-
1
-
-
46449105101
-
-
A. Aresenault, S. Turner, Internet x.509 public key infrastructure: PKIX roadmap, Ietf internet draft, PKIX Working Group, 2000.
-
A. Aresenault, S. Turner, Internet x.509 public key infrastructure: PKIX roadmap, Ietf internet draft, PKIX Working Group, 2000.
-
-
-
-
2
-
-
46449110519
-
-
M. Bellare, R. Canetti, H. Krawczyk, Keying hash functions for message authentication, in: Proceedings of Advances in Cryptology, 1996.
-
M. Bellare, R. Canetti, H. Krawczyk, Keying hash functions for message authentication, in: Proceedings of Advances in Cryptology, 1996.
-
-
-
-
3
-
-
0031703272
-
-
K.A. Bradley, S. Cheung, N. Puketza, B. Mukherjee, R.A. Olsson, Detecting disruptive routers: a distributed network monitoring approach, in: IEEE Symposium on Security and Privacy, 1998.
-
K.A. Bradley, S. Cheung, N. Puketza, B. Mukherjee, R.A. Olsson, Detecting disruptive routers: a distributed network monitoring approach, in: IEEE Symposium on Security and Privacy, 1998.
-
-
-
-
4
-
-
46449104788
-
-
S. Cheung, K. Levitt, Protecting routing infrastructures from denial of service using cooperative intrusion detection, in: New Security Paradigms Workshop, 1997.
-
S. Cheung, K. Levitt, Protecting routing infrastructures from denial of service using cooperative intrusion detection, in: New Security Paradigms Workshop, 1997.
-
-
-
-
5
-
-
46449107508
-
-
B. Dahill, B. Levine, E. Royer, C. Shields, A secure routing protocol for ad-hoc networks, in: Proceedings of the 10th Conference on Network Protocols (ICNP), 2002.
-
B. Dahill, B. Levine, E. Royer, C. Shields, A secure routing protocol for ad-hoc networks, in: Proceedings of the 10th Conference on Network Protocols (ICNP), 2002.
-
-
-
-
6
-
-
0038341106
-
-
L. Eschenauer, V.D. Gligor, A key-management scheme for distributed sensor networks, in: ACM CCS, 2002.
-
L. Eschenauer, V.D. Gligor, A key-management scheme for distributed sensor networks, in: ACM CCS, 2002.
-
-
-
-
7
-
-
84961572484
-
-
Y. Hu, D. Johnson, A. Perrig, SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks, in: Proceedings of the 4th IEEE Workshop on Mobile Computing Systems & Applications (WMCSA 2002), Calicoon, NY, 2002.
-
Y. Hu, D. Johnson, A. Perrig, SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks, in: Proceedings of the 4th IEEE Workshop on Mobile Computing Systems & Applications (WMCSA 2002), Calicoon, NY, 2002.
-
-
-
-
8
-
-
85177222268
-
-
Y. Hu, A. Perrig, D. Johnson, Ariadne: a secure on-demand routing protocol for ad hoc networks, in: Proceedings of Mobicom, 2002.
-
Y. Hu, A. Perrig, D. Johnson, Ariadne: a secure on-demand routing protocol for ad hoc networks, in: Proceedings of Mobicom, 2002.
-
-
-
-
9
-
-
46449138284
-
-
UCLA Parallel Computing Lab, GloMoSim.
-
UCLA Parallel Computing Lab, GloMoSim.
-
-
-
-
10
-
-
0036924499
-
On-demand multicast routing protocol in multihop wireless mobile networks
-
Lee S., Su W., and Gerla M. On-demand multicast routing protocol in multihop wireless mobile networks. Mobile Networks and Applications 7 6 (2002) 441-453
-
(2002)
Mobile Networks and Applications
, vol.7
, Issue.6
, pp. 441-453
-
-
Lee, S.1
Su, W.2
Gerla, M.3
-
11
-
-
24744455885
-
A lightweight authentication protocol for mobile ad hoc networks
-
Lu B., and Pooch U.W. A lightweight authentication protocol for mobile ad hoc networks. International Journal of Information Technology 11 2 (2005) 119-135
-
(2005)
International Journal of Information Technology
, vol.11
, Issue.2
, pp. 119-135
-
-
Lu, B.1
Pooch, U.W.2
-
12
-
-
84883869163
-
-
H. Luo, P. Zerfos, J. Kong, S. Lu, L. Zhang, Self-securing ad hoc wireless networks, in: IEEE ISCC (IEEE Symposium on Computers and Communications), July 2002.
