-
1
-
-
0033357103
-
Securing ad hoc networks
-
Zhou L., Haas Z. J., Securing ad hoc networks IEEE Network 1999 13 6 24 30
-
(1999)
IEEE Network
, vol.13
, Issue.6
, pp. 24-30
-
-
Zhou, L.1
Haas, Z.J.2
-
2
-
-
0035704362
-
Providing robust and ubiquitous security support for mobile ad-hoc networks
-
November
-
Kong J., Zerfos P., Luo H., Lu S., Zhang L., Providing robust and ubiquitous security support for mobile ad-hoc networks Proceedings of the International Conference on Network Protocols (ICNP '01) November 2001 251 260
-
(2001)
Proceedings of the International Conference on Network Protocols (ICNP '01)
, pp. 251-260
-
-
Kong, J.1
Zerfos, P.2
Luo, H.3
Lu, S.4
Zhang, L.5
-
6
-
-
33646847482
-
On-demand public-key management for mobile ad hoc networks
-
DOI 10.1002/wcm.396
-
Li R., Li J., Liu P., Chen H.-H., On-demand public-key management for mobile ad hoc networks Wireless Communications and Mobile Computing 2006 6 3 295 306 (Pubitemid 43774309)
-
(2006)
Wireless Communications and Mobile Computing
, vol.6
, Issue.3
, pp. 295-306
-
-
Li, R.1
Li, J.2
Liu, P.3
Chen, H.-H.4
-
7
-
-
34047142151
-
Building a virtual hierarchy to simplify certification path discovery in mobile ad-hoc networks
-
Satizbal C., Hernndez-Serrano J., Forn J., Pegueroles J., Building a virtual hierarchy to simplify certification path discovery in mobile ad-hoc networks Computer Communications 2007 30 7 1498 1512
-
(2007)
Computer Communications
, vol.30
, Issue.7
, pp. 1498-1512
-
-
Satizbal, C.1
Hernndez-Serrano, J.2
Forn, J.3
Pegueroles, J.4
-
8
-
-
63049099708
-
Reliable and fully distributed trust model for mobile ad hoc networks
-
Omar M., Challal Y., Bouabdallah A., Reliable and fully distributed trust model for mobile ad hoc networks Computers and Security 2009 28 3-4 199 214
-
(2009)
Computers and Security
, vol.28
, Issue.34
, pp. 199-214
-
-
Omar, M.1
Challal, Y.2
Bouabdallah, A.3
-
9
-
-
33745894628
-
Cluster-based certificate chain for mobile ad hoc networks
-
Computational Science and Its Applications - ICCSA 2006: International Conference, Proceedings - Part II 3981 LNCS
-
Hahn G., Kwon T., Kim S., Song J., Cluster-based certificate chain for mobile ad hoc networks 3981 Proceedings of the International Conference on Computational Science and Applications (ICCSA '10) 2006 Springer 769 778 Lecture Notes in Computer Science (Pubitemid 44045379)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, pp. 769-778
-
-
Hahn, G.1
Kwon, T.2
Kim, S.3
Song, J.4
-
13
-
-
21644461880
-
Moderately hard, memory-bound functions
-
Abadi M., Burrows M., Manasse M., Wobber T., Moderately hard, memory-bound functions ACM Transactions on Internet Technology 2005 5 2 299 327
-
(2005)
ACM Transactions on Internet Technology
, vol.5
, Issue.2
, pp. 299-327
-
-
Abadi, M.1
Burrows, M.2
Manasse, M.3
Wobber, T.4
-
14
-
-
11244320485
-
URSA: Ubiquitous and robust access control for mobile ad hoc networks
-
Luo H., Kong J., Zerfos P., Lu S., Zhang L., URSA: ubiquitous and robust access control for mobile ad hoc networks IEEE/ACM Transactions on Networking 2004 12 6 1049 1063
-
(2004)
IEEE/ACM Transactions on Networking
, vol.12
, Issue.6
, pp. 1049-1063
-
-
Luo, H.1
Kong, J.2
Zerfos, P.3
Lu, S.4
Zhang, L.5
-
15
-
-
33750959755
-
Efficient node admission for short-lived mobile ad hoc networks
-
November Boston, Mass, USA
-
Saxena N., Tsudik G., Yi J. H., Efficient node admission for short-lived mobile ad hoc networks Proceedings of the 13th IEEE International Conference on Network Protocols (ICNP '05) November 2005 Boston, Mass, USA 269 278
-
(2005)
Proceedings of the 13th IEEE International Conference on Network Protocols (ICNP '05)
, pp. 269-278
-
-
Saxena, N.1
Tsudik, G.2
Yi, J.H.3
-
16
-
-
33646845802
-
Cooperation enforcement schemes for MANETs: A survey
-
