-
1
-
-
32144463658
-
Authentication protocols for ad-hoc networks: Taxonomy and research issues
-
Oct.
-
N. Aboudagga, M. Tamer, M. Eltoweissy, L. DaSilva, and J. J. Quisquater, "Authentication protocols for ad-hoc networks: Taxonomy and research issues," in Proc. 1st ACM international workshop on Quality of service and security in wireless and mobile networks, Oct. 2005.
-
(2005)
Proc. 1st ACM International Workshop on Quality of Service and Security in Wireless and Mobile Networks
-
-
Aboudagga, N.1
Tamer, M.2
Eltoweissy, M.3
Dasilva, L.4
Quisquater, J.J.5
-
3
-
-
0033357103
-
Securing ad-hoc networks
-
L. Zhou and Z. Haas, "Securing ad-hoc networks," IEEE Network, vol.13, pp. 24-30, 1999.
-
(1999)
IEEE Network
, vol.13
, pp. 24-30
-
-
Zhou, L.1
Haas, Z.2
-
5
-
-
0345755816
-
Adaptive security for multilevel ad hoc networks
-
DOI 10.1002/wcm.75
-
[5] J. Kong, H. Luo, K. Xu, D. L. Gu, M. Gerla, and S. Lu, Adaptive security for multi-level ad-hoc networks," J. Wireless Commun. Mobile Comput., pp. 533-547, 2002. (Pubitemid 135713189)
-
(2002)
Wireless Communications and Mobile Computing
, vol.2
, Issue.5
, pp. 533-547
-
-
Kong, J.1
Luo, H.2
Xu, K.3
Gu, D.L.4
Gerla, M.5
Lu, S.6
-
6
-
-
14844312136
-
An attack on the proactive RSA signature scheme in the URSA ad hoc network access control protocol
-
S. Jarecki, N. Saxena, and J. H. Yi, "An attack on the proactive RSA signature scheme in the URSA ad hoc network access control protocol," in Proc. ACM Workshop on Security of Ad Hoc and Sensor Networks, 2004, pp. 1-9.
-
(2004)
Proc. ACM Workshop on Security of Ad Hoc and Sensor Networks
, pp. 1-9
-
-
Jarecki, S.1
Saxena, N.2
Yi, J.H.3
-
7
-
-
0035789229
-
The quest for security in mobile ad-hoc networks
-
J. P. Hubaux, L. Buttyán, and S. Capkun, "The quest for security in mobile ad-hoc networks," in Proc. MobiHoc, 2001, pp. 146-155.
-
(2001)
Proc. MobiHoc
, pp. 146-155
-
-
Hubaux, J.P.1
Buttyán, L.2
Capkun, S.3
-
9
-
-
85161629496
-
A self-organized architecture in mobile ad-hoc networks
-
S. Hahm, Y. Jung, S. Yi, Y. Song, I. Chong, and K. Lim, "A self-organized architecture in mobile ad-hoc networks," in Proc. ICOIN, 2005, pp. 689696.
-
(2005)
Proc. ICOIN
, pp. 689696
-
-
Hahm, S.1
Jung, Y.2
Yi, S.3
Song, Y.4
Chong, I.5
Lim, K.6
-
10
-
-
33750959755
-
Efficient node admission for short-lived mobile ad hoc networks
-
DOI 10.1109/ICNP.2005.14, 1544627, Proceedings - 13TH IEEE International Conference on Network Protocols, ICNP 2005
-
[10] N. Saxena, G. Tsudik, and J. H. Yi, Efficient node admission for shortlived mobile ad-hoc networks," in Proc. ICNP, Nov. 2005, pp. 269-278. (Pubitemid 44733864)
-
(2005)
Proceedings - International Conference on Network Protocols, ICNP
, vol.2005
, pp. 269-278
-
-
Saxena, N.1
Tsudik, G.2
Yi, J.H.3
-
11
-
-
85032868051
-
How to prove all NPstatements in zero-knowledge, and a methodology of cryptographic protocol design, in
-
O. Goldreich, S. Micali, and A. Wigderson, "How to prove all NPstatements in zero-knowledge, and a methodology of cryptographic protocol design," in Proc. Crypto, vol.263, 1986, pp. 171-185.
-
(1986)
Proc. Crypto
, vol.263
, pp. 171-185
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
12
-
-
34250339318
-
Implementation of group member authentication protocol in mobile ad-hoc networks
-
Las Vegas, USA Apr.
-
H. Asaeda, M. Rahman, H. Manshaei, and Y. Fukuzawa, "Implementation of group member authentication protocol in mobile ad-hoc networks," in Proc. WCNC, Las Vegas, USA Apr. 2006.
-
(2006)
Proc. WCNC
-
-
Asaeda, H.1
Rahman, M.2
Manshaei, H.3
Fukuzawa, Y.4
-
13
-
-
85161658575
-
A new authentication protocol for revocable anonymity in ad-hoc networks
-
A. Wierzbicki, A. Zwierko, and Z. Kotulski, "A new authentication protocol for revocable anonymity in ad-hoc networks," in Proc. CNIS, 2005.