-
H. Luo, P. Zerfos, J. Kong, S. Lu, L. Zhang, Self-securing ad hoc wireless networks, in: IEEE ISCC (IEEE Symposium on Computers and Communications), July 2002.
-
-
-
-
13
-
-
85177504463
-
-
S. Marti, T. Giuli, K. Lai, M. Baker, Mitigating routing misbehavior in mobile ad hoc networks, in: Proceedings of the Sixth annual ACM/IEEE International Conference on Mobile Computing and Networking, 2000, pp. 255-265.
-
S. Marti, T. Giuli, K. Lai, M. Baker, Mitigating routing misbehavior in mobile ad hoc networks, in: Proceedings of the Sixth annual ACM/IEEE International Conference on Mobile Computing and Networking, 2000, pp. 255-265.
-
-
-
-
14
-
-
46449102577
-
-
P. Papadimitratos, Z. Haas, Secure routing for mobile ad hoc networks, in: Communication Networks and Distributed Systems Modeling and Simulation Conference, 2002.
-
P. Papadimitratos, Z. Haas, Secure routing for mobile ad hoc networks, in: Communication Networks and Distributed Systems Modeling and Simulation Conference, 2002.
-
-
-
-
15
-
-
46449105100
-
-
R. Perlman, Network Layer Protocols with Byzantine Robustness, Ph.D. Thesis, MIT, October 1988, LCS TR-429.
-
R. Perlman, Network Layer Protocols with Byzantine Robustness, Ph.D. Thesis, MIT, October 1988, LCS TR-429.
-
-
-
-
16
-
-
0033690336
-
-
A. Perrig, R. Canetti, J. Tygar, D. Song, Efficient authentication and signing of multicast streams over lossy channels, in: Proceedings of IEEE Symposium on Security and Privacy, May 2000.
-
A. Perrig, R. Canetti, J. Tygar, D. Song, Efficient authentication and signing of multicast streams over lossy channels, in: Proceedings of IEEE Symposium on Security and Privacy, May 2000.
-
-
-
-
17
-
-
85177210396
-
-
A. Perrig, R. Szewcyzk, V. Wen, D. Culler, J.D. Tygar, Spins: security protocols for sensor networks, in: Proceedings of Mobile Computing and Networking, 2001.
-
A. Perrig, R. Szewcyzk, V. Wen, D. Culler, J.D. Tygar, Spins: security protocols for sensor networks, in: Proceedings of Mobile Computing and Networking, 2001.
-
-
-
-
18
-
-
0242492056
-
-
G.V.S. Raju, R. Akbani, Elliptic curve cryptosystem and its applications, in: Proceedings of the IEEE International Conference on Systems, Man & Cybernetics (IEEE-SMC), 2003.
-
G.V.S. Raju, R. Akbani, Elliptic curve cryptosystem and its applications, in: Proceedings of the IEEE International Conference on Systems, Man & Cybernetics (IEEE-SMC), 2003.
-
-
-
-
19
-
-
0036979313
-
-
G.V.S. Raju, G. Hernandez, Routing in ad hoc networks, in: IEEE-SMC International Conference, October 2002.
-
G.V.S. Raju, G. Hernandez, Routing in ad hoc networks, in: IEEE-SMC International Conference, October 2002.
-
-
-
-
21
-
-
84943529186
-
-
S. Zhu, S. Xu, S. Setia, S. Jajodia, LHAP: a light-weight hop-by-hop authentication protocol for ad-hoc networks, in: Proceedings of the 23rd ICDCS Workshop, 2003.
-
S. Zhu, S. Xu, S. Setia, S. Jajodia, LHAP: a light-weight hop-by-hop authentication protocol for ad-hoc networks, in: Proceedings of the 23rd ICDCS Workshop, 2003.
-
-
-
-
22
-
-
33745197327
-
Lhap: a lightweight network access control protocol for ad-hoc networks
-
Zhu S., Xu S., Setia S., and Jajodia Z. Lhap: a lightweight network access control protocol for ad-hoc networks. Ad Hoc Networks Journal 4 5 (2006) 567-585
-
(2006)
Ad Hoc Networks Journal
, vol.4
, Issue.5
, pp. 567-585
-
-
Zhu, S.1
Xu, S.2
Setia, S.3
Jajodia, Z.4
|