-
1
-
-
0031142511
-
Key derivation for network management applications
-
U. Blumenthal, N. C. Hien, and B. Wijnen, "Key derivation for network management applications", IEEE Network, Vol. 11, pp. 26-29, 1997.
-
(1997)
IEEE Network
, vol.11
, pp. 26-29
-
-
Blumenthal, U.1
Hien, N.C.2
Wijnen, B.3
-
2
-
-
33747371642
-
Performance evaluation of an anonymity providing protocol for wireless ad hoc networks
-
A. Boukerche, K. El-Khatib, L. Xu, and L. Korba, "Performance evaluation of an anonymity providing protocol for wireless ad hoc networks", Performance Evaluation, Vol. 63, pp. 1094-1109, 2006.
-
(2006)
Performance Evaluation
, vol.63
, pp. 1094-1109
-
-
Boukerche, A.1
El-Khatib, K.2
Xu, L.3
Korba, L.4
-
4
-
-
56949106800
-
A trust-based security system for ubiquitous and pervasive computing environments
-
A. Boukerche, and Y. Ren, "A trust-based security system for ubiquitous and pervasive computing environments", Computer Communications, 2008.
-
(2008)
Computer Communications
-
-
Boukerche, A.1
Ren, Y.2
-
5
-
-
85106319926
-
A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols
-
J. Broch, D. A. Maltz, D. B. Johnson, Y. C. Hu, and J. Jetcheva, "A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols", Proceedings of the ACM/IEEE Annual International Conference on Mobile Computing and Networking, pp. 85-97, 1998.
-
(1998)
Proceedings of the ACM/IEEE Annual International Conference on Mobile Computing and Networking
, pp. 85-97
-
-
Broch, J.1
Maltz, D.A.2
Johnson, D.B.3
Hu, Y.C.4
Jetcheva, J.5
-
6
-
-
0038487088
-
Random key predistribution schemes for sensor networks
-
H. Chan, A. Perrig, and D. Song, "Random key predistribution schemes for sensor networks", Proceedings of IEEE Symposium on Security and Privacy, pp. 197-213, 2003.
-
(2003)
Proceedings of IEEE Symposium on Security and Privacy
, pp. 197-213
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
7
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
D. Chaum, "Untraceable electronic mail, return addresses, and digital pseudonyms", Communications of the ACM, Vol. 24, pp. 84-88, 1981.
-
(1981)
Communications of the ACM
, vol.24
, pp. 84-88
-
-
Chaum, D.1
-
10
-
-
33646918277
-
Dynamic key management in sensor networks
-
M. Eltoweissy, M. Moharrum, and R. Mukkamala, "Dynamic key management in sensor networks", IEEE Communications Magazine, Vol. 44, pp. 122-130, 2006.
-
(2006)
IEEE Communications Magazine
, vol.44
, pp. 122-130
-
-
Eltoweissy, M.1
Moharrum, M.2
Mukkamala, R.3
-
11
-
-
0027612497
-
Principles of key management
-
W. Fumy, and P. Landrock, "Principles of key management", IEEE Journal on Selected Areas in Communications, Vol. 11, pp. 785-793, 1993.
-
(1993)
IEEE Journal on Selected Areas in Communications
, vol.11
, pp. 785-793
-
-
Fumy, W.1
Landrock, P.2
-
12
-
-
4243552572
-
Freedom network 1.0 architecture
-
November
-
I. Goldberg, and A. Shostack, "Freedom network 1.0 architecture", November 1999.
-
(1999)
-
-
Goldberg, I.1
Shostack, A.2
-
14
-
-
85017404375
-
A group mobility model for ad hoc wireless networks
-
X. Hong, M. Gerla, G. Pei, and C.-C. Chiang, "A group mobility model for ad hoc wireless networks", Proceedings of 2nd ACM workshop on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM), pp. 53-60, 1999.
-
(1999)
Proceedings of 2nd ACM workshop on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM)
, pp. 53-60
-
-
Hong, X.1
Gerla, M.2
Pei, G.3
Chiang, C.-C.4
-
15
-
-
1342347276
-
Dynamics of key management in secure satellite multicast
-
M. P. Howarth, S. Iyengar, Z. Sun, and H. Cruickshank, "Dynamics of key management in secure satellite multicast", IEEE Journal on Selected Areas in Communications, Vol. 22, pp. 308-319, 2004.
-
(2004)
IEEE Journal on Selected Areas in Communications
, vol.22
, pp. 308-319
-
-
Howarth, M.P.1
Iyengar, S.2
Sun, Z.3
Cruickshank, H.4
-
16
-
-
15344340888
-
An analysis of the fisheye routing technique in highly mobile ad hoc networks
-
E. Johansson, K. Persson, M. Skold, and U. Sterner, "An analysis of the fisheye routing technique in highly mobile ad hoc networks", Proceedings of IEEE Vehicular Technology Conference (VTC), pp. 2166-2170, 2004.
