Verifiable (SUCV) identifiers and addresses. In NDSS'02, Feb. 2002.
-
(2002)
NDSS'02
-
-
Montenegro, C.1
Castelluccia, C.2
-
18
-
-
0034771605
-
SPINS: Security protocols for sensor networks
-
A. Perrig, R. Szewczyk, V. Wen, D. E. Culler, and J. D. Tygar. SPINS: security protocols for sensor networks. In Mobile Computing and Networking, pages 189-199, 2001.
-
(2001)
Mobile Computing and Networking
, pp. 189-199
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.E.4
Tygar, J.D.5
-
20
-
-
3042740017
-
Humans in the loop: Human-computer interaction and security
-
June
-
S. W. Smith. Humans in the loop: Human-computer interaction and security. IEEE Security & Privacy, June 2003.
-
(2003)
IEEE Security & Privacy
-
-
Smith, S.W.1
-
21
-
-
84949953635
-
The resurrecting duckling - What next?
-
F. Stajano. The Resurrecting Duckling - What Next? Lecture Notes in Computer Science, 2133:204-211, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2133
, pp. 204-211
-
-
Stajano, F.1
-
23
-
-
0033357103
-
Securing ad hoc networks
-
L. Zhou and Z. J. Haas. Securing ad hoc networks. IEEE Network, 13(6):24-30, 1999.
-
(1999)
IEEE Network
, vol.13
, Issue.6
, pp. 24-30
-
-
Zhou, L.1
Haas, Z.J.2
|