-
(2005)
Proc. CNIS
-
-
Wierzbicki, A.1
Zwierko, A.2
Kotulski, Z.3
-
15
-
-
38149018468
-
A global authentication scheme for mobile ad-hoc networks
-
P. Caballero-Gil and C. Caballero-Gil, "A global authentication scheme for mobile ad-hoc networks," in Proc. IWSEC, 2007, pp. 105-120.
-
(2007)
Proc. IWSEC
, pp. 105-120
-
-
Caballero-Gil, P.1
Caballero-Gil, C.2
-
16
-
-
38449083448
-
A simulation study of new security schemes in mobile ad-hoc networks
-
P. Caballero-Gil, C. Caballero-Gil, J. Molina-Gil, and A. QuesadaArencibia, "A simulation study of new security schemes in mobile ad-hoc networks," in Proc. EUROCAST, 2007, pp. 73-81.
-
(2007)
Proc. EUROCAST
, pp. 73-81
-
-
Caballero-Gil, P.1
Caballero-Gil, C.2
Molina-Gil, J.3
Quesadaarencibia, A.4
-
18
-
-
33744472182
-
Preventing impersonation attacks in MANET with multi-factor authentication
-
DOI 10.1109/WIOPT.2005.42, 1421092, Proceedings - WiOpt 2005: Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks
-
[18] D. Glynos, P. Kotzanikolaou, and C. Douligeris, Preventing impersonation attacks in MANET with multi-factor authentication," in Proc. WIOPT, 2005, pp. 59-64. (Pubitemid 43803532)
-
(2005)
Proceedings - WiOpt 2005: Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks
, vol.2005
, pp. 59-64
-
-
Glynos, D.1
Kotzanikolaou, P.2
Douligeris, C.3
-
19
-
-
84944044888
-
Strong solutions to the identification problem
-
P. Caballero-Gil and C. Hernández-Goya, "Strong solutions to the identification problem," in Proc. COCOON, 2001, pp. 257-261.
-
(2001)
Proc. COCOON
, pp. 257-261
-
-
Caballero-Gil, P.1
Hernández-Goya, C.2
-
20
-
-
0038703649
-
On the complexity of distributed self-configuration in wireless networks
-
B. Krishnamachari, S. Wicker, R. Bejar, and C. Fernández, "On the complexity of distributed self-configuration in wireless networks," Telecommunication Systems, vol.22, pp. 33-59, 2002.
-
(2002)
Telecommunication Systems
, vol.22
, pp. 33-59
-
-
Krishnamachari, B.1
Wicker, S.2
Bejar, R.3
Fernández, C.4
-
21
-
-
0346111643
-
-
M.S. thesis, University of Alberta, Canada
-
B. Vandegriend, "Finding hamiltonian cycles: Algorithms, graphs and performance," M.S. thesis, University of Alberta, Canada, 1998.
-
(1998)
Finding Hamiltonian Cycles: Algorithms, Graphs and Performance
-
-
Vandegriend, B.1
-
23
-
-
0037220811
-
Sparse pseudo-random graphs are Hamiltonian
-
M. Krivelevich and B. Sudakov, "Sparse pseudo-random graphs are Hamiltonian," J. Graph Theory, vol.42, no.1, pp. 17-33, 2002.
-
(2002)
J. Graph Theory
, vol.42
, Issue.1
, pp. 17-33
-
-
Krivelevich, M.1
Sudakov, B.2
-
24
-
-
1542593353
-
Authentication and authenticated key exchanges
-
W. Diffie, P. C. van Oorschot, and M. J. Wiener, "Authentication and authenticated key exchanges," Designs, Codes and Cryptography, pp. 107- 125, 1992.
-
(1992)
Designs, Codes and Cryptography
, pp. 107-125
-
-
Diffie, W.1
Van Oorschot, P.C.2
Wiener, M.J.3
-
25
-
-
35048827910
-
Context-Aware Group Communication in Mobile Ad-Hoc Networks
-
Wired/Wireless Internet Communications
-
[25] Y. Hao, L. Haiyun, Y. Fan, L. Songwu, and Z. Lixia, "Security in mobile ad-hoc networks: Challenges and solutions," Wireless Commun, vol.11, no.1, pp. 38-47, 2004. (Pubitemid 38210888)
-
(2004)
LECTURE NOTES in COMPUTER SCIENCE
, Issue.2957
, pp. 38-47
-
-
Bottazzi, D.1
Corradi, A.2
Montanari, R.3
-
26
-
-
85161646649
-
Some issues in WSN, MANET, and cellular security
-
T. Gene, "Some issues in WSN, MANET, and cellular security," in Proc. ARO Planning Workshop on Embedded Systems and Network Security, 2007, pp. 22-23.
-
(2007)
Proc. ARO Planning Workshop on Embedded Systems and Network Security
, pp. 22-23
-
-
Gene, T.1
-
27
-
-
39349118063
-
Revisiting global time synchronization
-
X. Zhao, V. Ganapathy, N. Pissinou, and K. Makki, "Revisiting global time synchronization," in Proc. IEEE GLOBECOM, 2007, pp. 1058-1063.
-
(2007)
Proc. IEEE GLOBECOM
, pp. 1058-1063
-
-
Zhao, X.1
Ganapathy, V.2
Pissinou, N.3
Makki, K.4
|