-
1
-
-
0012578409
-
Distance-bounding protocols (extended abstract)
-
S. Brands and D. Chaum. Distance-bounding protocols (extended abstract). In Proc. Eurocrypt, 1993.
-
(1993)
Proc. Eurocrypt
-
-
Brands, S.1
Chaum, D.2
-
2
-
-
3042520226
-
Report on a working session on security in wireless ad hoc network
-
Jan.
-
L. Buttyan and J. Hubaux. Report on a working session on security in wireless ad hoc network. ACM Mobile Computing and Communications Review, 7(1):74-94, Jan. 2003.
-
(2003)
ACM Mobile Computing and Communications Review
, vol.7
, Issue.1
, pp. 74-94
-
-
Buttyan, L.1
Hubaux, J.2
-
3
-
-
84978382732
-
Secure routing for structured peer-to-peer overlay networks
-
Boston, Dec.
-
M. Castro, P. Druschel, A. Ganesh, A. Rowstron, and D. S. Wallach. Secure routing for structured peer-to-peer overlay networks. In Proc. USENIX Symposium on Operating Systems Design and Implementation, Boston, Dec. 2002.
-
(2002)
Proc. USENIX Symposium on Operating Systems Design and Implementation
-
-
Castro, M.1
Druschel, P.2
Ganesh, A.3
Rowstron, A.4
Wallach, D.S.5
-
4
-
-
4544304744
-
The sybil attack
-
Cambridge, MA, March
-
J. R. Douceur. The sybil attack. In Proc. IPTPS, Cambridge, MA, March 2002.
-
(2002)
Proc. IPTPS
-
-
Douceur, J.R.1
-
7
-
-
3042785862
-
The sybil attack in sensor networks : Analysis & defenses
-
Berkeley, Apr.
-
J. Newsome, E. Shi, D. Song, and A. Perrig. The sybil attack in sensor networks : Analysis & defenses. In Proc. IPSN'04, Berkeley, Apr. 2004.
-
(2004)
Proc. IPSN'04
-
-
Newsome, J.1
Shi, E.2
Song, D.3
Perrig, A.4
-
10
-
-
33748959977
-
Establishing pairwise keys in heterogeneous sensor networks
-
Apr.
-
P. Traynor, H. Choi, G. Cao, S. Zhu, and T. LaPorta. Establishing pairwise keys in heterogeneous sensor networks. In Proc. IEEE INFOCOM, Apr. 2006.
-
(2006)
Proc. IEEE INFOCOM
-
-
Traynor, P.1
Choi, H.2
Cao, G.3
Zhu, S.4
Laporta, T.5
-
11
-
-
70449132432
-
Sybil attack detection based on RSSI for wireless sensor network
-
Sept.
-
J. Wang, G. Yang, Y. Sun, and S. Chen. Sybil attack detection based on RSSI for wireless sensor network. In Proc. WiCom, Sept. 2007.
-
(2007)
Proc. WiCom
-
-
Wang, J.1
Yang, G.2
Sun, Y.3
Chen, S.4
-
14
-
-
33144476837
-
Location-based compromise-tolerant security mechanisms for wireless sensor networks
-
February
-
Y. Zhang, W. Liu, and W. Lou. Location-based compromise-tolerant security mechanisms for wireless sensor networks. IEEE Journal on Selected Areas in Communications, 24(2):247-255, February 2006.
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, Issue.2
, pp. 247-255
-
-
Zhang, Y.1
Liu, W.2
Lou, W.3
-
15
-
-
50249168206
-
Privacypreserving detection of sybil attacks in vehicular ad hoc networks
-
Philadelphia
-
T. Zhou, R. R. Choudhury, P. Ning, and K. Chakrabarty. Privacypreserving detection of sybil attacks in vehicular ad hoc networks. In Proc. MobiQuitous, Philadelphia, 2007.
-
(2007)
Proc. MobiQuitous
-
-
Zhou, T.1
Choudhury, R.R.2
Ning, P.3
Chakrabarty, K.4
|