-
1
-
-
84866985446
-
Securing the OLSR protocol
-
June
-
C. Adjih, T.H. Clausen, P. Jacquet, A. Laouiti, P. Muhltahler, D. Raffo, Securing the OLSR protocol, in: IFIP Med-Hoc-Net, June 2003, pp. 1-10.
-
(2003)
IFIP Med-Hoc-Net
, pp. 1-10
-
-
Adjih, C.1
Clausen, T.H.2
Jacquet, P.3
Laouiti, A.4
Muhltahler, P.5
Raffo, D.6
-
2
-
-
3042583499
-
Secure group communication using robust contributory key agreement
-
Y. Amir, Y. Kim, C. Nita-Rotaru, J.L. Schultz, J. Stanton, and G. Tsudik Secure group communication using robust contributory key agreement IEEE Transactions on Parallel and Distributed Systems 15 5 2004 468 480
-
(2004)
IEEE Transactions on Parallel and Distributed Systems
, vol.15
, Issue.5
, pp. 468-480
-
-
Amir, Y.1
Kim, Y.2
Nita-Rotaru, C.3
Schultz, J.L.4
Stanton, J.5
Tsudik, G.6
-
3
-
-
33750949973
-
Efficient group key management protocol in MANETs using the multipoint relaying technique
-
April
-
M.S. Bouassida, I. Chrisment, O. Festor, Efficient group key management protocol in MANETs using the multipoint relaying technique, in: International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies (ICN/ICONS/MCL 2006), April 2006, pp. 64-71.
-
(2006)
International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies (ICN/ICONS/MCL 2006)
, pp. 64-71
-
-
Bouassida, M.S.1
Chrisment, I.2
Festor, O.3
-
4
-
-
84948991087
-
A secure and efficient conference key distribution system
-
M. Burmester, and Y. Desmedt A secure and efficient conference key distribution system Lecture Notes in Computer Science 950 1998 275 286
-
(1998)
Lecture Notes in Computer Science
, vol.950
, pp. 275-286
-
-
Burmester, M.1
Desmedt, Y.2
-
5
-
-
33847610623
-
The ad hoc return channel: A low-cost solution for Brazilian interactive digital TV
-
DOI 10.1109/MCOM.2007.284549
-
M.E.M. Campista, I.M. Moraes, P. Esposito, A. Amodei Jr., L.H.M.K. Costa, and O.C.M.B. Duarte The ad hoc return channel: a low-cost solution for brazilian interactive digital TV IEEE Communications Magazine 45 1 2007 136 143 (Pubitemid 46358127)
-
(2007)
IEEE Communications Magazine
, vol.45
, Issue.1
, pp. 136-143
-
-
Campista, M.E.M.1
Moraes, I.M.2
Esposito, P.M.3
Amodei Jr., A.4
De Cunha, D.O.5
Costa, L.H.M.K.6
Duarte, O.C.M.B.7
-
6
-
-
0010461175
-
Constraints and Approaches for Distributed Sensor Network Security (final)
-
NAI Labs, September
-
D.W. Carman, P.S. Kruus, B.J. Matt, Constraints and Approaches for Distributed Sensor Network Security (final). Tech Report 00-010, NAI Labs, September 2000.
-
(2000)
Tech Report 00-010
-
-
Carman, D.W.1
Kruus, P.S.2
Matt, B.J.3
-
7
-
-
0038487088
-
Random key predistribution schemes for sensor networks
-
May
-
H. Chan, A. Perrig, D. Song, Random key predistribution schemes for sensor networks, in: IEEE Symposium on Security and Privacy, May 2003, pp. 197-213.
-
(2003)
IEEE Symposium on Security and Privacy
, pp. 197-213
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
8
-
-
2442551009
-
Optimized Link State Routing Protocol (OLSR)
-
October
-
T. Clausen, P. Jacquet, Optimized Link State Routing Protocol (OLSR), RFC 3626, October 2003.
-
(2003)
RFC 3626
-
-
Clausen, T.1
Jacquet, P.2
-
9
-
-
54949092437
-
A cooperation-aware routing scheme for fast varying fading wireless channels
-
D.O. Cunha, O.C.M.B. Duarte, and G. Pujolle A cooperation-aware routing scheme for fast varying fading wireless channels IEEE Communications Letters 12 10 2008 794 796
-
(2008)
IEEE Communications Letters
, vol.12
, Issue.10
, pp. 794-796
-
-
Cunha, D.O.1
Duarte, O.C.M.B.2
Pujolle, G.3
-
12
-
-
77953320587
-
A self-organized mechanism for thwarting malicious access in ad hoc networks
-
San Diego, CA, USA, March
-
N.C. Fernandes, M.D.D. Moreira, O.C.M.B. Duarte, A self-organized mechanism for thwarting malicious access in ad hoc networks, in: 2010 Proceedings IEEE INFOCOM, San Diego, CA, USA, March 2010, p. 5.
