-
2
-
-
0033366376
-
Distributed clustering for ad hoc networks
-
S. Basagni. Distributed clustering for ad hoc networks. In Proceedings of the 1999 International Symposium on Parallel architecture, Algorithms, and Networks (I-SPAN'99), IEEE computer Society, pages 310-315, 1999.
-
(1999)
Proceedings of the 1999 International Symposium on Parallel Architecture, Algorithms, and Networks (I-SPAN'99), IEEE Computer Society
, pp. 310-315
-
-
Basagni, S.1
-
3
-
-
0035789267
-
Secure pebblenets
-
ACM Press
-
Stefano Basagni, Kris Herrin, Danilo Bruschi, and Emilia Rosti. Secure pebblenets. In Proceedings of the 2001 ACM International Symposium on Mobile ad hoc networking & computing, pages 156-163. ACM Press, 2001.
-
(2001)
Proceedings of the 2001 ACM International Symposium on Mobile Ad Hoc Networking & Computing
, pp. 156-163
-
-
Basagni, S.1
Herrin, K.2
Bruschi, D.3
Rosti, E.4
-
4
-
-
35048891868
-
Keying hash functions for message authentication
-
Neal Koblitz, editor. Springer-Verlag
-
Mihir Bellare, Ran Canetti, and Hugo Krawczyk. Keying hash functions for message authentication. In Neal Koblitz, editor, Advances in Cryptology - Crypto 96 Proceedings, volume 1109 of Lecture Notes in Computer Science. Springer-Verlag, 1996.
-
(1996)
Advances in Cryptology - Crypto 96 Proceedings, Volume 1109 of Lecture Notes in Computer Science
, vol.1109
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
5
-
-
0010461175
-
Constraints and approaches for distributed sensor network security
-
NAI Labs
-
D. W. Carman, P. S. Kruus, and B. J. Matt. Constraints and approaches for distributed sensor network security. Technical Report #00-010, NAI Labs, 2000.
-
(2000)
Technical Report #00-010
, vol.10
-
-
Carman, D.W.1
Kruus, P.S.2
Matt, B.J.3
-
6
-
-
0038487088
-
Random key predistribution schemes for sensor networks
-
Oakland, California-USA
-
Haowen Chan, Adrian Perrig, and Dawn Song, Random Key Predistribution Schemes for Sensor Networks. In Proceedings of the IEEE Symposium on Security and Privacy, Oakland, California-USA, pages 197-213, 2003.
-
(2003)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 197-213
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
7
-
-
0033347104
-
Performance comparison of battery power consumption in wireless multiple access protocols
-
Jyh-Cheng Chen, Krishna M. Sivalingam, and Prathima Agrawal. Performance comparison of battery power consumption in wireless multiple access protocols. Wireless Networks, 5(6):445-460, 1999.
-
(1999)
Wireless Networks
, vol.5
, Issue.6
, pp. 445-460
-
-
Chen, J.-C.1
Sivalingam, K.M.2
Agrawal, P.3
-
8
-
-
4544290017
-
Secure selective exclusion in ad hoc wireless network
-
Kluwer, May 5-7
-
Roberto Di Pietro, Luigi V. Mancini, and Sushil Jajodia. Secure selective exclusion in ad hoc wireless network. In Proceedings of the eigtheenth IFIP International Information Security Conference, pages 423-434. Kluwer, May 5-7, 2002.
-
(2002)
Proceedings of the Eigtheenth IFIP International Information Security Conference
, pp. 423-434
-
-
Di Pietro, R.1
Mancini, L.V.2
Jajodia, S.3
-
11
-
-
0033906585
-
Max-min d-cluster formation in wireless ad hoc networks
-
A.D. Amis et al. Max-min d-cluster formation in wireless ad hoc networks. In Proceedings of INFOCOM 2000, pages 32-41, 2000.
-
(2000)
Proceedings of INFOCOM 2000
, pp. 32-41
-
-
Amis, A.D.1
-
12
-
-
3042579385
-
-
Springer. ISBN 1-85233-431-2
-
John Haigh. Probabilty Models. Springer, 2002. ISBN 1-85233-431-2.
