-
1
-
-
50249150186
-
-
IEEE Std 802.11. Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. Technical report, IEEE, 1999.
-
IEEE Std 802.11. Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. Technical report, IEEE, 1999.
-
-
-
-
2
-
-
50249159437
-
-
June, Available at
-
RSA SecureID. June 2003. Available at http://rsasecurity.agora.com/ rsasecured/guides/imp.pdfs/adtraaace5.pdf.
-
(2003)
-
-
SecureID, R.S.A.1
-
4
-
-
50249155813
-
-
B. Waters and E. Felten. Proving the Location of Tamper Resistant Devices. Technical report, Princeton University
-
B. Waters and E. Felten. Proving the Location of Tamper Resistant Devices. Technical report, Princeton University.
-
-
-
-
6
-
-
50249096161
-
-
Network Security: Private Communication in a PUBLIC World. Prentice Hall, 2002
-
C. Kaufman, R. Perlman and M. Speciner. Network Security: Private Communication in a PUBLIC World. Prentice Hall, 2002.
-
-
-
Kaufman, C.1
Perlman, R.2
Speciner, M.3
-
7
-
-
0037623983
-
Identify-based encryption from the weilpairing
-
D. Boneh and M. Franklin. Identify-based encryption from the weilpairing. SIAM Journal of Computing, 32(3):586-615, 2003.
-
(2003)
SIAM Journal of Computing
, vol.32
, Issue.3
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.2
-
10
-
-
34247582486
-
-
Available at
-
H. Tyan. J-Sim. Available at http://www.j-sim.org/.
-
J-Sim
-
-
Tyan, H.1
-
12
-
-
4544304744
-
The Sybil Attack
-
Cambridge, MA, USA, March
-
J. Douceur. The Sybil Attack. In Proceedings of IPTPS 2002, Cambridge, MA, USA, March 2002.
-
(2002)
Proceedings of IPTPS 2002
-
-
Douceur, J.1
-
13
-
-
50249179617
-
-
J. Hightower and G. Bordello. Location Systems for Ubiquitos Computing, August 2001. IEEE Computer Magazine.
-
J. Hightower and G. Bordello. Location Systems for Ubiquitos Computing, August 2001. IEEE Computer Magazine.
-
-
-
-
14
-
-
50249184664
-
-
J. Kohl and B. C. Neuman. The Kerberos Network Authentication Service (Version 5), September 1993. Internet Request for Comments RFC-1510.
-
J. Kohl and B. C. Neuman. The Kerberos Network Authentication Service (Version 5), September 1993. Internet Request for Comments RFC-1510.
-
-
-
-
15
-
-
3042785862
-
The Sybil Attack in Sensor Networks: Analysis and Defenses
-
Berkeley, CA, April
-
J. Newsome, E. Shi, D. Song and A. Perrig. The Sybil Attack in Sensor Networks: Analysis and Defenses. In Proceedings of IPSN 2004, Berkeley, CA, April 2004.
-
(2004)
Proceedings of IPSN 2004
-
-
Newsome, J.1
Shi, E.2
Song, D.3
Perrig, A.4
-
18
-
-
27544485427
-
Leap-Frog Packet Linking and Diverse Key Distributions for Improved Integrity in Network Broadcasts
-
M.T. Goodrich. Leap-Frog Packet Linking and Diverse Key Distributions for Improved Integrity in Network Broadcasts. In IEEE Symposium on Security and Privacy (SSP), pages 196-207, 2005.
-
(2005)
IEEE Symposium on Security and Privacy (SSP)
, pp. 196-207
-
-
Goodrich, M.T.1
-
20
-
-
27944442071
-
Location Estimation in Ad-Hoc Networks with Directional Antennas
-
N. Malhotra, M. Krasniewski, C. Yang, S. Bagchi, and W. Chappell. Location Estimation in Ad-Hoc Networks with Directional Antennas. In 25th International Conference on Distributed Computing Systems (ICDCS 2005), 2005.