-
(2010)
2010 Proceedings IEEE INFOCOM
, pp. 5
-
-
Fernandes, N.C.1
Moreira, M.D.D.2
Duarte, O.C.M.B.3
-
14
-
-
26844484217
-
Secure extension to the OLSR protocol
-
San Diego, California, August
-
A. Hafslund, A. Tonnesen, R.B. Rotvik, J. Andersson, O. Kure, Secure extension to the OLSR protocol, in: OLSR Interop and Workshop, San Diego, California, August 2004, pp. 1-4.
-
(2004)
OLSR Interop and Workshop
, pp. 1-4
-
-
Hafslund, A.1
Tonnesen, A.2
Rotvik, R.B.3
Andersson, J.4
Kure, O.5
-
15
-
-
79951517407
-
-
IEEE 802.11 Working Group, IEEE standard 802.11-2007, Standard 802.11, IEEE Computer Society, November 2007
-
IEEE 802.11 Working Group, IEEE standard 802.11-2007, Standard 802.11, IEEE Computer Society, November 2007.
-
-
-
-
16
-
-
0034449805
-
Simple and fault-tolerant key agreement for dynamic collaborative groups
-
Y. Kim, A. Perrig, G. Tsudik, Simple and fault-tolerant key agreement for dynamic collaborative groups, in: Proceedings of the Seventh ACM conference on Computer and Communications Security (CCS '00), ACM, New York, NY, USA, 2000, pp. 235-244. (Pubitemid 32393923)
-
(2000)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 235-244
-
-
Kim, Y.1
Perrig, A.2
Tsudik, G.3
-
17
-
-
0035704362
-
Providing robust and ubiquitous security support for mobile ad-hoc networks
-
J. Kong, P. Zerfos, H. Luo, S. Lu, L. Zhang, Providing robust and ubiquitous security support for mobile ad-hoc networks, in: Ninth International Conference on Network Protocols (ICNP'01), November 2001, pp. 251-260. (Pubitemid 34099990)
-
(2001)
International Conference on Network Protocols
, pp. 251-260
-
-
Kong, J.1
Zerfos, P.2
Luo, H.3
Lu, S.4
Zhang, L.5
-
18
-
-
49049091207
-
Cluster-based group key agreement for wireless ad hoc networks
-
Reliability and Security (ARES 08), March
-
E. Konstantinou, Cluster-based group key agreement for wireless ad hoc networks, in: Third International Conference on Availability, Reliability and Security (ARES 08), March 2008, pp. 550-557.
-
(2008)
Third International Conference on Availability
, pp. 550-557
-
-
Konstantinou, E.1
-
19
-
-
0003196107
-
HMAC: Keyed-Hashing for Message Authentication
-
February
-
H. Krawczyk, M. Bellare, R. Canetti, HMAC: Keyed-Hashing for Message Authentication, RFC 2104, February 1997.
-
(1997)
RFC 2104
-
-
Krawczyk, H.1
Bellare, M.2
Canetti, R.3
-
20
-
-
66249144693
-
Efficient region-based group key agreement protocol for ad hoc networks using elliptic curve cryptography
-
March
-
K. Kumar, V. Sumathy, J.N. Begum, Efficient region-based group key agreement protocol for ad hoc networks using elliptic curve cryptography, in: IEEE International Advance Computing Conference (IACC 2009), March 2009, pp. 1052-1060.
-
(2009)
IEEE International Advance Computing Conference (IACC 2009)
, pp. 1052-1060
-
-
Kumar, K.1
Sumathy, V.2
Begum, J.N.3
-
22
-
-
33845953217
-
Power proximity based key management for secure multicast in ad hoc networks
-
DOI 10.1007/s11276-006-6057-9
-
L. Lazos, and R. Poovendran Power proximity based key management for secure multicast in ad hoc networks Wireless Network 13 1 2007 127 148 (Pubitemid 46034263)
-
(2007)
Wireless Networks
, vol.13
, Issue.1
, pp. 127-148
-
-
Lazos, L.1
Poovendran, R.2
-
23
-
-
31844456886
-
An efficient group key establishment in location-aided mobile Ad hoc networks
-
PE-WASUN'05 - Proceedings of the Second ACM International Workshop on Performance Evaluation of Wireless Ad Hoc, Sensor, and Ubiquitous Networks
-
D. Li, S. Sampalli, An efficient group key establishment in location-aided mobile ad hoc networks, in: Second ACM International Workshop on Performance Evaluation of Wireless ad hoc, Sensor, and Ubiquitous Networks (PE-WASUN'05), 2005, pp. 57-64. (Pubitemid 43183451)
-
(2005)
PE-WASUN'05 - Proceedings of the Second ACM International Workshop on Performance Evaluation of Wireless Ad Hoc, Sensor, and Ubiquitous Networks
, pp. 57-64
-
-
Li, D.1
Sampalli, S.2
-
24
-
-
79961149677
-
A scalable key management and clustering scheme for ad hoc networks
-
J.H. Li, R. Levy, M. Yu, B. Bhattacharjee, A scalable key management and clustering scheme for ad hoc networks, in: International Conference on Scalable Information Systems (INFOSCALE'06), vol. 28, 2006, pp. 1-10.
