-
1
-
-
0036804761
-
Routing security in wireless ad hoc networks
-
Oct
-
Deng, H., Li, W., Agrawal, D.P.: Routing security in wireless ad hoc networks. IEEE Communications Magazine, Vol. 40, Issue 10. (Oct. 2002) 70-75.
-
(2002)
IEEE Communications Magazine
, vol.40
, Issue.10
, pp. 70-75
-
-
Deng, H.1
Li, W.2
Agrawal, D.P.3
-
2
-
-
84892591410
-
A survey of security issues in mobile ad hoc and sensor networks
-
Fourth Quarter
-
Djenouri, D. Khelladi, L. Badache, A.N.: A survey of security issues in mobile ad hoc and sensor networks. IEEE Communications Surveys & Tutorials, Vol.7, Issue 4. (Fourth Quarter 2005) 2-28.
-
(2005)
IEEE Communications Surveys & Tutorials
, vol.7
, Issue.4
, pp. 2-28
-
-
Djenouri, D.1
Khelladi, L.2
Badache, A.N.3
-
3
-
-
38049003964
-
A survey of key management in ad hoc networks
-
3rd Quarter
-
Hegland, A.M., Winjum, E., Mjolsnes, S.F., Rong, C., Kure, O., Spilling, P.: A survey of key management in ad hoc networks. IEEE Communications Surveys & Tutorials, Vol. 8, No. 3. (3rd Quarter 2006) 48-66.
-
(2006)
IEEE Communications Surveys & Tutorials
, vol.8
, Issue.3
, pp. 48-66
-
-
Hegland, A.M.1
Winjum, E.2
Mjolsnes, S.F.3
Rong, C.4
Kure, O.5
Spilling, P.6
-
5
-
-
34347219408
-
Distributed authentication and key agreement protocol for ad hoc network
-
Feb
-
Mo, Y., Wang, F., Huang, B.X., Xu, S.: Distributed authentication and key agreement protocol for ad hoc network. The 9th International Conference on Advanced Communication Technology, Vol. 3. (Feb. 2007) 2047-2050.
-
(2007)
The 9th International Conference on Advanced Communication Technology
, vol.3
, pp. 2047-2050
-
-
Mo, Y.1
Wang, F.2
Huang, B.X.3
Xu, S.4
-
6
-
-
33845940708
-
Securing ad hoc networks with asymmetric probabilistic key predistribution schemes
-
Ramkumar, M.: Securing ad hoc networks with asymmetric probabilistic key predistribution schemes. IEEE Information Assurance Workshop. (2006) 290-296.
-
(2006)
IEEE Information Assurance Workshop
, pp. 290-296
-
-
Ramkumar, M.1
-
7
-
-
15244360279
-
An efficient key predistribution scheme for ad hoc network security
-
Mar
-
Ramkumar, M., Memon, N.: An efficient key predistribution scheme for ad hoc network security. IEEE Journal on Selected Areas in Communications, Vol. 23, Issue 3. (Mar. 2005) 611-621.
-
(2005)
IEEE Journal on Selected Areas in Communications
, vol.23
, Issue.3
, pp. 611-621
-
-
Ramkumar, M.1
Memon, N.2
-
10
-
-
39049096786
-
ODAR: On-demand anonymous routing in ad hoc networks
-
MASS, Oct
-
Sy, D., Chen, R., Bao, L.: ODAR: On-demand anonymous routing in ad hoc networks. IEEE International Conference on Mobile Adhoc and Sensor Systems (MASS). (Oct. 2006) 267-276.
-
(2006)
IEEE International Conference on Mobile Adhoc and Sensor Systems
, pp. 267-276
-
-
Sy, D.1
Chen, R.2
Bao, L.3
-
11
-
-
33751439977
-
Pairwise key establishments without key pre-distribution for mobile ad hoc network environment
-
11, Dec
-
11.Wang, G., Cho, G.: Pairwise key establishments without key pre-distribution for mobile ad hoc network environment. IEE Proceedings of Communications, Vol. 153, Issue 6. (Dec. 2006) 822-827.
-
(2006)
IEE Proceedings of Communications
, vol.153
, Issue.6
, pp. 822-827
-
-
Wang, G.1
Cho, G.2
-
12
-
-
50049110705
-
Discount anonymous on demand routing for mobile ad hoc networks
-
Yang, L., Jakobsson, M., Wetzel, S.: Discount anonymous on demand routing for mobile ad hoc networks. Securecomm and Workshops. (2006) 1-10.
-
(2006)
Securecomm and Workshops
, pp. 1-10
-
-
Yang, L.1
Jakobsson, M.2
Wetzel, S.3
-
13
-
-
20544465052
-
Anonymous secure routing in mobile ad-hoc networks
-
16-18 Nov
-
Zhu, B., Wan, Z., Kankanhalli, M.S., Bao, F., Deng, R.H.: Anonymous secure routing in mobile ad-hoc networks. 29th Annual IEEE International Conference on Local Computer Networks. (16-18 Nov. 2004) 102-108.
-
(2004)
29th Annual IEEE International Conference on Local Computer Networks
, pp. 102-108
-
-
Zhu, B.1
Wan, Z.2
Kankanhalli, M.S.3
Bao, F.4
Deng, R.H.5
|