Marias G. F., Flitzanis D., Mandalas K., Georgiadis P., Cooperation enforcement schemes for MANETs: a survey Jouranl of Wireless Communications and Mobile Computing 2006 6 3 319 332
-
(2006)
Jouranl of Wireless Communications and Mobile Computing
, vol.6
, Issue.3
, pp. 319-332
-
-
Marias, G.F.1
Flitzanis, D.2
Mandalas, K.3
Georgiadis, P.4
-
17
-
-
67650720681
-
A trust model based on fuzzy recommendation for mobile ad-hoc networks
-
Luo J., Liu X., Fan M., A trust model based on fuzzy recommendation for mobile ad-hoc networks Computer Networks 2009 53 14 2396 2407
-
(2009)
Computer Networks
, vol.53
, Issue.14
, pp. 2396-2407
-
-
Luo, J.1
Liu, X.2
Fan, M.3
-
19
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
New York, NY, USA IEEE
-
Marti S., Giuli T. J., Lai K., Baker M., Mitigating routing misbehavior in mobile ad hoc networks Proceedings of the 6th Annual International Conference on Mobile Computing and Networking (MOBICOM '00) 2000 New York, NY, USA IEEE 255 265
-
(2000)
Proceedings of the 6th Annual International Conference on Mobile Computing and Networking (MOBICOM '00)
, pp. 255-265
-
-
Marti, S.1
Giuli, T.J.2
Lai, K.3
Baker, M.4
-
21
-
-
33144479525
-
SCAN: Self-organized network-layer security in mobile ad hoc networks
-
Yang H., Shu J., Meng X., Lu S., SCAN: self-organized network-layer security in mobile ad hoc networks IEEE Journal on Selected Areas in Communications 2006 24 2 261 273
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, Issue.2
, pp. 261-273
-
-
Yang, H.1
Shu, J.2
Meng, X.3
Lu, S.4
-
22
-
-
0042933944
-
Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks
-
IEEE
-
Zhong S., Chen J., Yang Y. R., Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks 3 Proceedings of the IEEE Communications Society Conference on Computer Communications (INFOCOM '03) 2003 IEEE 1987 1997
-
(2003)
Proceedings of the IEEE Communications Society Conference on Computer Communications (INFOCOM '03)
, vol.3
, pp. 1987-1997
-
-
Zhong, S.1
Chen, J.2
Yang, Y.R.3
-
27
-
-
1542456902
-
The height of a random binary search tree
-
Reed B., The height of a random binary search tree Journal of the ACM 2003 50 3 306 332
-
(2003)
Journal of the ACM
, vol.50
, Issue.3
, pp. 306-332
-
-
Reed, B.1
-
29
-
-
33751529199
-
Securing mobile ad hoc networks with certificateless public keys
-
Zhang Y., Liu W., Lou W., Fang Y., Securing mobile ad hoc networks with certificateless public keys IEEE Transactions on Dependable and Secure Computing 2006 3 4 386 399
-
(2006)
IEEE Transactions on Dependable and Secure Computing
, vol.3
, Issue.4
, pp. 386-399
-
-
Zhang, Y.1
Liu, W.2
Lou, W.3
Fang, Y.4
-
31
-
-
34548050159
-
Providing distributed certificate authority service in cluster-based mobile ad hoc networks
-
DOI 10.1016/j.comcom.2007.04.011, PII S0140366407001673
-
Dong Y., Sui A.-F., Yiu S. M., Li V. O. K., Hui L. C. K., Providing distributed certificate authority service in cluster-based mobile ad hoc networks Computer Communications 2007 30 11-12 2442 2452 (Pubitemid 47285284)
-
(2007)
Computer Communications
, vol.30
, Issue.11-12
, pp. 2442-2452
-
-
Dong, Y.1
Sui, A.-F.2
Yiu, S.M.3
Li, V.O.K.4
Hui, L.C.K.5
-
34
-
-
3142569233
-
Highly reliable trust establishment scheme in ad hoc networks
-
Ren K., Li T., Wan Z., Bao F., Deng R. H., Kim K., Highly reliable trust establishment scheme in ad hoc networks Computer Networks 2004 45 6 687 699
-
(2004)
Computer Networks
, vol.45
, Issue.6
, pp. 687-699
-
-
Ren, K.1
Li, T.2
Wan, Z.3
Bao, F.4
Deng, R.H.5
Kim, K.6
-
38
-
-
26844467743
-
On digital signatures in ad hoc networks
-
Westhoff D., Lamparter B., Paar C., Weimerskirch A., On digital signatures in ad hoc networks European Transactions on Telecommunications 2005 16 5 411 425
-
(2005)
European Transactions on Telecommunications
, vol.16
, Issue.5
, pp. 411-425
-
-
Westhoff, D.1
Lamparter, B.2
Paar, C.3
Weimerskirch, A.4
|