-
2
-
-
85031307530
-
Highly dynamic Destination- Sequenced Distance-Vector Routing (DSDV) for mobile computers
-
C. E. Perkins and P. Bhagwat, "Highly Dynamic Destination- Sequenced Distance-Vector Routing (DSDV) for Mobile Computers," in Proceedings of SIGCOMM, 1994, pp. 234- 244.
-
(1994)
Proceedings of SIGCOMM
, pp. 234-244
-
-
Perkins, C.E.1
Bhagwat, P.2
-
4
-
-
34347349933
-
Ad-hoc on-demand distance vector routing
-
IEEE Computer Society Press
-
C. E. Perkins and E. M. Belding-Royer, "Ad-hoc On-Demand Distance Vector Routing," in Proceedings of WMCSA. IEEE Computer Society Press, 1999, pp. 90-100.
-
(1999)
Proceedings of WMCSA
, pp. 90-100
-
-
Perkins, C.E.1
Belding-Royer, E.M.2
-
6
-
-
0036980294
-
Securing ad hoc routing protocols
-
ACM
-
M. G. Zapata and N. Asokan, "Securing Ad Hoc Routing Protocols," in Proceedings of WiSe. ACM, 2002, pp. 1-10.
-
(2002)
Proceedings of WiSe
, pp. 1-10
-
-
Zapata, M.G.1
Asokan, N.2
-
8
-
-
17444426121
-
Ariadne: A secure on-demand routing protocol for ad hoc networks
-
Y.-C. Hu, A. Perrig, and D. B. Johnson, "Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks," Wireless Networks, vol. 11, no. 1-2, pp. 21-38, 2005.
-
(2005)
Wireless Networks
, vol.11
, Issue.1-2
, pp. 21-38
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
9
-
-
15244339622
-
Authenticated routing for ad hoc networks
-
K. Sanzgiri, D. LaFlamme, B. Dahill, B. N. Levine, C. Shields, and E. M. Belding-Royer, "Authenticated Routing for Ad Hoc Networks," IEEE Journal on Selected Areas in Communication, special issue on Wireless Ad Hoc Networks, vol. 23, no. 3, pp. 598-610, 2005.
-
(2005)
IEEE Journal on Selected Areas in Communication, Special Issue on Wireless Ad Hoc Networks
, vol.23
, Issue.3
, pp. 598-610
-
-
Sanzgiri, K.1
Laflamme, D.2
Dahill, B.3
Levine, B.N.4
Shields, C.5
Belding-Royer, E.M.6
-
10
-
-
85008543309
-
Provably secure on- demand source routing in mobile ad hoc networks
-
G. Ács, L. Buttyán, and I. Vajda, "Provably Secure On- Demand Source Routing in Mobile Ad Hoc Networks," IEEE Transaction on Mobile Computing, vol. 5, no. 11, pp. 1533- 1546, 2006.
-
(2006)
IEEE Transaction on Mobile Computing
, vol.5
, Issue.11
, pp. 1533-1546
-
-
Ács, G.1
Buttyán, L.2
Vajda, I.3
-
11
-
-
0034822279
-
An efficient cryptographic protocol verifier based on prolog rules
-
IEEE Computer Society Press
-
B. Blanchet, "An efficient cryptographic protocol verifier based on prolog rules," in Proceedings of CSF'01. IEEE Computer Society Press, 2001, pp. 82-96.
-
(2001)
Proceedings of CSF'01
, pp. 82-96
-
-
Blanchet, B.1
-
12
-
-
78650439921
-
-
"The AVISPA Tool," http://www.avispa-project.org/.
