-
1
-
-
0036688074
-
A survey on sensor networks
-
Aug.
-
I. Akyildiz et al., "A Survey on Sensor Networks," IEEE Commun. Mag., vol. 40, no. 8, Aug. 2002, pp. 102-116
-
(2002)
IEEE Commun. Mag.
, vol.40
, Issue.8
, pp. 102-116
-
-
Akyildiz, I.1
-
2
-
-
13844296355
-
Wireless mesh networks: A survey
-
Mar.
-
Akyildiz, X. Wang, and W. Wang, "Wireless Mesh Networks: A Survey," Comp. Net., Mar. 2005.
-
(2005)
Comp. Net.
-
-
Wang, A.X.1
Wang, W.2
-
3
-
-
3042647758
-
A survey of secure wireless ad hoc routing
-
May-June
-
Hu and A. Perrig, "A Survey of Secure Wireless Ad Hoc Routing," IEEE Sec. & Privacy, vol. 2, no. 3, May-June 2004, pp. 28-39.
-
(2004)
IEEE Sec. & Privacy
, vol.2
, Issue.3
, pp. 28-39
-
-
Hu1
Perrig, A.2
-
4
-
-
4143071452
-
A survey on wireless security in mobile ad hoc networks: Challenges and possible solutions
-
(Springer Network Theory and Applications Series) X. Chen, X. Huang, and D.-Z. Du, Eds., Kluwer/Springer
-
W. Lou and Y. Fang, "A Survey on Wireless Security in Mobile Ad Hoc Networks: Challenges and Possible Solutions," in Ad Hoc Wireless Networking (Springer Network Theory and Applications Series), vol. 14, X. Chen, X. Huang, and D.-Z. Du, Eds., Kluwer/Springer, 2004.
-
(2004)
Ad Hoc Wireless Networking
, vol.14
-
-
Lou, W.1
Fang, Y.2
-
5
-
-
1842815887
-
Security in mobile ad hoc networks: Challenges and solutions
-
Feb.
-
H. Yang et al., "Security in Mobile Ad Hoc Networks: Challenges and Solutions," IEEE Wireless Commun., vol. 11, no. 1, Feb. 2004, pp. 38-47.
-
(2004)
IEEE Wireless Commun.
, vol.11
, Issue.1
, pp. 38-47
-
-
Yang, H.1
-
6
-
-
34547545598
-
A secure authentication and billing architecture for wireless mesh networks
-
Oct.
-
Y. Zhang and Y. Fang, "A Secure Authentication and Billing Architecture for Wireless Mesh Networks," ACM Wireless Net, vol. 13, no. 5, Oct. 2007, pp. 569-582
-
(2007)
ACM Wireless Net
, vol.13
, Issue.5
, pp. 569-582
-
-
Zhang, Y.1
Fang, Y.2
-
7
-
-
33749856769
-
ARSA: An attack-resilient security architecture for multihop wireless mesh networks
-
DOI 10.1109/JSAC.2006.877223, 1705622
-
Y. Zhang and Y. Fang, "ARSA: An Attack-Resilient Security Architecture for Multi-Hop Wireless Mesh Networks," IEEE JSAC, vol. 24, no. 10, Oct. 2006, pp. 1916-1928 (Pubitemid 44559604)
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, Issue.10
, pp. 1916-1928
-
-
Zhang, Y.1
Fang, Y.2
-
8
-
-
33144476837
-
Location-based security mechanisms in wireless sensor networks
-
Feb.
-
Y. Zhang et al., "Location-based Security Mechanisms in Wireless Sensor Networks," IEEE JSAC, vol. 24, no. 2, Feb. 2006, pp. 247-260
-
(2006)
IEEE JSAC
, vol.24
, Issue.2
, pp. 247-260
-
-
Zhang, Y.1
-
9
-
-
33748622050
-
MASK: Anonymous on-demand routing in mobile Ad Hoc networks
-
DOI 10.1109/TWC.2006.1687761, 1687761
-
Y. Zhang et al., "MASK: Anonymous On- Demand Routing in Mobile Ad Hoc Networks," IEEE Trans. Wireless Commun., vol. 5, no. 9, Sept. 2006, pp. 2376-2385 (Pubitemid 44376150)
-
(2006)
IEEE Transactions on Wireless Communications
, vol.5
, Issue.9
, pp. 2376-2385
-
-
Zhang, Y.1
Liu, W.2
Lou, W.3
Fang, Y.4
-
10
-
-
33751529199
-
Securing mobile ad hoc networks with certificateless public keys
-
Oct.-Dec.
-
Y. Zhang et al., "Securing Mobile Ad Hoc Networks with Certificateless Public Keys," IEEE Trans. Dependable Secure Comp., vol. 3, no. 4, Oct.-Dec. 2006, pp. 386-399
-
(2006)
IEEE Trans. Dependable Secure Comp.
