-
1
-
-
84994155710
-
A Distributed Trust Model
-
Cumbria, United Kingdom, Sep 23-26
-
A. Abdul-Rahman, S. Hailes, A Distributed Trust Model, in: Proc 97 New security paradigms, Langdale, Cumbria, United Kingdom, Sep 23-26 1997, pp. 48-60
-
(1997)
Proc 97 New security paradigms, Langdale
, pp. 48-60
-
-
Abdul-Rahman, A.1
Hailes, S.2
-
2
-
-
0034317075
-
Key Agreement in ad hoc Networks
-
Asokan N., and Ginzboorg P. Key Agreement in ad hoc Networks. Computer Communications 23 17 (2000) 1627-1637
-
(2000)
Computer Communications
, vol.23
, Issue.17
, pp. 1627-1637
-
-
Asokan, N.1
Ginzboorg, P.2
-
3
-
-
0027693935
-
Diversity coding for transparent self-healing and fault tolerant
-
Ayanoglu E., Chih-Lin E., Gitlin R.D., and Mazo J.E. Diversity coding for transparent self-healing and fault tolerant. Communication Networks: IEEE Transactions on Communications 41 11 (1993) 1677-1686
-
(1993)
Communication Networks: IEEE Transactions on Communications
, vol.41
, Issue.11
, pp. 1677-1686
-
-
Ayanoglu, E.1
Chih-Lin, E.2
Gitlin, R.D.3
Mazo, J.E.4
-
5
-
-
74449092009
-
Secure ad hoc routing protocol
-
November, NRC
-
A. Boukerche, K. El-Khatib, L. Xu, L. Korba, Secure ad hoc routing protocol, in: Fourth International IEEE Workshop on Wireless Local Networks. Tampa, Florida, É.-U. November 2004. NRC 47394
-
(2004)
Fourth International IEEE Workshop on Wireless Local Networks. Tampa, Florida, É.-U
, pp. 47394
-
-
Boukerche, A.1
El-Khatib, K.2
Xu, L.3
Korba, L.4
-
7
-
-
0036684150
-
PKI: It's not dead, just resting
-
Gutmann P. PKI: It's not dead, just resting. IEEE Computer August (2002) 41-49
-
(2002)
IEEE Computer
, Issue.August
, pp. 41-49
-
-
Gutmann, P.1
-
8
-
-
74449086643
-
-
http://www.cert.org/tech_tips/denial_of_service.html
-
-
-
-
10
-
-
74449093784
-
Requirements of ad hoc network protocols, Technical report, Electrical Engineering, Helsinki University of Technology
-
May
-
M.M. Lehmus, Requirements of ad hoc network protocols, Technical report, Electrical Engineering, Helsinki University of Technology, May 2000
-
(2000)
-
-
Lehmus, M.M.1
-
11
-
-
74949088648
-
A secure efficient ad hoc on demand routing protocol for wireless networks
-
SEAR:, Computer and Communication Security, ASIACCS 2008
-
Qing Li, Yih-Chun Hu, Meiyuan Zhao, Adrian Perrig, Jesse Walker, Wade Trappe, SEAR: A secure efficient ad hoc on demand routing protocol for wireless networks, in: ACM Symposium on Information, Computer and Communication Security, ASIACCS 2008
-
ACM Symposium on Information
-
-
Li, Q.1
Hu, Y.-C.2
Zhao, M.3
Perrig, A.4
Walker, J.5
Trappe, W.6
-
12
-
-
74449090475
-
Secure routing ad hoc networks
-
Liu J., Fu F., Xiao J., and Lu Y. Secure routing ad hoc networks. Software Engineering, Artificial Intelligence, Networking and Parallel/distributed Computing (2007)
-
(2007)
Software Engineering, Artificial Intelligence, Networking and Parallel/distributed Computing
-
-
Liu, J.1
Fu, F.2
Xiao, J.3
Lu, Y.4
-
13
-
-
4143085056
-
Cross-layer design for energy-efficient secure multicast communications in ad hoc networks
-
Paris, France, May
-
L. Loukas, R. Poovendran, Cross-layer design for energy-efficient secure multicast communications in ad hoc networks, in: Proc of IEEE ICC 2004, Paris, France, May 2004
-
(2004)
Proc of IEEE ICC
-
-
Loukas, L.1
Poovendran, R.2
-
14
-
