메뉴 건너뛰기




Volumn , Issue , 2008, Pages

Bootstrapping deny-by-default access control for mobile ad-hoc networks

Author keywords

[No Author keywords available]

Indexed keywords

BOOTSTRAP PROTOCOLS; LIVENESS; MOBILE AD-HOC NETWORKS; NEIGHBORING NODES; NETWORK NODES; NETWORK VULNERABILITIES; POSSIBLE FUTURES; TRAFFIC FLOWS;

EID: 78650760108     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/MILCOM.2008.4753174     Document Type: Conference Paper
Times cited : (7)

References (19)
  • 3
    • 62349114144 scopus 로고    scopus 로고
    • Paranoid penguin: Introduction to selinux, part ii
    • M. Bauer, "Paranoid penguin: Introduction to selinux, part ii", Linux Journal, vol. 155, 2007.
    • (2007) Linux Journal , vol.155
    • Bauer, M.1
  • 5
    • 0019009081 scopus 로고
    • Formal methods in communication protocol design
    • G. Bochmann and C. Sunshine, "Formal methods in communication protocol design," IEEE Transactions on Communications, vol. 28, no. 4, pp. 624-631, 1980.
    • (1980) IEEE Transactions on Communications , vol.28 , Issue.4 , pp. 624-631
    • Bochmann, G.1    Sunshine, C.2
  • 13
    • 49049088351 scopus 로고    scopus 로고
    • Rules of thumb for developing secure software: Analyzing and consolidating two proposed sets of rules
    • H. Peine, "Rules of thumb for developing secure software: Analyzing and consolidating two proposed sets of rules," in 3rd Int. Conf. on Availability, Reliability and Security, 2008.
    • (2008) 3rd Int. Conf. on Availability, Reliability and Security
    • Peine, H.1
  • 17
    • 62349102007 scopus 로고    scopus 로고
    • Vulnerability analysis of policy bootstrapping
    • UMass. Amherst
    • H. Zhang, B. DeCleene, J. Kurose, and D. Towsely, "Vulnerability analysis of policy bootstrapping," in Tec. Report, UMass. Amherst, 2008, ftp://gaia.cs.umass.edu/pub/Zhang08-vulnerability-analysis.pdf.
    • (2008) Tec. Report
    • Zhang, H.1    DeCleene, B.2    Kurose, J.3    Towsely, D.4
  • 18
    • 0842289235 scopus 로고    scopus 로고
    • Bootstrapping security associations for routing in mobile ad-hoc networks
    • R.B. Bobba, L. Eschenauer, V. Gligor, and W. Arbaugh, "Bootstrapping security associations for routing in mobile ad-hoc networks", in IEEE Globecom, 2003.
    • (2003) IEEE Globecom
    • Bobba, R.B.1    Eschenauer, L.2    Gligor, V.3    Arbaugh, W.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.