-
2
-
-
0033357103
-
Securing Ad Hoc Networks
-
J. Z. Haas and L. Zhou, "Securing Ad Hoc Networks," IEEE Network, vol. 13, pp. 24-30, 1999.
-
(1999)
IEEE Network
, vol.13
, pp. 24-30
-
-
Haas, J.Z.1
Zhou, L.2
-
3
-
-
30344446233
-
DICTATE: Distributed CerTification Authority with probabilis Tic frEshness for Ad Hoc Networks
-
T. E. Patrick, "DICTATE: Distributed CerTification Authority with probabilis Tic frEshness for Ad Hoc Networks," IEEE Trans. Dependable Secur. Comput., vol. 2, pp. 311-323, 2005.
-
(2005)
IEEE Trans. Dependable Secur. Comput
, vol.2
, pp. 311-323
-
-
Patrick, T.E.1
-
6
-
-
84883869163
-
Self-securing ad hoc wireless networks
-
H. Luo, P. Zerfos, J. Kong, S. Lu, and L. Zhang, "Self-securing ad hoc wireless networks," In The 7th IEEE Symposium on Computers and Communications, 2002.
-
(2002)
The 7th IEEE Symposium on Computers and Communications
-
-
Luo, H.1
Zerfos, P.2
Kong, J.3
Lu, S.4
Zhang, L.5
-
9
-
-
34047158736
-
On Dynamic Distribution of Private Keys over MANETs
-
V. Daza, P. Morillo, and C. Ràfols, "On Dynamic Distribution of Private Keys over MANETs," Electron. Notes Theor. Comput. Sci., vol. 171, pp. 33-41, 2007.
-
(2007)
Electron. Notes Theor. Comput. Sci
, vol.171
, pp. 33-41
-
-
Daza, V.1
Morillo, P.2
Ràfols, C.3
-
10
-
-
33749611163
-
Bootstrapping security in mobile ad hoc networks using identity-based schemes with key revocation,
-
Technical Report CACR 2006-04, University of Waterloo, Canada
-
K. Hoeper and G. Gong, "Bootstrapping security in mobile ad hoc networks using identity-based schemes with key revocation," Technical Report CACR 2006-04, University of Waterloo, Canada.
-
-
-
Hoeper, K.1
Gong, G.2
-
11
-
-
11244320485
-
URSA: Ubiquitous and robust access control for mobile ad hoc networks
-
L. Haiyun, K. Jiejun, Z. Petros, Lu Songwu, and Z. Lixia, "URSA: ubiquitous and robust access control for mobile ad hoc networks," IEEE/ACM Trans. Networking, vol. 12, pp. 1049-1063, 2004.
-
(2004)
IEEE/ACM Trans. Networking
, vol.12
, pp. 1049-1063
-
-
Haiyun, L.1
Jiejun, K.2
Petros, Z.3
Lu, S.4
Lixia, Z.5
-
12
-
-
0242678584
-
Self-Organized Public-Key Management for Mobile Ad Hoc Networks
-
C. Srdjan, B. Levente, and H. Jean-Pierre, "Self-Organized Public-Key Management for Mobile Ad Hoc Networks," IEEE Transactions on Mobile Computing, vol. 2, pp. 52-64, 2003.
-
(2003)
IEEE Transactions on Mobile Computing
, vol.2
, pp. 52-64
-
-
Srdjan, C.1
Levente, B.2
Jean-Pierre, H.3
-
13
-
-
0842289235
-
Bootstrapping security associations for routing in mobile ad-hoc networks
-
presented at
-
R. B. Bobba, L. Eschenauer, V. Gligor, and W. Arbaugh, "Bootstrapping security associations for routing in mobile ad-hoc networks," presented at Global Telecommunications Conference, IEEEGLOBECOM '03, 2003.
-
(2003)
Global Telecommunications Conference, IEEEGLOBECOM '03
-
-
Bobba, R.B.1
Eschenauer, L.2
Gligor, V.3
Arbaugh, W.4
-
15
-
-
55849126078
-
-
Accessed on: 1st February, 2008
-
"Engage Packet Builder, http://www.engagesecurity.com/products/ engagepacketbuilder/, Accessed on: 1st February, 2008."
-
Engage Packet Builder
-
-
-
16
-
-
33749589405
-
-
K. Frank, S. Stefan, and W. Michael, Identification in Ad Hoc Networks, in Proceedings of the 39th Annual Hawaii International Conference on System Sciences - 09: IEEE Computer Society, 2006.
-
K. Frank, S. Stefan, and W. Michael, "Identification in Ad Hoc Networks," in Proceedings of the 39th Annual Hawaii International Conference on System Sciences - Volume 09: IEEE Computer Society, 2006.
-
-
-
-
17
-
-
33846626862
-
Multiple-key cryptography-based distributed certificate authority in mobile ad-hoc networks
-
presented at, IEEE
-
Z. Hongbo, M. W. Mutka, and L. M. Ni, "Multiple-key cryptography-based distributed certificate authority in mobile ad-hoc networks," presented at Global Telecommunications Conference, 2005. GLOBECOM '05. IEEE, 2005.
-
(2005)
Global Telecommunications Conference, 2005. GLOBECOM '05
-
-
Hongbo, Z.1
Mutka, M.W.2
Ni, L.M.3
-
18
-
-
35548992569
-
SybilGuard: Defending against sybil attacks via social networks
-
ACM Press
-
H. Yu, M. Kaminsky, P. Gibbons, and A. Flaxman, "SybilGuard: defending against sybil attacks via social networks," in Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications: ACM Press, 2006.
-
(2006)
Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications
-
-
Yu, H.1
Kaminsky, M.2
Gibbons, P.3
Flaxman, A.4
|