-
2
-
-
0242456134
-
-
Capkun S, Buttyan L, Hubaux J. Small worlds in security systems: an analysis of the PGP certificate graph. In: New security paradigms workshop 2002; 2002.
-
Capkun S, Buttyan L, Hubaux J. Small worlds in security systems: an analysis of the PGP certificate graph. In: New security paradigms workshop 2002; 2002.
-
-
-
-
5
-
-
0036804761
-
Routing security in wireless ad hoc networks
-
Deng H., Li W., and Agrawal D.P. Routing security in wireless ad hoc networks. IEEE Commun Mag (October 2002) 70-75
-
(2002)
IEEE Commun Mag
, pp. 70-75
-
-
Deng, H.1
Li, W.2
Agrawal, D.P.3
-
6
-
-
34548050159
-
Providing distributed certificate authority service in cluster-based mobile ad hoc networks
-
Dong Y., Sui A.-F., Yiu S., Li V.O., and Hui L.C. Providing distributed certificate authority service in cluster-based mobile ad hoc networks. Elsevier, Comput Commun (May 2007)
-
(2007)
Elsevier, Comput Commun
-
-
Dong, Y.1
Sui, A.-F.2
Yiu, S.3
Li, V.O.4
Hui, L.C.5
-
7
-
-
0001847481
-
On the evolution of random graphs
-
Erdos P., and Rényi A. On the evolution of random graphs. Acta Math Hung (1960) 17-61
-
(1960)
Acta Math Hung
, pp. 17-61
-
-
Erdos, P.1
Rényi, A.2
-
9
-
-
0242410360
-
A practical (t, n) threshold proxy signature scheme based on the RSA cryptosystem
-
Hwang M., Lu E., and Lin I.-C. A practical (t, n) threshold proxy signature scheme based on the RSA cryptosystem. IEEE Trans Knowledge Data Eng 15 (November/December 2003) 1552-1560
-
(2003)
IEEE Trans Knowledge Data Eng
, vol.15
, pp. 1552-1560
-
-
Hwang, M.1
Lu, E.2
Lin, I.-C.3
-
10
-
-
0000629443
-
Dynamic source routing in ad hoc wireless networks
-
Kluwer Academic Publishers
-
Johnson D., and Maltz D. Dynamic source routing in ad hoc wireless networks. Mobile computing vol. 353 (1996), Kluwer Academic Publishers
-
(1996)
Mobile computing
, vol.353
-
-
Johnson, D.1
Maltz, D.2
-
11
-
-
63049093816
-
-
Kohl J, Neuman B. The Kerberos network authentication service version 5. RFC-1510; 1991
-
Kohl J, Neuman B. The Kerberos network authentication service version 5. RFC-1510; 1991.
-
-
-
-
12
-
-
0035704362
-
Providing robust and ubiquitous security support for mobile ad hoc networks
-
November
-
Kong J, Zerfos P, Luo H, Lu S, Zhang L. Providing robust and ubiquitous security support for mobile ad hoc networks. In: Proceedings of the 9th international conference on network protocols, November 2001.
-
(2001)
Proceedings of the 9th international conference on network protocols
-
-
Kong, J.1
Zerfos, P.2
Luo, H.3
Lu, S.4
Zhang, L.5
-
13
-
-
0008144151
-
Ubiquitous and robust authentication services for ad hoc wireless networks
-
Technical report, UCLA Computer; 2000
-
Luo H, Lu S. Ubiquitous and robust authentication services for ad hoc wireless networks. Technical report, UCLA Computer; 2000.
-
-
-
Luo, H.1
Lu, S.2
-
14
-
-
30344446233
-
Dictate: distributed certification authority with probabilistic freshness for ad hoc networks
-
Luo J., Hubaux J., and Eugster P. Dictate: distributed certification authority with probabilistic freshness for ad hoc networks. IEEE Trans Dependable Secure Comput (2005)
-
(2005)
IEEE Trans Dependable Secure Comput
-
-
Luo, J.1
Hubaux, J.2
Eugster, P.3
-
19
-
-
0003582910
-
-
Addison Wesley Professional
-
Perkins C. Ad hoc networking (December 2000), Addison Wesley Professional
-
(2000)
Ad hoc networking
-
-
Perkins, C.1
-
20
-
-
0033314753
-
An overview of PKI trusts models
-
Perlman R. An overview of PKI trusts models. IEEE Netw (1999)
-
(1999)
IEEE Netw
-
-
Perlman, R.1
-
24
-
-
3142569233
-
Highly reliable trust establishment scheme in ad hoc networks
-
Ren K., Li T., Wan Z., Bao F., Deng R.H., and Kim K. Highly reliable trust establishment scheme in ad hoc networks. Elsevier, Comput Netw (April 2004)
-
(2004)
Elsevier, Comput Netw
-
-
Ren, K.1
Li, T.2
Wan, Z.3
Bao, F.4
Deng, R.H.5
Kim, K.6
-
25
-
-
0018545449
-
How to share a secret
-
Shamir A. How to share a secret. Commun ACM (1979)
-
(1979)
Commun ACM
-
-
Shamir, A.1
-
30
-
-
0033357103
-
Securing ad hoc networks
-
Zhou L., and Haas Z. Securing ad hoc networks. IEEE Netw 6 13 (November-December 1999) 24-30
-
(1999)
IEEE Netw
, vol.6
, Issue.13
, pp. 24-30
-
-
Zhou, L.1
Haas, Z.2
-
31
-
-
18244376871
-
Efficient and robust key management for large mobile ad hoc networks
-
Zhu B., Bao F., Deng R., Kankanhalli M., and Wang G. Efficient and robust key management for large mobile ad hoc networks. Elsevier, Comput Netw 48 (December 2005) 657-682
-
(2005)
Elsevier, Comput Netw
, vol.48
, pp. 657-682
-
-
Zhu, B.1
Bao, F.2
Deng, R.3
Kankanhalli, M.4
Wang, G.5
|