-
1
-
-
47949101717
-
Key refreshing in identity-based cryptography and its applications in MANETs
-
Orlando, FL, USA, Oct.
-
S. Balfe, K. D. Boklan, Z. Klagsbrun, and K. G. Paterson, "Key refreshing in identity-based cryptography and its applications in MANETs," in Proc. IEEE MILCOM 2007, (Orlando, FL, USA), Oct. 2007.
-
(2007)
Proc. IEEE MILCOM 2007
-
-
Balfe, S.1
Boklan, K.D.2
Klagsbrun, Z.3
Paterson, K.G.4
-
2
-
-
0000244582
-
Threshold cryptosystems
-
Santa Barbara, CA, USA, Aug.
-
Y. Desmedt and Y. Frankel, "Threshold cryptosystems," in Proc. CRYPTO'89, (Santa Barbara, CA, USA), Aug. 1989.
-
(1989)
Proc. CRYPTO'89
-
-
Desmedt, Y.1
Frankel, Y.2
-
3
-
-
0036267543
-
A hierarchical non-interactive key-sharing scheme with low memory size and high resistance against collusion attacks
-
G. Hanaoka, T. Nishioka, Y. Zheng, and H. Imai., "A hierarchical non-interactive key-sharing scheme with low memory size and high resistance against collusion attacks," Comput. J., vol.45, no.3, pp. 293-303, 2002.
-
(2002)
Comput. J.
, vol.45
, Issue.3
, pp. 293-303
-
-
Hanaoka, G.1
Nishioka, T.2
Zheng, Y.3
Imai, H.4
-
4
-
-
33947173113
-
A hierarchical key predistribution scheme
-
Lincoln, NE, USA, May.
-
M. Ramkumar, N. Memon, and R. Simha, "A hierarchical key predistribution scheme," in Proc. EIT'05, (Lincoln, NE, USA), May. 2005.
-
(2005)
Proc. EIT'05
-
-
Ramkumar, M.1
Memon, N.2
Simha, R.3
-
5
-
-
85008033660
-
Strongly-resilient and non-interactive hierarchical keyagreement in MANETs
-
Berlin, Heidelberg, Springer-Verlag
-
R. Gennaro, S. Halevi, H. Krawczyk, T. Rabin, S. Reidt, and S. D. Wolthusen, "Strongly-resilient and non-interactive hierarchical keyagreement in MANETs," in Proc. ESORICS '08, (Berlin, Heidelberg), Springer-Verlag, 2008.
-
(2008)
Proc. ESORICS '08
-
-
Gennaro, R.1
Halevi, S.2
Krawczyk, H.3
Rabin, T.4
Reidt, S.5
Wolthusen, S.D.6
-
6
-
-
0005908666
-
Perfectly secure key distribution for dynamic conferences
-
C. Blundo, A. D. Santis, A. Herzberg, S. Kutten, U. Vaccaro, and M. Yung, "Perfectly secure key distribution for dynamic conferences," Inf. Comput., vol.146, no.1, pp. 1-23, 1998.
-
(1998)
Inf. Comput.
, vol.146
, Issue.1
, pp. 1-23
-
-
Blundo, C.1
Santis, A.D.2
Herzberg, A.3
Kutten, S.4
Vaccaro, U.5
Yung, M.6
-
7
-
-
1842665110
-
Intrusion detection in wireless ad hoc networks
-
Feb.
-
A. Mishra, K. Nadkarni, , and A. Patcha, "Intrusion detection in wireless ad hoc networks," IEEE Wireless Comm., vol.11, pp. 48-60, Feb. 2004.
-
(2004)
IEEE Wireless Comm.
, vol.11
, pp. 48-60
-
-
Mishra, A.1
Nadkarni, K.2
Patcha, A.3
-
8
-
-
11244320485
-
URSA: Ubiquitous and robust access control for mobile ad hoc networks
-
Dec.
-
H. Luo, J. Kong, P. Zerfos, S. Lu, and L. Zhang, "URSA: Ubiquitous and robust access control for mobile ad hoc networks," IEEE/ACM Trans. Netw., vol.12, pp. 1049-1063, Dec. 2004.