-
The AVISPA Tool
-
-
-
13
-
-
0020720357
-
On the security of public-key protocols
-
D. Dolev and A. Yao, "On the Security of Public-Key Protocols," IEEE Trans. on Info. Theory, vol. 2, no. 29, 1983.
-
(1983)
IEEE Trans. on Info. Theory
, vol.2
, Issue.29
-
-
Dolev, D.1
Yao, A.2
-
14
-
-
23144433992
-
A high level protocol specification language for industrial security- sensitive protocols
-
ser. Austrian Computer Society
-
Y. Chevalier, L. Compagna, J. Cuellar, P. Hankes Drielsma, J. Mantovani, S. M̈odersheim, and L. Vigneron, A High Level Protocol Specification Language for Industrial Security- Sensitive Protocols, ser. Automated Software Engineering. Austrian Computer Society, 2004, vol. 180, pp. 193-205.
-
(2004)
Automated Software Engineering.
, vol.180
, pp. 193-205
-
-
Chevalier, Y.1
Compagna, L.2
Cuellar, J.3
Drielsma, P.H.4
Mantovani, J.5
M̈odersheim, S.6
Vigneron, L.7
-
15
-
-
78650508247
-
Model checking wireless sensor network security protocols: TinySec + LEAP + TinyPK
-
M. L. Tobarra, D. Cazorla, F. Cuartero, G. Díaz, and M.- E. Cambronero, "Model Checking Wireless Sensor Network Security Protocols: TinySec + LEAP + TinyPK," Telecommunication Systems, vol. 40, no. 3-4, pp. 91-99, 2009.
-
(2009)
Telecommunication Systems
, vol.40
, Issue.3-4
, pp. 91-99
-
-
Tobarra, M.L.1
Cazorla, D.2
Cuartero, F.3
Díaz, G.4
Cambronero, M.-.E.5
-
16
-
-
70349335930
-
The open-source fixed- point model checker for symbolic analysis of security protocols
-
ser. LNCS 5705. Springer-Verlag
-
S. Mödersheim and L. Viganò, "The Open-Source Fixed- Point Model Checker for Symbolic Analysis of Security Protocols," in FOSAD 2008/2009, ser. LNCS 5705. Springer-Verlag, 2009, pp. 166-194.
-
(2009)
FOSAD 2008/2009
, pp. 166-194
-
-
Mödersheim, S.1
Viganó, L.2
-
17
-
-
4544302090
-
Modeling vulnerabilities of ad hoc routing protocols
-
ACM
-
S. Yang and J. S. Baras, "Modeling vulnerabilities of ad hoc routing protocols," in Proceedings of SASN. ACM, 2003, pp. 12-20.
-
(2003)
Proceedings of SASN
, pp. 12-20
-
-
Yang, S.1
Baras, J.S.2
-
18
-
-
14844337112
-
Towards provable security for ad hoc routing protocols
-
ACM
-
L. Buttyán and I. Vajda, "Towards provable security for ad hoc routing protocols," in Proceedings of SASN. ACM, 2004, pp. 94-105.
-
(2004)
Proceedings of SASN
, pp. 94-105
-
-
Buttyán, L.1
Vajda, I.2
-
19
-
-
33745747748
-
Provable security of ondemand distance vector routing in wireless ad hoc networks
-
ser. LNCS 3813. Springer
-
G. Ács, L. Buttyán, and I. Vajda, "Provable security of ondemand distance vector routing in wireless ad hoc networks," in Proceedings of ESAS, ser. LNCS 3813. Springer, 2005, pp. 113-127.
-
(2005)
Proceedings of ESAS
, pp. 113-127
-
-
Ács, G.1
Buttyán, L.2
Vajda, I.3
-
20
-
-
85008543309
-
Provably secure on-demand source routing in mobile ad hoc networks
-
Ács G., Buttyán L., Vajda I., "Provably secure on-demand source routing in mobile ad hoc networks," IEEE Trans. Mob. Comput., vol. 5, no. 11, pp. 1533-1546, 2006.
-
(2006)
IEEE Trans. Mob. Comput.
