-
1
-
-
33845781153
-
Security issues in a future vehicular network
-
M. El Zarki, S. Mehrotra, G. Tsudik, and N. Venkatasubramanian, "Security issues in a future vehicular network," in Proceedings of European Wireless 2002, 2002.
-
(2002)
Proceedings of European Wireless 2002
-
-
El Zarki, M.1
Mehrotra, S.2
Tsudik, G.3
Venkatasubramanian, N.4
-
4
-
-
0012408597
-
SDSI - A simple distributed security infrastructure
-
Presented at
-
R. L. Rivest and B. Lampson, "SDSI - A simple distributed security infrastructure." Presented at CRYPTO'96 Rumpsession, 1996.
-
(1996)
CRYPTO'96 Rumpsession
-
-
Rivest, R.L.1
Lampson, B.2
-
5
-
-
0003593599
-
-
Internet Draft, March, iETF Network Working Group RFC 2693, Online, Available
-
C. Ellison, B. Frantz, B. Lampson, R. Rivest, B. Thomas, and T. Ylonen, "SPKI certificate theory," Internet Draft, March 1998, iETF Network Working Group RFC 2693. [Online]. Available: http://www.ietf.org/rfc/rfc2693.txt
-
(1998)
SPKI certificate theory
-
-
Ellison, C.1
Frantz, B.2
Lampson, B.3
Rivest, R.4
Thomas, B.5
Ylonen, T.6
-
7
-
-
0003700417
-
-
Tech. Rep, Online, Available
-
S. P. Miller, B. C. Neuman, J. I. Schiller, and J. H. Saltzer, "Kerberos authentication and authorization system," Massachusetts Institute of Technology, Tech. Rep., 1987. [Online]. Available: citeseer.ist.psu.edu/miller88kerbero.html
-
(1987)
Kerberos authentication and authorization system
-
-
Miller, S.P.1
Neuman, B.C.2
Schiller, J.I.3
Saltzer, J.H.4
-
10
-
-
0003153237
-
Non-interactive zero-knowledge and its applications
-
ACM Press
-
M. Blum, P. Feldman, and S. Micali, "Non-interactive zero-knowledge and its applications," in Proceedings of the twentieth annual ACM symposium on Theory of computing. ACM Press, 1988, pp. 103-112.
-
(1988)
Proceedings of the twentieth annual ACM symposium on Theory of computing
, pp. 103-112
-
-
Blum, M.1
Feldman, P.2
Micali, S.3
-
12
-
-
85024290278
-
Group signatures
-
Online, Available
-
D. Chaum and E. van Heyst, "Group signatures," Lecture Notes of Computer Science, vol. 547, 1991. [Online]. Available: http://link.springer-ny.com/link/service/series/0558/papers/0547/05470257.pdf
-
(1991)
Lecture Notes of Computer Science
, vol.547
-
-
Chaum, D.1
van Heyst, E.2
-
13
-
-
0018545449
-
How to share a secret
-
A. Shamir, "How to share a secret," Commun. ACM. vol. 22. no. 11, pp. 612-613, 1979.
-
(1979)
Commun. ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
15
-
-
0037885580
-
Nodes Bearing Grudges: Towards Routing Security, Fairness, and Robustness in Mobile Ad Hoc Networks
-
Canary Islands, Spain: IEEE Computer Society, January, Online, Available
-
S. Buchegger and J.-Y. L. Boudec, "Nodes Bearing Grudges: Towards Routing Security, Fairness, and Robustness in Mobile Ad Hoc Networks," in Proceedings of the Tenth Euromicro Workshop on Parallel, Distributed and Network-based Processing. Canary Islands, Spain: IEEE Computer Society, January 2002, pp. 403-410. [Online]. Available: citeseer.ist.psu.edu/article/ buchegger02nodes.html
-
(2002)
Proceedings of the Tenth Euromicro Workshop on Parallel, Distributed and Network-based Processing
, pp. 403-410
-
-
Buchegger, S.1
Boudec, J.-Y.L.2
-
16
-
-
47749128826
-
-
L. Buttyán and J. Hubaux, Nuglets: a virtual currency to stimulate cooperation in self-organized ad hoc networks, EPFL, Tech. Rep., 2001. [Online]. Available: citeseer.ist.psu.edu/article/buttyan01nuglets.html
-
L. Buttyán and J. Hubaux, "Nuglets: a virtual currency to stimulate cooperation in self-organized ad hoc networks," EPFL, Tech. Rep., 2001. [Online]. Available: citeseer.ist.psu.edu/article/buttyan01nuglets.html
-
-
-
-
17
-
-
47749088195
-
How to design wireless security mechanisms
-
Ruhr University Bochum, Germany, december 2002, Online, Available
-
M. G. Zapata, "How to design wireless security mechanisms," in Proceedings of Workshop on Security in Ad-Hoc Networks. Ruhr University Bochum, Germany, december 2002. [Online]. Available: www.crypto.rub.de/adhocsec/ Abs_Zapata.pdf
-
Proceedings of Workshop on Security in Ad-Hoc Networks
-
-
Zapata, M.G.1
-
18
-
-
0042933944
-
Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks
-
San Fransisco, CA, april 2003, Online, Available
-
S. Zhong, J. Chen, and Y. Yang, "Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks," in Proceedings of IEEE Infocom, San Fransisco, CA, april 2003. [Online]. Available: gunther.smeal.psu.edu/15502.html
-
Proceedings of IEEE Infocom
-
-
Zhong, S.1
Chen, J.2
Yang, Y.3
-
19
-
-
0001831930
-
The resurrecting duckling: Security issues for ad-hoc wireless networks
-
Online, Available
-
F. Stajano and R. Anderson, "The resurrecting duckling: Security issues for ad-hoc wireless networks," in Security Protocols, 7th International Workshop Proceedings, 1999. pp. 172-194. [Online]. Available: citeseer.ist.psu.edu/article/stajano99resurrecting.html
-
(1999)
Security Protocols, 7th International Workshop Proceedings
, pp. 172-194
-
-
Stajano, F.1
Anderson, R.2
-
20
-
-
33751044073
-
Talking to strangers: Authentication in adhoc wireless networks
-
Feb, San Diego, California, Online, Available
-
D. Balfanz, D. Smetters, P. Stewart, and H. Wong, "Talking to strangers: Authentication in adhoc wireless networks," Feb. 2002. in Symposium on Network and Distributed Systems Security (NDSS '02), San Diego, California. [Online]. Available: citeseer.ist.psu.edu/balfanz02talking.html
-
(2002)
Symposium on Network and Distributed Systems Security (NDSS '02)
-
-
Balfanz, D.1
Smetters, D.2
Stewart, P.3
Wong, H.4
|