-
(2004)
IEEE/ACM Trans. Netw.
, vol.12
, pp. 1049-1063
-
-
Luo, H.1
Kong, J.2
Zerfos, P.3
Lu, S.4
Zhang, L.5
-
9
-
-
35248862545
-
The hmm-based modeling for the energy level prediction in wireless sensor networks
-
Harbin, P.R. China, May
-
P. Hu, Z. Zhou, Q. Liu, and F. Li, "The hmm-based modeling for the energy level prediction in wireless sensor networks," in Proc. IEEE 2nd Conf. on Industrial Electronics and Applications, (Harbin, P.R. China), pp. 2253-2258, May 2007.
-
(2007)
Proc. IEEE 2nd Conf. on Industrial Electronics and Applications
, pp. 2253-2258
-
-
Hu, P.1
Zhou, Z.2
Liu, Q.3
Li, F.4
-
10
-
-
34247874478
-
Transmission scheduling for optimizing sensor network lifetime: A stochastic shortest path approach
-
Y. Chen, Q. Zhao, and V. Krishnamurthy, "Transmission scheduling for optimizing sensor network lifetime: A stochastic shortest path approach," IEEE Trans. Signal Proc., vol.55, no.5, pp. 2294-2309, 2007.
-
(2007)
IEEE Trans. Signal Proc.
, vol.55
, Issue.5
, pp. 2294-2309
-
-
Chen, Y.1
Zhao, Q.2
Krishnamurthy, V.3
-
11
-
-
0343441515
-
Restless bandits, linear programming relaxations, and a primal dual index heuristic
-
D. Berstimas and J. Nino-Mora, "Restless bandits, linear programming relaxations, and a primal dual index heuristic," Operations Research, vol.48, no.1, pp. 80-90, 2000.
-
(2000)
Operations Research
, vol.48
, Issue.1
, pp. 80-90
-
-
Berstimas, D.1
Nino-Mora, J.2
-
12
-
-
0141464248
-
Hide: A hierarchical network intrusion detection system using statistical preprocessing and neural network classification
-
Z. Zhang, J. Li, C. Manikopoulos, J. Jorgenson, and J. Ucles, "Hide: a hierarchical network intrusion detection system using statistical preprocessing and neural network classification," in IEEE Workshop on Information Assurance and Security, pp. 85-90, 2001.
-
(2001)
IEEE Workshop on Information Assurance and Security
, pp. 85-90
-
-
Zhang, Z.1
Li, J.2
Manikopoulos, C.3
Jorgenson, J.4
Ucles, J.5
-
13
-
-
3543079858
-
Optimizing the scalability of network intrusion detection systems using mobile agents
-
D. G. Marks, P. Mell, and M. Stinson, "Optimizing the scalability of network intrusion detection systems using mobile agents," J. Netw. Syst. Manage., vol.12, no.1, pp. 95-110, 2004.
-
(2004)
J. Netw. Syst. Manage.
, vol.12
, Issue.1
, pp. 95-110
-
-
Marks, D.G.1
Mell, P.2
Stinson, M.3
-
14
-
-
3042546547
-
Threshold and identitybased key management and authentication for wireless ad hoc networks
-
Washington, DC, USA, Apr.
-
H. Deng, A. Mukherjee, and D. Agrawal, "Threshold and identitybased key management and authentication for wireless ad hoc networks," in Proc. ITCC'04, (Washington, DC, USA), Apr. 2004.
-
(2004)
Proc. ITCC'04
-
-
Deng, H.1
Mukherjee, A.2
Agrawal, D.3
-
15
-
-
33750023217
-
An effective key management scheme for heterogeneous sensor networks
-
Jan.
-
X. Du, Y. Xiao, M. Guizani, and H. H. Chen, "An effective key management scheme for heterogeneous sensor networks," Elsevier Ad Hoc Networks, vol.5, pp. 24-34, Jan. 2007.
-
(2007)
Elsevier Ad Hoc Networks
, vol.5
, pp. 24-34
-
-
Du, X.1
Xiao, Y.2
Guizani, M.3
Chen, H.H.4
|