-
1
-
-
77954504456
-
Introduction to encryption key management for public safety radio systems, 2001
-
Accessed December 2009. URL
-
Introduction to encryption key management for public safety radio systems, 2001. Public Safety Wireless Network Program. Security Issues Report: Encryption Key. Accessed December 2009. URL: http://www.safecomprogram.gov/NR/ rdonlyres/7C31664D-5B0B-4128-A85B-DC79B1D734ED/0/Security-Issues-Analysis- Report.pdf.
-
Security Issues Report: Encryption Key
-
-
-
3
-
-
20544460558
-
Human mobility in manet disaster area simulation - A realistic approach
-
Tampa, Florida, U.S.A., November
-
N. Aschenbruck, M. Frank, P. Martini, and J. Tölle. Human mobility in manet disaster area simulation - a realistic approach. In 29th Annual IEEE Conf. on Local Computer Networks (LCN), pages 668-675, Tampa, Florida, U.S.A., November 2004.
-
(2004)
29th Annual IEEE Conf. on Local Computer Networks (LCN)
, pp. 668-675
-
-
Aschenbruck, N.1
Frank, M.2
Martini, P.3
Tölle, J.4
-
4
-
-
42149083308
-
Modelling mobility in disaster area scenarios
-
Chania, Crete Island, Greece, October
-
N. Aschenbruck, E. Gerhards-Padilla, M. Gerharz, M. Frank, and P.Martini. Modelling mobility in disaster area scenarios. In Proc. of the 10th Int. Symp. on Modeling Analysis and Simulation of Wireless and Mobile Systems (MSWiM), pages 4-12, Chania, Crete Island, Greece, October 2007.
-
(2007)
Proc. of the 10th Int. Symp. on Modeling Analysis and Simulation of Wireless and Mobile Systems (MSWiM)
, pp. 4-12
-
-
Aschenbruck, N.1
Gerhards-Padilla, E.2
Gerharz, M.3
Frank, M.4
Martini, P.5
-
5
-
-
33745793594
-
Dynamic and efficient key management for access hierarchies
-
New York, USA, November ACM
-
M. J. Atallah, K. B. Frikken, and M. Blanton. Dynamic and efficient key management for access hierarchies. In 12th ACM Conf. on Computer and Communications Security (CCS), pages 190-202, New York, USA, November 2005. ACM.
-
(2005)
12th ACM Conf. on Computer and Communications Security (CCS)
, pp. 190-202
-
-
Atallah, M.J.1
Frikken, K.B.2
Blanton, M.3
-
8
-
-
77954521661
-
Jist: Embedding simulation time into a virtual machine
-
Montreal, Quebec, Canada
-
R. Barr, Z. J. Haas, and R. van Renesse. Jist: Embedding simulation time into a virtual machine. In 8th Int. Symp. on Modeling Analysis and Simulation of Wireless and Mobile Systems (MSWiM), page 16, Montreal, Quebec, Canada, 2003.
-
(2003)
8th Int. Symp. on Modeling Analysis and Simulation of Wireless and Mobile Systems (MSWiM)
, pp. 16
-
-
Barr, R.1
Haas, Z.J.2
Van Renesse, R.3
-
10
-
-
34347406402
-
A system for securing push-based distribution of xml documents
-
E. Bertino, E. Ferrari, F. Paci, and L. Parasiliti Provenza. A system for securing push-based distribution of xml documents. Int. J. Inf. Secur., 6(4):255-284, 2007.
-
(2007)
Int. J. Inf. Secur.
, vol.6
, Issue.4
, pp. 255-284
-
-
Bertino, E.1
Ferrari, E.2
Paci, F.3
Parasiliti Provenza, L.4
-
11
-
-
0035680371
-
Certificate chain discovery in spki/sdsi
-
D. Clarke, J. Elien, M. Ellison, C.and Fredette, A. Morcos, and R. L. Rivest. Certificate chain discovery in spki/sdsi. J. of Computer Security, 9(4):285-322, 2001.