, vol.3
, Issue.4
, pp. 386-399
-
-
Zhang, Y.1
-
11
-
-
0345490607
-
Certificateless Public Key Cryptography
-
Advances in Cryptology - ASIACRYPT 2003
-
S. Al-Riyami and K. Paterson, "Certificateless Public Key Cryptography," Proc. AsiaCrypt ' 03, LNCS 2894, Springer-Verlag, 2003, pp. 452-473 (Pubitemid 37502192)
-
(2003)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.2894
, pp. 452-473
-
-
Al-Riyami, S.S.1
Paterson, K.G.2
-
12
-
-
85020598353
-
Identity based cryptosystems and signature schemes
-
LNCS 196, Springer- Verlag
-
A. Shamir, "Identity Based Cryptosystems and Signature Schemes," Proc. CRYPTO ' 84, LNCS 196, Springer- Verlag, 1984, pp. 47-53.
-
(1984)
Proc. CRYPTO '84
, pp. 47-53
-
-
Shamir, A.1
-
14
-
-
84874324906
-
Identify-based encryption from the weil pairing
-
LNCS 2139, Springer-Verlag
-
D. Boneh and M. Franklin, "Identify-based Encryption from the Weil Pairing," Proc. CRYPTO 01, LNCS 2139, Springer-Verlag, 2001, pp. 213-229
-
(2001)
Proc. CRYPTO '01
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
15
-
-
84937428623
-
Efficient algorithms for pairing-based cryptosystems
-
LNCS 2442. Springer-Verlag
-
P. Barreto, H. Kim, B. Bynn, and M. Scott, "Efficient Algorithms for Pairing-Based Cryptosystems," Proc. CRYPTO 02, LNCS 2442. Springer-Verlag, 2002, pp. 354-368
-
(2002)
Proc. CRYPTO '02
, pp. 354-368
-
-
Barreto, P.1
Kim, H.2
Bynn, B.3
Scott, M.4
-
16
-
-
24644510922
-
An identity-based non-interactive authentication framework for computational grids
-
Hewlett- Packard Labs. June
-
W. Mao, "An Identity-Based Non-Interactive Authentication Framework for Computational Grids," Hewlett- Packard Labs. tech. rep. HPL- 2004-2096, June 2004.
-
(2004)
Tech. Rep. HPL-2004-2096
-
-
Mao, W.1
-
17
-
-
67349231049
-
Efficient hardware for the tate pairing calculation in characteristic three
-
rep. 2005/065
-
T. Kerins et al., "Efficient Hardware for the Tate Pairing Calculation in Characteristic Three," Cryptology ePrint archive, rep. 2005/065, 2005;
-
(2005)
Cryptology EPrint Archive
-
-
Kerins, T.1
-
19
-
-
35048900981
-
On the Selection of Pairing-Friendly Groups
-
Selected Areas in Cryptography
-
P. Barreto, B. Lynn, and M. Scott, "On the Selection of Pairing-Friendly Groups," Sel. Areas Cryptography 2003, LNCS 3006, Springer-Verlag, 2004, pp. 17-25. (Pubitemid 38530728)
-
(2004)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.3006
, pp. 17-25
-
-
Barreto, P.S.L.M.1
Lynn, B.2
Scott, M.3
-
20
-
-
0038341106
-
A key-management scheme for distributed sensor networks
-
Washington, DC, Nov.
-
L. Eschenauer and V. Gligor, "A Key-Management Scheme for Distributed Sensor Networks," Proc. ACM CCS, Washington, DC, Nov. 2002.
-
(2002)
Proc. ACM CCS
-
-
Eschenauer, L.1
Gligor, V.2
-
21
-
-
0038487088
-
Random key predis- tribution schemes for sensor networks
-
Oakland, CA, May
-
H. Chan, A. Perrig, and D. Song, "Random Key Predis- tribution Schemes for Sensor Networks," IEEE Symp. Sec. & Privacy, Oakland, CA, May 2003.
-
(2003)
IEEE Symp. Sec. & Privacy
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
22
-
-
3042783638
-
A pairwise key pre-distribution scheme for wireless sensor networks
-
Washington, DC, Oct.
-
W. Du et al., "A Pairwise Key Pre-Distribution Scheme for Wireless Sensor Networks," Proc. ACM CCS, Washington, DC, Oct. 2003.
-
(2003)
Proc. ACM CCS
-
-
Du, W.1
-
23
-
-
3042822764
-
Establishing pairwise keys in distributed sensor networks
-
Washington, DC, Oct.
-
D. Liu and P. Ning, "Establishing Pairwise Keys in Distributed Sensor Networks," Proc. ACM CCS, Washington, DC, Oct. 2003.