-
(2004)
Proceedings of IEEE Vehicular Technology Conference (VTC)
, pp. 2166-2170
-
-
Johansson, E.1
Persson, K.2
Skold, M.3
Sterner, U.4
-
17
-
-
42749108355
-
Identity-Based and Threshold Key Management in Mobile Ad Hoc Networks
-
J. Li, D. Wei, and H. Kou, "Identity-Based and Threshold Key Management in Mobile Ad Hoc Networks", Proceedings of International Conference on Wireless Communications, Networking and Mobile Computing (WiCom), pp. 1-4, 2006.
-
(2006)
Proceedings of International Conference on Wireless Communications, Networking and Mobile Computing (WiCom)
, pp. 1-4
-
-
Li, J.1
Wei, D.2
Kou, H.3
-
18
-
-
35148820142
-
On the Performance of a Distributed Key Management Scheme in Heterogeneous Wireless Sensor Networks
-
K. Lu, and Y. Qian, "On the Performance of a Distributed Key Management Scheme in Heterogeneous Wireless Sensor Networks", Proceedings of IEEE Military Communications Conference (MILCOM), pp. 1-7, 2006.
-
(2006)
Proceedings of IEEE Military Communications Conference (MILCOM)
, pp. 1-7
-
-
Lu, K.1
Qian, Y.2
-
19
-
-
4544385707
-
A security design for a general purpose, self-organizing, multihop ad hoc wireless network
-
T. S. Messerges, J. Cukier, and T. A. M. Kevenaar, Eds
-
T. S. Messerges, J. Cukier, and T. A. M. Kevenaar, Eds., "A security design for a general purpose, self-organizing, multihop ad hoc wireless network", Proceedings of 1st ACM workshop on Security of ad hoc and sensor networks, pp. 1-11, 2003.
-
(2003)
Proceedings of 1st ACM workshop on Security of ad hoc and sensor networks
, pp. 1-11
-
-
-
20
-
-
84969528923
-
Combinatorial optimization of multicast key management
-
L. Morales, I. H. Sudborough, and M. Eltoweissy, Eds
-
L. Morales, I. H. Sudborough, and M. Eltoweissy, Eds., "Combinatorial optimization of multicast key management", Proceedings of Annual Hawaii International Conference on System Sciences, 2003.
-
(2003)
Proceedings of Annual Hawaii International Conference on System Sciences
-
-
-
22
-
-
58049111476
-
-
NS-2, available at, Information Sciences Institute, University of Southern California
-
NS-2, available at http://www.isi.edu/nsnam/ns/, Information Sciences Institute, University of Southern California.
-
-
-
-
24
-
-
58049096665
-
An Analysis of the Simple Network Management Protocol version
-
M. Sc. Thesis, Enschede, University of Twente
-
E. Schekkerman, "An Analysis of the Simple Network Management Protocol version", M. Sc. Thesis, Enschede, University of Twente, 1993.
-
(1993)
-
-
Schekkerman, E.1
-
25
-
-
4644294648
-
A scalable multicast key management scheme for heterogeneous wireless networks
-
Y. Sun, W. Trappe, and K. J. R. Liu, "A scalable multicast key management scheme for heterogeneous wireless networks", IEEE/ACM Transactions on Networking, Vol. 12, pp. 653-666, 2004.
-
(2004)
IEEE/ACM Transactions on Networking
, vol.12
, pp. 653-666
-
-
Sun, Y.1
Trappe, W.2
Liu, K.J.R.3
-
26
-
-
58049129625
-
Symmetric-key algorithm
-
Wikipedia contributors, February
-
Wikipedia contributors, "Symmetric-key algorithm", Wikipedia, The Free Encyclopedia, February, 2008.
-
(2008)
Wikipedia, The Free Encyclopedia
-
-
-
27
-
-
45849112920
-
A Scalable De-centralized Multicast Key Management Scheme
-
Y. Xu, Z. Xu, and X. Chen, Eds, Information and Control, pp
-
Y. Xu, Z. Xu, and X. Chen, Eds., "A Scalable De-centralized Multicast Key Management Scheme", Proceedings of International Conference on Innovative Computing, Information and Control, pp. 463-467, 2006.
-
(2006)
Proceedings of International Conference on Innovative Computing
, pp. 463-467
-
-
-
28
-
-
35148843864
-
A Feasible Key Management Scheme in Ad hoc Network
-
Y.-T. Yang, P. Zeng, and Y. Fang, Eds
-
Y.-T. Yang, P. Zeng, and Y. Fang, Eds., "A Feasible Key Management Scheme in Ad hoc Network", Proceedings of 8th ACIS Conference on the International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD), pp. 300-303, 2007.
-
(2007)
Proceedings of 8th ACIS Conference on the International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)
, pp. 300-303
-
-
-
29
-
-
13244255381
-
Composite key management for ad hoc networks
-
S. Yi, and R. Kravets, "Composite key management for ad hoc networks", Proceedings of the Annual International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (MOBIQUITOUS), pp. 52-61, 2004.
-
(2004)
Proceedings of the Annual International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (MOBIQUITOUS)
, pp. 52-61
-
-
Yi, S.1
Kravets, R.2
|