-
(2001)
J. of Computer Security
, vol.9
, Issue.4
, pp. 285-322
-
-
Clarke, D.1
Elien, J.2
Ellison, M.3
Fredette, C.4
Morcos, A.5
Rivest, R.L.6
-
12
-
-
34247636066
-
Multihop ad hoc networking: The reality
-
April
-
M. Conti and S. Giordano. Multihop ad hoc networking: The reality. IEEE Communications Magazine, 45(4):88-95, April 2007.
-
(2007)
IEEE Communications Magazine
, vol.45
, Issue.4
, pp. 88-95
-
-
Conti, M.1
Giordano, S.2
-
13
-
-
77954520609
-
-
Office for Interoperability and Compatibility Department of Homeland Security. Accessed December 2009. URL
-
Office for Interoperability and Compatibility Department of Homeland Security. Public safety statement of requirements for communications & interoperability, 2006. Accessed December 2009. URL: http://www.safecomprogram. gov/SAFECOM/.
-
(2006)
Public Safety Statement of Requirements for Communications & Interoperability
-
-
-
14
-
-
34547273527
-
Attribute-based encryption for fine-grained access control of encrypted data
-
New York, NY, USA, October ACM
-
V. Goyal, O. Pandey, A. Sahai, and B. Waters. Attribute-based encryption for fine-grained access control of encrypted data. In Proc. 13th ACM Conf. on Computer and Communications Security, pages 89-98, New York, NY, USA, October 2006. ACM.
-
(2006)
Proc. 13th ACM Conf. on Computer and Communications Security
, pp. 89-98
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
16
-
-
0034545825
-
Sending messages to mobile users in disconnected ad-hoc wireless networks
-
Boston, Massachusetts, USA, August
-
Q. Li and D. Rus. Sending messages to mobile users in disconnected ad-hoc wireless networks. In 6th ACM/IEEE Int. Conf. on Mobile Computing and Networking (MOBICOM), pages 44-55, Boston, Massachusetts, USA, August 2000.
-
(2000)
6th ACM/IEEE Int. Conf. on Mobile Computing and Networking (MOBICOM)
, pp. 44-55
-
-
Li, Q.1
Rus, D.2
-
17
-
-
36348979828
-
Opportunistic networks for emergency applications and their standard implementation framework
-
New Orleans, Louisiana, USA, April
-
L. Lilien, A. K. Gupta, and Z. Yang. Opportunistic networks for emergency applications and their standard implementation framework. In 26th IEEE Int. Performance Computing and Communications Conf. (IPCCC), pages 588-593, New Orleans, Louisiana, USA, April 2007.
-
(2007)
26th IEEE Int. Performance Computing and Communications Conf. (IPCCC)
, pp. 588-593
-
-
Lilien, L.1
Gupta, A.K.2
Yang, Z.3
-
18
-
-
77954494094
-
Wise wireless Sensornet Lab. Opportunistic networks: The concept and research challenges in privacy and security
-
L. Lilien, Z. Huma Kamal, V. Bhuse, A. Gupta, and Wise (wireless Sensornet Lab. Opportunistic networks: The concept and research challenges in privacy and security. In Proc. NSF Int. Workshop on Research Challenges in Security and Privacy for Mobile and Wireless Networks (WSPWN), Miami, Florida, U.S.A., March 2006.
-
Proc. NSF Int. Workshop on Research Challenges in Security and Privacy for Mobile and Wireless Networks (WSPWN), Miami, Florida, U.S.A., March 2006
-
-
Lilien, L.1
Huma Kamal, Z.2
Bhuse, V.3
Gupta, A.4
-
20
-
-
84942776290
-
Towards accountable management of identity and privacy: Sticky policies and enforceable tracing services
-
Prague, Czech Republic, September
-
M. Casassa Mont, S Pearson, and P. Bramhall. Towards accountable management of identity and privacy: Sticky policies and enforceable tracing services. In 14th Int. Workshop on Database and Expert Systems Applications (DEXA), pages 377-382, Prague, Czech Republic, September 2003.