-
4444237581
-
Enhancing Data Confidentiality in mobile Ad hoc networks
-
SPREAD:, Hong Kong, China, March
-
W. Lou, W. Liu, Y. Fang, SPREAD: Enhancing Data Confidentiality in mobile Ad hoc networks, in: Proc IEEE INFOCOM, Hong Kong, China, March 2004
-
(2004)
Proc IEEE INFOCOM
-
-
Lou, W.1
Liu, W.2
Fang, Y.3
-
16
-
-
74449091498
-
-
P. Papadimitratos, Z.J. Haas, Secure routing for mobile ad hoc networks, in: SCS Comm. Networks and Distributed Systems Modeling and Simulation, CNDS 2002, San Antonio, TX, Jan. 27-31, 2002
-
P. Papadimitratos, Z.J. Haas, Secure routing for mobile ad hoc networks, in: SCS Comm. Networks and Distributed Systems Modeling and Simulation, CNDS 2002, San Antonio, TX, Jan. 27-31, 2002
-
-
-
-
18
-
-
74449090985
-
-
M.R. Pearlman, Z.J. Haas, P. Sholander, S.S. Tabrizi, On the impact of alternate path routing for load balancing in mobile ad hoc networks, MobiHOC, 2000
-
M.R. Pearlman, Z.J. Haas, P. Sholander, S.S. Tabrizi, On the impact of alternate path routing for load balancing in mobile ad hoc networks, MobiHOC, 2000
-
-
-
-
19
-
-
74449090378
-
-
A. Qayyum, Analysis and evaluation of channel access schemes and routing protocols for wireless networks, Ph.D. Dep Computer Science, Paris XI. Paris Sud University, Nov 2000
-
A. Qayyum, Analysis and evaluation of channel access schemes and routing protocols for wireless networks, Ph.D. Dep Computer Science, Paris XI. Paris Sud University, Nov 2000
-
-
-
-
20
-
-
0024641589
-
Efficient dispersal of information for security, load balancing and fault tolerance
-
Rabin M.O. Efficient dispersal of information for security, load balancing and fault tolerance. Journal of the ACM 36 2 (1989) 335-348
-
(1989)
Journal of the ACM
, vol.36
, Issue.2
, pp. 335-348
-
-
Rabin, M.O.1
-
21
-
-
84947912552
-
All-or-Nothing Encryption and the package Transform
-
Hafia, Israel
-
Rivest R.L. All-or-Nothing Encryption and the package Transform. Fast Software Encryption Workshop vol. 1267 (1997), Hafia, Israel 210
-
(1997)
Fast Software Encryption Workshop
, vol.1267
, pp. 210
-
-
Rivest, R.L.1
-
22
-
-
0018545449
-
How to share a secret
-
Shamir A. How to share a secret. Communications of the ACM 22 11 (1979) 612-613
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
24
-
-
84949953635
-
The Resurrecting Duckling-What Next?
-
Proc 8th Security Protocols Workshop, Springer-Verlag, Berlin
-
Stajano F. The Resurrecting Duckling-What Next?. Proc 8th Security Protocols Workshop. Lecture Notes in Computer Science vol. 2133 (2001), Springer-Verlag, Berlin 204-214
-
(2001)
Lecture Notes in Computer Science
, vol.2133
, pp. 204-214
-
-
Stajano, F.1
-
25
-
-
24944461428
-
A novel multipath approach to security in mobile ad hoc networks
-
Kolkata, India, Jan
-
R.A. Vasudevan, S. Sanyal, A novel multipath approach to security in mobile ad hoc networks, in: International Conference Computers and Devices for Communication, Kolkata, India, Jan 2004
-
(2004)
International Conference Computers and Devices for Communication
-
-
Vasudevan, R.A.1
Sanyal, S.2
-
26
-
-
12744276083
-
Intrusion detection techniques for mobile wireless networks
-
Zhang Y., Lee W., and Huang Y. Intrusion detection techniques for mobile wireless networks. ACM MONET Journal (2002)
-
(2002)
ACM MONET Journal
-
-
Zhang, Y.1
Lee, W.2
Huang, Y.3
|