-
3
-
-
24744455885
-
A lightweight authentication protocol for mobile ad hoc networks
-
B. Lu and U. W. Pooch, "A Lightweight Authentication Protocol for Mobile Ad Hoc Networks," International Journal of Information Technology, Vol. 11, no. 2, pp. 119-135, 2005.
-
(2005)
International Journal of Information Technology
, vol.11
, Issue.2
, pp. 119-135
-
-
Lu, B.1
Pooch, U.W.2
-
5
-
-
84893457313
-
Internet X. 509 public key infrastructure: PKIX roadmap
-
PKIX Working Group
-
A. Aresenault and S. Turner, "Internet X. 509 Public Key Infrastructure: PKIX Roadmap,", IETF Internet Draft, PKIX Working Group, 2000.
-
(2000)
IETF Internet Draft
-
-
Aresenault, A.1
Turner, S.2
-
9
-
-
0036924499
-
On-demand multicast routing protocol in multihop wireless mobile networks
-
S. Lee, W. Su, and M. Gerla, "On-Demand Multicast Routing Protocol in Multihop Wireless Mobile Networks," Mobile Networks and Applications, v. 7, n. 6, p. 441-453, 2002.
-
(2002)
Mobile Networks and Applications
, vol.7
, Issue.6
, pp. 441-453
-
-
Lee, S.1
Su, W.2
Gerla, M.3
-
11
-
-
0036957315
-
Ariadne: A secure on-demand routing protocol for ad hoc networks
-
Y. Hu, A. Perrig, D. Johnson, "Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks," Proceedings of Mobicom, 2002.
-
(2002)
Proceedings of Mobicom
-
-
Hu, Y.1
Perrig, A.2
Johnson, D.3
-
12
-
-
0033357103
-
Securing ad hoc networks
-
November/December
-
L. Zhou and Z. Haas, "Securing Ad Hoc Networks," IEEE Network Magazine, 13(6) November/December 1999.
-
(1999)
IEEE Network Magazine
, vol.13
, Issue.6
-
-
Zhou, L.1
Haas, Z.2
-
13
-
-
84883869163
-
Self-securing ad hoc wireless networks
-
H. Luo, P. Zerfos, J. Kong, S. Lu, L. Zhang, "Self-securing Ad Hoc Wireless Networks," IEEE ISCC (IEEE Symposium on Computers and Communications 2002.
-
(2002)
IEEE ISCC (IEEE Symposium on Computers and Communications
-
-
Luo, H.1
Zerfos, P.2
Kong, J.3
Lu, S.4
Zhang, L.5
-
16
-
-
0013294745
-
Protecting routing infrastructures from denial of service using cooperative intrusion detection
-
S. Cheung and K. Levitt, "Protecting routing infrastructures from denial of service using cooperative intrusion detection," in New Security Paradigms Workshop, 1997.
-
(1997)
New Security Paradigms Workshop
-
-
Cheung, S.1
Levitt, K.2
-
17
-
-
0031703272
-
Detecting disruptive routers: A distributed network monitoring approach
-
K. A. Bradley, S. Cheung, N. Puketza, B. Mukherjee, and R. A. Olsson, "Detecting disruptive routers: A distributed network monitoring approach," in IEEE Symposium on Security and Privacy, 1998.
-
(1998)
IEEE Symposium on Security and Privacy
-
-
Bradley, K.A.1
Cheung, S.2
Puketza, N.3
Mukherjee, B.4
Olsson, R.A.5
-
18
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
S. Marti, T. Giuli, K. Lai, and M. Baker, "Mitigating routing misbehavior in mobile ad hoc networks," Proceedings of the Sixth annual ACM/IEEE International Conference on Mobile Computing and Networking, pages 255-265, 2000.
-
(2000)
Proceedings of the Sixth Annual ACM/IEEE International Conference on Mobile Computing and Networking
, pp. 255-265
-
-
Marti, S.1
Giuli, T.2
Lai, K.3
Baker, M.4
-
19
-
-
0038341106
-
A key-management scheme for distributed sensor networks
-
L. Eschenauer and V. D. Gligor, "A key-management scheme for distributed sensor networks," ACM CCS, 2002.
-
(2002)
ACM CCS
-
-
Eschenauer, L.1
Gligor, V.D.2
-
22
-
-
0034771605
-
Spins: Security protocols for sensor networks
-
A. Perrig, R. Szewcyzk, V. Wen, D. Culler, and J.D. Tygar, "Spins: Security Protocols for Sensor Networks," Proceedings of Mobile Computing and Networking, 2001.
-
(2001)
Proceedings of Mobile Computing and Networking
-
-
Perrig, A.1
Szewcyzk, R.2
Wen, V.3
Culler, D.4
Tygar, J.D.5
|