-
(2003)
Proc. ACM CCS
-
-
Liu, D.1
Ning, P.2
-
24
-
-
4544293215
-
Location-based pairwise key establishments for static sensor networks
-
Fairfax, VA, Oct.
-
D. Liu and P. Ning, "Location-based Pairwise Key Establishments for Static Sensor Networks," Proc. ACM SASN, Fairfax, VA, Oct. 2003.
-
(2003)
Proc. ACM SASN
-
-
Liu, D.1
Ning, P.2
-
25
-
-
2642549675
-
Cryptosystems Based on Pairing
-
Okinawa, Japan, Jan.
-
R. Sakai, K. Ohgishi, and M. Kasahara, "Cryptosystems Based on Pairing," Proc. 2000 Symp. Cryptography Info. Sec., Okinawa, Japan, Jan. 2000.
-
(2000)
Proc. 2000 Symp. Cryptography Info. Sec.
-
-
Sakai, R.1
Ohgishi, K.2
Kasahara, M.3
-
26
-
-
1342276362
-
Toward secure key distribution in truly ad-hoc networks
-
Orlando, FL, Jan.
-
A. Khalili, J. Katz, and W. Arbaugh, "Toward Secure Key Distribution in Truly Ad-Hoc Networks," IEEE Wksp. Secu. Assurance Ad Hoc Net., Orlando, FL, Jan. 2003.
-
(2003)
IEEE Wksp. Secu. Assurance Ad Hoc Net.
-
-
Khalili, A.1
Katz, J.2
Arbaugh, W.3
-
27
-
-
0018545449
-
HOW TO SHARE A SECRET.
-
DOI 10.1145/359168.359176
-
A. Shamir, "How to Share a Secret," Commun. ACM, vol. 22, no. 11, 1979, pp. 612-613 (Pubitemid 10431338)
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir Adi1
-
28
-
-
3042546547
-
Threshold and identity-based key management and authentication for wireless ad hoc networks
-
Las Vegas, NV, Apr.
-
H. Deng, A. Mukherjee, and D. Agrawal, "Threshold and Identity-Based Key Management and Authentication for Wireless Ad Hoc Networks," Int'l. Conf. Info. Tech.: Coding Comp. 04, Las Vegas, NV, Apr. 2004.
-
(2004)
Int'L. Conf. Info. Tech.: Coding Comp. '04
-
-
Deng, H.1
Mukherjee, A.2
Agrawal, D.3
-
29
-
-
7744225358
-
Efficient identity-based security schemes for ad hoc network routing protocols
-
M. Bohio and A. Miri, "Efficient Identity-Based Security Schemes for Ad Hoc Network Routing Protocols," Elsevier Ad Hoc Net. J, vol. 2, no. 3, 2004, pp. 309-317
-
(2004)
Elsevier Ad Hoc Net. J
, vol.2
, Issue.3
, pp. 309-317
-
-
Bohio, M.1
Miri, A.2
-
30
-
-
33750952356
-
Identity-based access control for ad hoc groups
-
Seoul, Korea, Dec.
-
N. Saxena, G. Tsudik, and J. H. Yi, "Identity-Based Access Control for Ad Hoc Groups," Proc. Int'l. Conf. Info. Sec. Cryptology, Seoul, Korea, Dec. 2004.
-
(2004)
Proc. int'L. Conf. Info. Sec. Cryptology
-
-
Saxena, N.1
Tsudik, G.2
Yi, J.H.3
-
31
-
-
51349100827
-
A security architecture achieving anonymity and traceability in wireless mesh networks
-
Phoenix, AZ, Apr.
-
J. Sun, C. Zhang, and Y. Fang, "A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks," Proc. 27th IEEE INFOCOM 08, Phoenix, AZ, Apr. 13-18 2008.
-
(2008)
Proc. 27th IEEE INFOCOM '08
, pp. 13-18
-
-
Sun, J.1
Zhang, C.2
Fang, Y.3
-
32
-
-
2942656255
-
Secure routing in wireless sensor networks: Attacks and countermeasures
-
C. Karlof and D. Wagner, "Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures," Ad Hoc Net., vol. 1, no. 2, 2003.
-
(2003)
Ad Hoc Net.
, vol.1
, Issue.2
-
-
Karlof, C.1
Wagner, D.2
-
33
-
-
11244326497
-
The sybil attack in sensor networks: Analysis & defenses
-
Berkeley, CA, Apr.
-
J. Newsome et al., "The Sybil Attack in Sensor Networks: Analysis & Defenses," Proc. 3rd IPSN ' 04, Berkeley, CA, Apr. 2004.
-
(2004)
Proc. 3rd IPSN '04
-
-
Newsome, J.1
|