-
1
-
-
0033357103
-
Securing ad hoc networks
-
L. Zhou and Z. J. Haas, "Securing ad hoc networks," IEEE Network, vol. 13, no. 6, pp. 24-30, 1999.
-
(1999)
IEEE Network
, vol.13
, Issue.6
, pp. 24-30
-
-
Zhou, L.1
Haas, Z.J.2
-
2
-
-
30344446233
-
DICTATE: Distributed certification authority with probabilistic freshness for ad hoc networks
-
J. Luo, J.-P. Hubaux, and P. T. Eugster, "DICTATE: Distributed certification authority with probabilistic freshness for ad hoc networks," Trans. Dependable Secure Comput., vol. 2, no. 4, pp. 311-323, 2005.
-
(2005)
Trans. Dependable Secure Comput.
, vol.2
, Issue.4
, pp. 311-323
-
-
Luo, J.1
Hubaux, J.-P.2
Eugster, P.T.3
-
3
-
-
11244320485
-
URSA: Ubiquitous and robust access control for mobile ad hoc networks
-
Dec
-
H. Luo, J. Kong, P. Zerfos, S. Lu, , and L. Zhang, "URSA: Ubiquitous and robust access control for mobile ad hoc networks," IEEE/ACM Transactions on Networking, vol. 12, no. 6, pp. 1049-1063, Dec. 2004.
-
(2004)
IEEE/ACM Transactions on Networking
, vol.12
, Issue.6
, pp. 1049-1063
-
-
Luo, H.1
Kong, J.2
Zerfos, P.3
Lu, S.4
Zhang, L.5
-
4
-
-
0242678584
-
Self-organized public-key management for mobile ad hoc networks
-
Mar
-
S. Capkun, L. Buttyán, and J.-P. Hubaux, "Self-organized public-key management for mobile ad hoc networks," IEEE Transactions on Mobile Computing, vol. 2, no. 1, pp. 25-64, Mar. 2003.
-
(2003)
IEEE Transactions on Mobile Computing
, vol.2
, Issue.1
, pp. 25-64
-
-
Capkun, S.1
Buttyán, L.2
Hubaux, J.-P.3
-
5
-
-
0035789229
-
The quest for security in mobile ad hoc networks
-
ACM
-
J.-P. Hubaux, L. Buttyán, and S. Capkun, "The quest for security in mobile ad hoc networks," in 2nd ACM Intl. Symp. on Mobile Ad Hoc Networking & Computing (MobiHoc '01). ACM, 2001, pp. 146-155.
-
(2001)
2nd ACM Intl. Symp. on Mobile Ad Hoc Networking & Computing (MobiHoc '01)
, pp. 146-155
-
-
Hubaux, J.-P.1
Buttyán, L.2
Capkun, S.3
-
6
-
-
55849097728
-
Authentication mechanisms for mobile adhoc networks and resistance to sybil attack
-
S. Hashmi and J. Brooke, "Authentication mechanisms for mobile adhoc networks and resistance to sybil attack," in Second International Conference on Emerging Security Information, Systems and Technologies (SECURWARE '08), Aug. 2008, pp. 120-126.
-
Second International Conference on Emerging Security Information, Systems and Technologies (SECURWARE '08), Aug. 2008
, pp. 120-126
-
-
Hashmi, S.1
Brooke, J.2
-
7
-
-
60349114116
-
Compact and anonymous role-based authorization chain
-
D. Yao and R. Tamassia, "Compact and anonymous role-based authorization chain," ACM Transactions on Information and System Security (TISSEC), vol. 12, no. 3, pp. 1-27, 2009.
-
(2009)
ACM Transactions on Information and System Security (TISSEC)
, vol.12
, Issue.3
, pp. 1-27
-
-
Yao, D.1
Tamassia, R.2
-
8
-
-
55849152839
-
Analyzing a human-based trust model for mobile ad hoc networks
-
Jul
-
P. B. Velloso, R. P. Laufer, O. C. M. B. Duarte, and G. Pujolle, "Analyzing a human-based trust model for mobile ad hoc networks," IEEE Symposium on Computers and Communications (ISCC'2008), pp. 1-6, Jul. 2008.
-
(2008)
IEEE Symposium on Computers and Communications (ISCC'2008)
, pp. 1-6
-
-
Velloso, P.B.1
Laufer, R.P.2
Duarte, O.C.M.B.3
Pujolle, G.4
|