, vol.5
, Issue.11
, pp. 1533-1546
-
-
Ács, G.1
Buttyán, L.2
Vajda, I.3
-
21
-
-
33750440529
-
A framework for security analysis of mobile wireless networks
-
S. Nanz and C. Hankin, "A Framework for Security Analysis of Mobile Wireless Networks," Theoretical Computer Science, vol. 367, no. 1-2, pp. 203-227, 2006.
-
(2006)
Theoretical Computer Science
, vol.367
, Issue.1-2
, pp. 203-227
-
-
Nanz, S.1
Hankin, C.2
-
22
-
-
37149042964
-
A calculus for mobile ad hoc networks
-
ser. LNCS, Springer-Verlag
-
J. Godskesen, "A Calculus for Mobile Ad Hoc Networks," in Proceedings of Coordination'97, ser. LNCS, vol. 4467. Springer-Verlag, 2007, pp. 132-150.
-
(2007)
Proceedings of Coordination'97
, vol.4467
, pp. 132-150
-
-
Godskesen, J.1
-
23
-
-
26444574670
-
Tinysec: A link layer security architecture for wireless sensor networks
-
ACM
-
C. Karlof, N. Sastry, and D. Wagner, "Tinysec: a link layer security architecture for wireless sensor networks," in Proceedings of SenSys'04. ACM, 2004, pp. 162-175.
-
(2004)
Proceedings of SenSys'04
, pp. 162-175
-
-
Karlof, C.1
Sastry, N.2
Wagner, D.3
-
24
-
-
18844407590
-
Poster abstract: LEAP - Efficient security mechanisms for large-scale distributed sensor networks
-
SenSys'03: Proceedings of the First International Conference on Embedded Networked Sensor Systems
-
S. Zhu, S. Setia, and S. Jajodia, "Leap - efficient security mechanisms for large-scale distributed sensor networks," in Proceedings of SenSys. ACM, 2003, pp. 308-309. (Pubitemid 40682362)
-
(2003)
SenSys'03: Proceedings of the First International Conference on Embedded Networked Sensor Systems
, pp. 308-309
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
-
25
-
-
14844304757
-
Tinypk: Securing sensor networks with public key technology
-
R. J. Watro, D. Kong, S. fen Cuti, C. Gardiner, C. Lynn, and P. Kruus, "Tinypk: securing sensor networks with public key technology," in Proceedings of SASN, 2004, pp. 59-64.
-
(2004)
Proceedings of SASN
, pp. 59-64
-
-
Watro, R.J.1
Kong, D.2
Cuti, S.F.3
Gardiner, C.4
Lynn, C.5
Kruus, P.6
-
27
-
-
0036738266
-
Spins: Security protocols for sensor networks
-
A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. D. Tygar, "Spins: Security Protocols for Sensor Networks," Wireless Networks, vol. 8, no. 5, pp. 521-534, 2002.
-
(2002)
Wireless Networks
, vol.8
, Issue.5
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, J.D.5
-
28
-
-
70350580898
-
On the unobservability of a trust relation in mobile ad hoc networks
-
ser. Lecture Notes in Computer Science, Springer
-
M. Heen, G. Guette, and T. Genet, "On the Unobservability of a Trust relation in Mobile Ad Hoc Networks," in Proceedings of WISTP'09, ser. Lecture Notes in Computer Science, vol. 5746. Springer, 2009, pp. 1-11.
-
(2009)
Proceedings of WISTP'09
, vol.5746
, pp. 1-11
-
-
Heen, M.1
Guette, G.2
Genet, T.3
-
29
-
-
77957579306
-
Modeling and verifying ad hoc routing protocols
-
IEEE Computer Society Press
-
M. Arnaud, V. Cortier, and S. Delaune, "Modeling and Verifying Ad Hoc Routing Protocols," in Proceedings of CSF'10. IEEE Computer Society Press, 2010.
-
(2010)
Proceedings of CSF'10
-
-
Arnaud, M.1
Cortier, V.2
Delaune, S.3
|