-
1
-
-
0003843664
-
-
IETF RFC 3561, July
-
Perkins, C., Belding-Royer, E., Das, S., "Ad hoc On-Demand Distance Vector (AODV) Routing", IETF RFC 3561, July 2003.
-
(2003)
Ad hoc On-Demand Distance Vector (AODV) Routing
-
-
Perkins, C.1
Belding-Royer, E.2
Das, S.3
-
2
-
-
0033357103
-
Securing ad hoc networks
-
IEEE press
-
Zhou, L., and Haas, Z. L., "Securing ad hoc networks", IEEE Network, Vol. 13, Issue 6, pp. 24-30, IEEE press, 1999.
-
(1999)
IEEE Network
, vol.13
, Issue.6
, pp. 24-30
-
-
Zhou, L.1
Haas, Z.L.2
-
3
-
-
0035704362
-
Providing robust and ubiquitous security support for mobile ad-hoc networks
-
Nov
-
Kong, J., Zerfos, P., Luo, H., Lu, S., Zhang, L., "Providing robust and ubiquitous security support for mobile ad-hoc networks", Proceedings of ICNP 2001, pp. 251-260, Nov. 2001.
-
(2001)
Proceedings of ICNP 2001
, pp. 251-260
-
-
Kong, J.1
Zerfos, P.2
Luo, H.3
Lu, S.4
Zhang, L.5
-
4
-
-
17144398990
-
MOCA: Mobile certificate authority for wireless ad-hoc networks
-
Yi, S., Kravets, R., "MOCA: Mobile certificate authority for wireless ad-hoc networks", Proceedings of PKI'03, 2003.
-
(2003)
Proceedings of PKI'03
-
-
Yi, S.1
Kravets, R.2
-
5
-
-
0035789229
-
The quest for security in mobile ad hoc networks
-
Hubaux, J.-P., Buttyan, L., Capkun, S., "The quest for security in mobile ad hoc networks", proceedings of ACM Mobihoc, 2001.
-
(2001)
proceedings of ACM Mobihoc
-
-
Hubaux, J.-P.1
Buttyan, L.2
Capkun, S.3
-
6
-
-
33646847482
-
On-demand public-key management for mobile ad hoc networks
-
May, Wiley
-
Li, R., Li., J., Liu, P., Chen, H.-H., "On-demand public-key management for mobile ad hoc networks", Wireless Communications and Mobile Computing, Vol. 6(3), pp. 295-306, May 2006, Wiley.
-
(2006)
Wireless Communications and Mobile Computing
, vol.6
, Issue.3
, pp. 295-306
-
-
Li, R.1
Li, J.2
Liu, P.3
Chen, H.-H.4
-
7
-
-
34047142151
-
Building a virtual hierarchy to simplify certification path discovery in mobile ad-hoc networks
-
May, Elsevier
-
Satizábal, C. Hernández-Serrano, J., Forné, J., Pegueroles, J., "Building a virtual hierarchy to simplify certification path discovery in mobile ad-hoc networks", Computer Communications, Vol. 30, Issue 7, pp. 1498-1512, May 2007, Elsevier.
-
(2007)
Computer Communications
, vol.30
, Issue.7
, pp. 1498-1512
-
-
Satizábal, C.1
Hernández-Serrano, J.2
Forné, J.3
Pegueroles, J.4
-
8
-
-
33745894628
-
Cluster-Based Certificate Chain for Mobile Ad Hoc Networks
-
proceedings of the ICCSA, Springer
-
Hahn, G., Kwon, T., Kim, S. and Song, J., "Cluster-Based Certificate Chain for Mobile Ad Hoc Networks", proceedings of the ICCSA 2006, pp. 769-778, LNCS 3981, Springer.
-
(2006)
LNCS
, vol.3981
, pp. 769-778
-
-
Hahn, G.1
Kwon, T.2
Kim, S.3
Song, J.4
-
9
-
-
33846983251
-
Issues in initializing security
-
Asokan, N., Tarkkala, L., "Issues in initializing security", proceedings of ISSPIT, pp. 460-465, 2005.
-
(2005)
proceedings of ISSPIT
, pp. 460-465
-
-
Asokan, N.1
Tarkkala, L.2
-
10
-
-
84943235829
-
-
Dwork, C., Naor, M., Pricing via Processing or Combating Junk Mail, CRYPTO'92, pp. 139-147, 1992.
-
Dwork, C., Naor, M., "Pricing via Processing or Combating Junk Mail", CRYPTO'92, pp. 139-147, 1992.
-
-
-
-
11
-
-
21644461880
-
Moderately Hard, Memory-Bound Functions
-
Abadi, M., Burrows, M., Manasse, M., Wobber, T., "Moderately Hard, Memory-Bound Functions", ACM Trans. Inter. Tech., Vol. 5, No. 2, pp. 299-327, 2005.
-
(2005)
ACM Trans. Inter. Tech
, vol.5
, Issue.2
, pp. 299-327
-
-
Abadi, M.1
Burrows, M.2
Manasse, M.3
Wobber, T.4
-
12
-
-
33646845802
-
Cooperation Enforcement Schemes for MANETs: A Survey
-
Marias, G. F., Flitzanis, D., Mandalas, K., and Georgiadis, P., "Cooperation Enforcement Schemes for MANETs: A Survey", Wiley's Journal of Wireless Communications and Mobile Computing, Special Issue, Vol. 6, Issue 3, pp. 319-332, 2006.
-
(2006)
Wiley's Journal of Wireless Communications and Mobile Computing, Special Issue
, vol.6
, Issue.3
, pp. 319-332
-
-
Marias, G.F.1
Flitzanis, D.2
Mandalas, K.3
Georgiadis, P.4
-
13
-
-
37249003759
-
On Device Authentication in Wireless Networks: Present issues and future challenges
-
TrustBus'07
-
Kambourakis, G., Gritzalis, S., "On Device Authentication in Wireless Networks: Present issues and future challenges", TrustBus'07, LNCS, 2007.
-
(2007)
LNCS
-
-
Kambourakis, G.1
Gritzalis, S.2
-
14
-
-
0242678584
-
Self-organized public-key management for mobile ad hoc networks
-
Jan, March, IEEE press
-
Capkun, S.; Buttyan, L., Hubaux, J.-P., "Self-organized public-key management for mobile ad hoc networks", IEEE Transactions on Mobile Computing Volume 2, Issue 1, Jan. -March 2003, pp. 52-64, IEEE press.
-
(2003)
IEEE Transactions on Mobile Computing
, vol.2
, Issue.1
, pp. 52-64
-
-
Capkun, S.1
Buttyan, L.2
Hubaux, J.-P.3
|