-
(2005)
25th International Conference on Distributed Computing Systems (ICDCS 2005)
-
-
Malhotra, N.1
Krasniewski, M.2
Yang, C.3
Bagchi, S.4
Chappell, W.5
-
21
-
-
2942590111
-
PAC: Location Aware Access Control for Pervasive Computing Environments
-
Technical report, MIT Laboratory of Computer Science, 200 Technology Square, Cambridge MA, 02139 USA
-
N. Michalakis. PAC: Location Aware Access Control for Pervasive Computing Environments. Technical report, MIT Laboratory of Computer Science, 200 Technology Square, Cambridge MA, 02139 USA, 2002.
-
(2002)
-
-
Michalakis, N.1
-
23
-
-
0036949534
-
Energy-Efficient Computing for Wildlife Tracking: Design Tradeoffs and Early Experiences with ZebraNet
-
San Jose, CA, October
-
P. Juang, H. Oki, Y. Wang, M. Martonosi, L. Peh, and D. Rubenstein. Energy-Efficient Computing for Wildlife Tracking: Design Tradeoffs and Early Experiences with ZebraNet. In ASPLOS-X, San Jose, CA, October 2002.
-
(2002)
ASPLOS-X
-
-
Juang, P.1
Oki, H.2
Wang, Y.3
Martonosi, M.4
Peh, L.5
Rubenstein, D.6
-
25
-
-
84937428623
-
-
P. S. L. M. Barreto, H. Kim, B. Bynn, and M. Scott. Efficient Algorithms for Pairing-Based Cryptosystems. Advances in Cryptology - Crypto 2002, Lecture Notes on Computer Science 2442:354-368, 2002.
-
P. S. L. M. Barreto, H. Kim, B. Bynn, and M. Scott. Efficient Algorithms for Pairing-Based Cryptosystems. Advances in Cryptology - Crypto 2002, Lecture Notes on Computer Science 2442:354-368, 2002.
-
-
-
-
27
-
-
0018048246
-
Using Encryption for Authentication in Large Networks of Computers
-
December
-
R. M. Needham and M. D. Schroeder. Using Encryption for Authentication in Large Networks of Computers. In Communication of the ACM, pages 993-999, December 1978.
-
(1978)
Communication of the ACM
, pp. 993-999
-
-
Needham, R.M.1
Schroeder, M.D.2
-
28
-
-
11244254627
-
SECTOR: Secure Tracking of Node Encounters in Multi-hop Wireless Networks
-
Virginia, October
-
S. Capkun, L. Buttyan, and J. Hubaux. SECTOR: Secure Tracking of Node Encounters in Multi-hop Wireless Networks. In Proceedings of SASN 2003, Virginia, October 2003.
-
(2003)
Proceedings of SASN 2003
-
-
Capkun, S.1
Buttyan, L.2
Hubaux, J.3
-
29
-
-
4143078106
-
Proceedings of 9th ACM Symposium on Access Control Models and Technologies (SACMAT 2004)
-
Yorklown Heights, NY, June
-
U. Hengartner and P. Steenkiste. Proceedings of 9th ACM Symposium on Access Control Models and Technologies (SACMAT 2004). In SACMAT, pages 11-20, Yorklown Heights, NY, June 2004.
-
(2004)
SACMAT
, pp. 11-20
-
-
Hengartner, U.1
Steenkiste, P.2
-
30
-
-
0041973497
-
Packet Leashes: A Defense Against Wormhole Attacks in Wireless Ad Hoc Networks
-
San Francisco, CA, USA, April
-
Y. Hu, A. Perrig, and D. Johnson. Packet Leashes: A Defense Against Wormhole Attacks in Wireless Ad Hoc Networks. In Proceedings of INFOCOM, San Francisco, CA, USA, April 2003.
-
(2003)
Proceedings of INFOCOM
-
-
Hu, Y.1
Perrig, A.2
Johnson, D.3
-
32
-
-
24944483778
-
Securing Sensor Networks with Location-Based Keys
-
New Orleans, LA, March
-
Y. Zhang, W. Liu, W. Lou, and Y Fang. Securing Sensor Networks with Location-Based Keys. In IEEE Wireless Communications and Networking Conference (IVCNC'2005), New Orleans, LA, March 2005.
-
(2005)
IEEE Wireless Communications and Networking Conference (IVCNC'2005)
-
-
Zhang, Y.1
Liu, W.2
Lou, W.3
Fang, Y.4
|