-
(2003)
14th Int. Workshop on Database and Expert Systems Applications (DEXA)
, pp. 377-382
-
-
Casassa Mont, M.1
Pearson, S.2
Bramhall, P.3
-
22
-
-
84949513306
-
Security architectures for controlled digital information dissemination
-
New Orleans, USA, December IEEE Computer Society
-
J. Park, R. S. Sandhu, and J. Schifalacqua. Security architectures for controlled digital information dissemination. In 16th Computer Security Applications Conf. (ACSAC), pages 224-, New Orleans, USA, December 2000. IEEE Computer Society.
-
(2000)
16th Computer Security Applications Conf. (ACSAC)
, pp. 224
-
-
Park, J.1
Sandhu, R.S.2
Schifalacqua, J.3
-
23
-
-
35448961633
-
Prioritized epidemic routing for opportunistic networks
-
New York, USA, March ACM
-
R. Ramanathan, R. Hansen, P. Basu, R. Rosales-Hain, and R. Krishnan. Prioritized epidemic routing for opportunistic networks. In Proc. of the 1st int. MobiSys Workshop on Mobile Opportunistic Networking (MobiOpp), pages 62-66, New York, USA, March 2007. ACM.
-
(2007)
Proc. of the 1st Int. MobiSys Workshop on Mobile Opportunistic Networking (MobiOpp)
, pp. 62-66
-
-
Ramanathan, R.1
Hansen, R.2
Basu, P.3
Rosales-Hain, R.4
Krishnan, R.5
-
24
-
-
24944554962
-
Fuzzy identity-based encryption
-
24th Int. Conf. on the Theory and Applications of Cryptographic (EUROCRYPT), Aarhus, Denmark, May Springer
-
A. Sahai and B. Waters. Fuzzy identity-based encryption. In 24th Int. Conf. on the Theory and Applications of Cryptographic (EUROCRYPT), volume 3494 of LNCS, pages 457-473, Aarhus, Denmark, May 2005. Springer.
-
(2005)
LNCS
, vol.3494
, pp. 457-473
-
-
Sahai, A.1
Waters, B.2
-
25
-
-
70350370034
-
Paes: Policy-based authority evaluation scheme
-
Montreal, Quebec, Canada, July
-
E. Scalavino, V. Gowadia, and E. C. Lupu. Paes: Policy-based authority evaluation scheme. In DBSec, pages 268-282, Montreal, Quebec, Canada, July 2009.
-
(2009)
DBSec
, pp. 268-282
-
-
Scalavino, E.1
Gowadia, V.2
Lupu, E.C.3
-
26
-
-
84893392013
-
Haggle: A Networking Architecture Designed Around Mobile Users
-
Les Menuires, France, January
-
J. Scott, P. Hui, J. Crowcroft, and C. Diot. Haggle: A Networking Architecture Designed Around Mobile Users. In IFIP Conference on Wireless On demand Network Systems (WONS), pages 78-86, Les Menuires, France, January 2006.
-
(2006)
IFIP Conference on Wireless on Demand Network Systems (WONS)
, pp. 78-86
-
-
Scott, J.1
Hui, P.2
Crowcroft, J.3
Diot, C.4
-
27
-
-
77954511537
-
-
Avoco Secure. Accessed December 2009. URL
-
Avoco Secure. Choosing an enterprise rights management system: Architectural approach, 2007. Accessed December 2009. URL:www.windowsecurity. com/uplarticle/Authentication-and-Access-Control/ERM-architectural-approaches. pdf.
-
(2007)
Choosing An Enterprise Rights Management System: Architectural Approach
-
-
-
29
-
-
38149074798
-
Haggle: Seamless networking for mobile applications
-
Innsbruck, Austria, September
-
J. Su, J. Scott, P. Hui, J. Crowcroft, E. de Lara, C. Diot, A. Goel, M. Lim, and E. Upton. Haggle: Seamless networking for mobile applications. In Ubiquitous Computing, 9th Int. Conf. (Ubicomp), pages 391-408, Innsbruck, Austria, September 2007.
-
(2007)
Ubiquitous Computing, 9th Int. Conf. (Ubicomp)
, pp. 391-408
-
-
Su, J.1
Scott, J.2
Hui, P.3
Crowcroft, J.4
De Lara, E.5
Diot, C.6
Goel, A.7
Lim, M.8
Upton, E.9
|