-
3
-
-
0842326315
-
Bootstrapping security associations for routing in mobile Ad-hoc networks
-
University of Maryland, May
-
R.B. Bobba, L. Eschenauer, V.D. Gligor, and W. Arbaugh. Bootstrapping Security Associations for Routing in Mobile Ad-Hoc Networks. Technical Report TR 2002-44, University of Maryland, May 2002.
-
(2002)
Technical Report
, vol.TR 2002-44
-
-
Bobba, R.B.1
Eschenauer, L.2
Gligor, V.D.3
Arbaugh, W.4
-
5
-
-
2642586050
-
Performance analysis of the confidant protocol (cooperation of nodes - Fairness in dynamic ad-hoc networks)
-
Lausanne, June
-
S. Buchegger and J. Y. Le Boudec. Performance analysis of the confidant protocol (cooperation of nodes - fairness in dynamic ad-hoc networks). In Proceedings of MobiHoc 2002, Lausanne, June 2002.
-
(2002)
Proceedings of MobiHoc 2002
-
-
Buchegger, S.1
Le Boudec, J.Y.2
-
9
-
-
0013398251
-
Major security problems with the 'unforgeable' (feige)-fiat-shamir proofs of identity and how to overcome them
-
Y. Desmedt. Major security problems with the 'unforgeable' (feige)-fiat-shamir proofs of identity and how to overcome them. In SecuriCom'88, 1988.
-
(1988)
SecuriCom'88
-
-
Desmedt, Y.1
-
12
-
-
0041973497
-
Packet leashes: A defense against wormhole attacks in wireless networks
-
April
-
Y.-C. Hu, Adrian Perrig, and David B. Johnson. Packet leashes: A defense against wormhole attacks in wireless networks. In Proceedings of IEEE Infocom, April 2003.
-
(2003)
Proceedings of IEEE Infocom
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
14
-
-
0036957315
-
Ariadne: A secure on-demand routing protocol for Ad hoc networks
-
September
-
Y.-C. Hu, A. Perrig, and D. B. Johnson. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks. In Proceedings of MobiCom, September 2002.
-
(2002)
Proceedings of MobiCom
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
22
-
-
0242426103
-
The TESLA broadcast authentication protocol
-
A. Perrig, R. Canetti, J.D. Tygar, and D. Song. The TESLA Broadcast Authentication Protocol. RSA CryptoBytes, 5(Summer), 2002.
-
(2002)
RSA CryptoBytes
, vol.5
, Issue.SUMMER
-
-
Perrig, A.1
Canetti, R.2
Tygar, J.D.3
Song, D.4
-
23
-
-
4544376141
-
Time synchronization in Ad hoc networks
-
K. Romer. Time Synchronization in Ad Hoc Networks. In Proceedings of MobiHoc, 2001.
-
(2001)
Proceedings of MobiHoc
-
-
Romer, K.1
-
24
-
-
0842283101
-
A secure routing protocol for Ad hoc networks
-
K. Sanzgiri, B. Dahill, B. N. Levine, C. Shields, and E. M. Belding-Royer. A Secure Routing Protocol for Ad hoc Networks. In Proceedings of ICNP, 2002.
-
(2002)
Proceedings of ICNP
-
-
Sanzgiri, K.1
Dahill, B.2
Levine, B.N.3
Shields, C.4
Belding-Royer, E.M.5
-
25
-
-
4544249895
-
Secure verification of location claims
-
EECS, University of California, Berkeley
-
Naveen Sastry, Umesh Shankar, and David Wagner. Secure Verification of Location Claims. Technical Report UCB//CSD-03-1245, EECS, University of California, Berkeley, 2003.
-
(2003)
Technical Report
, vol.UCB-CSD-03-1245
-
-
Sastry, N.1
Shankar, U.2
Wagner, D.3
-
27
-
-
33750318709
-
Proving the location of tamper-resistant devices
-
Princeton University
-
Brent Waters and Ed Felten. Proving the Location of Tamper-Resistant Devices. Technical report, Princeton University.
-
Technical Report
-
-
Waters, B.1
Felten, Ed.2
-
28
-
-
85180543368
-
Efficient protocols for signing routing messages
-
March
-
Kan Zhang. Efficient Protocols for Signing Routing Messages. In Proceedings of NDSS, March 1998.
-
(1998)
Proceedings of NDSS
-
-
Zhang, K.1
|