-
(2002)
Probabilty Models
-
-
Haigh, J.1
-
13
-
-
0034445661
-
System architecture directions for networked sensors
-
Jason Hill, Robert Szewczyk, Alec Woo, Seth Hollar, David Culler, and Kristofer Pister. System architecture directions for networked sensors. ACM SIGPLAN Notices, 35(11):93-104, 2000.
-
(2000)
ACM SIGPLAN Notices
, vol.35
, Issue.11
, pp. 93-104
-
-
Hill, J.1
Szewczyk, R.2
Woo, A.3
Hollar, S.4
Culler, D.5
Pister, K.6
-
17
-
-
0003584029
-
-
Fips pub 140-1, National Institute of Standard and Technology, January
-
NIST. Fips pub 140-1, security requirements for cryptographic modules. National Institute of Standard and Technology, January 1994.
-
(1994)
Security Requirements for Cryptographic Modules
-
-
-
18
-
-
0003582910
-
-
Addison Wesley Professional. ISBN 0-201-30976-9
-
Charles E. Perkins. Ad Hoc Networking. Addison Wesley Professional, 2001. ISBN 0-201-30976-9.
-
(2001)
Ad Hoc Networking
-
-
Perkins, C.E.1
-
19
-
-
0034771605
-
Spins: Security protocols for sensor networks
-
ACM Press
-
Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, and J. D. Tygar. Spins: security protocols for sensor networks. In Proceedings of the seventh annual international conference on Mobile computing and networking, pages 189-199. ACM Press, 2001.
-
(2001)
Proceedings of the Seventh Annual International Conference on Mobile Computing and Networking
, pp. 189-199
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, J.D.5
-
20
-
-
0034592866
-
Clustering algorithms for wireless ad hoc networks
-
ACM Press
-
Lakshmi Ramachandran, Manika Kapoor, Abhinanda Sarkar, and Alok Aggarwal. Clustering algorithms for wireless ad hoc networks. In Proceedings of the 4th international workshop on Discrete algorithms and methods for mobile computing and communications, pages 54-63. ACM Press, 2000.
-
(2000)
Proceedings of the 4th International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications
, pp. 54-63
-
-
Ramachandran, L.1
Kapoor, M.2
Sarkar, A.3
Aggarwal, A.4
-
21
-
-
0032621035
-
A review of current routing protocols for ad hoc mobile wireless network
-
April
-
E.M. Royer and C-K Toh. A review of current routing protocols for ad hoc mobile wireless network. In IEEE Personal Communication Magazine, pages 46-55, April 1999.
-
(1999)
IEEE Personal Communication Magazine
, pp. 46-55
-
-
Royer, E.M.1
Toh, C.-K.2
-
23
-
-
0034247455
-
Key agreement in dynamic peer groups
-
M. Steiner, G. Tsudik, and M. Waidner. Key agreement in dynamic peer groups. IEEE Transactions on Parallel and Distributed Systems, 11(8):769-780, 2000.
-
(2000)
IEEE Transactions on Parallel and Distributed Systems
, vol.11
, Issue.8
, pp. 769-780
-
-
Steiner, M.1
Tsudik, G.2
Waidner, M.3
-
25
-
-
84943553152
-
Establishing pair-wise keys for secure communication in ad hoc networks: A probabilistic approach
-
ISE-TR-03-01, George Mason University, March 2003. To appear in the, Atlanta, Georgia, November 4-7
-
S. Zhu, S. Xu, S. Setia and S. Jajodia. Establishing pair-wise keys for secure communication in ad hoc networks: A probabilistic approach. ISE-TR-03-01, George Mason University, March 2003. To appear in the 11th IEEE International Conference on Network Protocols (ICNP'03), Atlanta, Georgia, November 4-7, 2003.
-
(2003)
11th IEEE International Conference on Network Protocols (ICNP'03)
-
-
Zhu, S.1
Xu, S.2
Setia, S.3
Jajodia, S.4
|