메뉴 건너뛰기




Volumn , Issue , 2003, Pages 115-124

Secure long term communities in ad hoc networks

Author keywords

Ad hoc networks security; Home network security; Secure long term community

Indexed keywords

DISTRIBUTED COMPUTER SYSTEMS; LOCAL AREA NETWORKS; MOBILE TELECOMMUNICATION SYSTEMS; NETWORK PROTOCOLS; PERSONAL DIGITAL ASSISTANTS; PRINTERS (COMPUTER); SECURITY OF DATA; TELEVISION;

EID: 4544246596     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/986858.986874     Document Type: Conference Paper
Times cited : (19)

References (24)
  • 4
    • 0037699870 scopus 로고    scopus 로고
    • A call for the home media network
    • G. Bell and J. Gemmell. A call for the home media network. Communications of the ACM, 45(7):71-75, 2002.
    • (2002) Communications of the ACM , vol.45 , Issue.7 , pp. 71-75
    • Bell, G.1    Gemmell, J.2
  • 5
    • 0842326315 scopus 로고    scopus 로고
    • Bootstrapping security associations for routing in mobile ad-hoc networks
    • University of Maryland, May
    • R. B. Bobba, L. Eschenauer, V. Gligor, and W. Arbaugh. Bootstrapping security associations for routing in mobile ad-hoc networks. Technical report, University of Maryland, May 2002.
    • (2002) Technical Report
    • Bobba, R.B.1    Eschenauer, L.2    Gligor, V.3    Arbaugh, W.4
  • 8
    • 3042550855 scopus 로고    scopus 로고
    • On trust establishment in mobile ad-hoc networks
    • University of Maryland
    • L. Eschenauer, V. D. Gligor, and J. Baras. On trust establishment in mobile ad-hoc networks. Technical report, University of Maryland, 2002.
    • (2002) Technical Report
    • Eschenauer, L.1    Gligor, V.D.2    Baras, J.3
  • 9
    • 0035363950 scopus 로고    scopus 로고
    • Spontaneous networking: An application-oriented approach to ad hoc networking
    • June
    • L. Feeney, B. Ahlgren, and A. Westerlund. Spontaneous networking: an application-oriented approach to ad hoc networking. IEEE Communications Magazine, June 2001.
    • (2001) IEEE Communications Magazine
    • Feeney, L.1    Ahlgren, B.2    Westerlund, A.3
  • 15
    • 1642324009 scopus 로고    scopus 로고
    • Statistically unique and cryptographically verifiable (SUCV) identifiers and addresses
    • Feb.
    • C. Montenegro and C. Castelluccia. Statistically Unique and Cryptographically Verifiable (SUCV) identifiers and addresses. In NDSS'02, Feb. 2002.
    • (2002) NDSS'02
    • Montenegro, C.1    Castelluccia, C.2
  • 20
    • 3042740017 scopus 로고    scopus 로고
    • Humans in the loop: Human-computer interaction and security
    • June
    • S. W. Smith. Humans in the loop: Human-computer interaction and security. IEEE Security & Privacy, June 2003.
    • (2003) IEEE Security & Privacy
    • Smith, S.W.1
  • 21
    • 84949953635 scopus 로고    scopus 로고
    • The resurrecting duckling - What next?
    • F. Stajano. The Resurrecting Duckling - What Next? Lecture Notes in Computer Science, 2133:204-211, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2133 , pp. 204-211
    • Stajano, F.1
  • 23
    • 0033357103 scopus 로고    scopus 로고
    • Securing ad hoc networks
    • L. Zhou and Z. J. Haas. Securing ad hoc networks. IEEE Network, 13(6):24-30, 1999.
    • (1999) IEEE Network , vol.13 , Issue.6 , pp. 24-30
    • Zhou, L.1    Haas, Z.J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.