-
1
-
-
1342281463
-
The threat of intelligent collisions
-
Jan. Feb
-
J. Blum, and A. Eskandarian, "The threat of intelligent collisions," IT Professional, vol. 6, no. 1, pp. 24-29, Jan. Feb. 2004.
-
(2004)
IT Professional
, vol.6
, Issue.1
, pp. 24-29
-
-
Blum, J.1
Eskandarian, A.2
-
2
-
-
46749123949
-
Group key management within ad hoc networks
-
M. S. Bouassida, I. Chrisment, and O. Festor, "Group key management within ad hoc networks," International Journal of Network Security, vol. 6, no. 1, pp. 67-79, 2008.
-
(2008)
International Journal of Network Security
, vol.6
, Issue.1
, pp. 67-79
-
-
Bouassida, M.S.1
Chrisment, I.2
Festor, O.3
-
5
-
-
25844439422
-
Secure positioning of wireless devices with application to sensor networks
-
S. Capkun, and JP. Hubaux, "Secure positioning of wireless devices with application to sensor networks," IEEE INFOCOM 2005, vol. 3, pp. 1917-1928, 2005.
-
(2005)
IEEE INFOCOM 2005
, vol.3
, pp. 1917-1928
-
-
Capkun, S.1
Hubaux, J.P.2
-
7
-
-
84881144767
-
A note on a simple transmission formula
-
H. T. Friis, "A note on a simple transmission formula," Proceedings of the IRE, vol. 34, pp. 254-256, 1946.
-
(1946)
Proceedings of the IRE
, vol.34
, pp. 254-256
-
-
Friis, H.T.1
-
8
-
-
14944372809
-
Detecting and correcting malicious data in VANETS
-
Oct
-
P. Golle, D. Greene, and J. Staddon, "Detecting and correcting malicious data in VANETS," Proceedings of the 1st ACM International Workshop on Vehicular Ad Hoc Networks, pp. 29-37, Oct. 2004.
-
(2004)
Proceedings of the 1st ACM International Workshop on Vehicular Ad Hoc Networks
, pp. 29-37
-
-
Golle, P.1
Greene, D.2
Staddon, J.3
-
9
-
-
0017959977
-
Secure communications over insecure channels
-
R. C. Merkle, "Secure communications over insecure channels," Communications of the ACM, vol. 21, no. 4, pp. 294-299, Apr. 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.4
, pp. 294-299
-
-
Merkle, R.C.1
-
10
-
-
3042785862
-
The sybil attack in sensor networks: Analysis and defenses
-
J. Newsome, E. Shi, D. Song, and A. Perrig, "The sybil attack in sensor networks: Analysis and defenses," Proceedings of the Third International Symposium on Information Processing in Sensor Networks, pp. 259-268, 2004.
-
(2004)
Proceedings of the Third International Symposium on Information Processing in Sensor Networks
, pp. 259-268
-
-
Newsome, J.1
Shi, E.2
Song, D.3
Perrig, A.4
-
11
-
-
12444320349
-
Malicious node detection in wireless sensor networks
-
W. Pires, T. D. P. Figueiredo, H. C. Wong, and A. Loureiro, "Malicious node detection in wireless sensor networks," Proceedings of the 8th IEEE International Parallel and Distributed Processing Symposium, pp. 24, 2004.
-
(2004)
Proceedings of the 8th IEEE International Parallel and Distributed Processing Symposium
, pp. 24
-
-
Pires, W.1
Figueiredo, T.D.P.2
Wong, H.C.3
Loureiro, A.4
-
13
-
-
33845726678
-
Securing vehicular ad hoc networks
-
M. Raya and J. P. Hubaux, "Securing vehicular ad hoc networks," Journal of Computer Security, Special Issue on Security of Ad Hoc and Sensor Networks, vol. 15, no. 1, pp. 39-68, 2007.
-
(2007)
Journal of Computer Security, Special Issue on Security of Ad Hoc and Sensor Networks
, vol.15
, Issue.1
, pp. 39-68
-
-
Raya, M.1
Hubaux, J.P.2
-
14
-
-
33845564340
-
Securing vehicular communications
-
M. Raya, P. Papadimitratos, and J. P. Hubaux, "Securing vehicular communications," IEEE Wireless Communications Magazine, Special Issue on Inter- Vehicular Communications, vol. 13, no. 5, pp. 8-15, 2006.
-
(2006)
IEEE Wireless Communications Magazine, Special Issue on Inter- Vehicular Communications
, vol.13
, Issue.5
, pp. 8-15
-
-
Raya, M.1
Papadimitratos, P.2
Hubaux, J.P.3
-
15
-
-
33745453101
-
Ad hoc network security: Peer identication and authentication using signal properties
-
June
-
T. Suen, and A. Yasinsac, "Ad hoc network security: Peer identication and authentication using signal properties," Systems, Man and Cybernetics (SMC) Information Assurance Workshop, pp. 432-433, June 2005.
-
(2005)
Systems, Man and Cybernetics (SMC) Information Assurance Workshop
, pp. 432-433
-
-
Suen, T.1
Yasinsac, A.2
-
16
-
-
34247328623
-
Detection and localization of sybil nodes in VANETs
-
B. Xiao, B. Yu, and C. Gao, "Detection and localization of sybil nodes in VANETs," ACM/SIGMOBILE Workshop on Dependability Issues in Wireless Ad Hoc Networks and Sensor Networks, pp. 1-8, 2006.
-
(2006)
ACM/SIGMOBILE Workshop on Dependability Issues in Wireless Ad Hoc Networks and Sensor Networks
, pp. 1-8
-
-
Xiao, B.1
Yu, B.2
Gao, C.3
|