-
(2006)
International Conference on Scalable Information Systems (INFOSCALE'06)
, vol.28
, pp. 1-10
-
-
Li, J.H.1
Levy, R.2
Yu, M.3
Bhattacharjee, B.4
-
25
-
-
58049131902
-
An efficient group key agreement protocol for ad hoc networks
-
October
-
Z. Li-Ping, C. Guo-Hua, Y. Zhi-Gang, An efficient group key agreement protocol for ad hoc networks, in: Fourth International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM '08), October 2008, pp. 1-5.
-
(2008)
Fourth International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM '08)
, pp. 1-5
-
-
Li-Ping, Z.1
Guo-Hua, C.2
Zhi-Gang, Y.3
-
26
-
-
33644595585
-
Group management for mobile ad hoc networks: Design, implementation and experiment
-
ACM Press
-
J. Liu, D. Sacchetti, F. Sailhan, V. Issarny, Group management for mobile ad hoc networks: design, implementation and experiment, in: Sixth International Conference on Mobile Data Management (MDM'05), ACM Press, 2005, pp. 192-199.
-
Sixth International Conference on Mobile Data Management (MDM'05)
, vol.2005
, pp. 192-199
-
-
Liu, J.1
Sacchetti, D.2
Sailhan, F.3
Issarny, V.4
-
27
-
-
11244320485
-
URSA: Ubiquitous and robust access control for mobile ad hoc networks
-
DOI 10.1109/TNET.2004.838598
-
H. Luo, J. Kong, P. Zerfos, S. Lu, and L. Zhang URSA: ubiquitous and robust access control for mobile ad hoc networks IEEE/ACM Transactions on Networking 12 6 2004 1049 1063 (Pubitemid 40085372)
-
(2004)
IEEE/ACM Transactions on Networking
, vol.12
, Issue.6
, pp. 1049-1063
-
-
Luo, H.1
Kong, J.2
Zerfos, P.3
Lu, S.4
Zhang, L.5
-
28
-
-
34247337310
-
Self-organised group key management for ad hoc networks
-
DOI 10.1145/1128817.1128839, Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS '06
-
L. Luo, R. Safavi-Naini, J. Baek, W. Susilo, Self-organised group key management for ad hoc networks, in: ACM Symposium on Information, Computer and Communications Security (ASIACCS'06), March 2006, pp. 138-147. (Pubitemid 46644733)
-
(2006)
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS '06
, vol.2006
, pp. 138-147
-
-
Luo, L.1
Safavi-Naini, R.2
Baek, J.3
Susilo, W.4
-
29
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
S. Marti, T.J. Giuli, K. Lai, M. Baker, Mitigating routing misbehavior in mobile ad hoc networks, in: Proceedings of the Sixth Annual International Conference on Mobile Computing and Networking (MobiCom), New York, NY, USA, 2000, pp. 255-265. (Pubitemid 32024700)
-
(2000)
Proceedings of the Annual International Conference on Mobile Computing and Networking, MOBICOM
, pp. 255-265
-
-
Marti Sergio1
Giuli, T.J.2
Lai Kevin3
Baker Mary4
-
31
-
-
34147173361
-
A survey on peer-to-peer key management for mobile ad hoc networks
-
J.V.D. Merwe, D. Dawoud, and S. McDonald A survey on peer-to-peer key management for mobile ad hoc networks ACM Computing Surveys 39 1 2007
-
(2007)
ACM Computing Surveys
, vol.39
, Issue.1
-
-
Merwe, J.V.D.1
Dawoud, D.2
McDonald, S.3
-
32
-
-
35148873241
-
Study and implementation of a improved group key protocol for mobile ad hoc networks
-
July
-
Q. Niu, Study and implementation of a improved group key protocol for mobile ad hoc networks, in: Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007), Vol. 1, July 2007, pp. 304-308.
-
(2007)
Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007)
, vol.1
, pp. 304-308
-
-
Niu, Q.1
-
33
-
-
79951510700
-
-
OpenSSL Core and Development Team April
-
OpenSSL Core and Development Team, OpenSSL - Cryptography and SSL/TLS Toolkit, April 2010, .
-
(2010)
-
-
-
34
-
-
0003195066
-
The MD5 Message-Digest Algorithm
-
April
-
R. Rivest, The MD5 Message-Digest Algorithm, RFC 1321, April 1992.
-
(1992)
RFC 1321
-
-
Rivest, R.1
-
35
-
-
84976664565
-
A method for obtaining digital signatures and public-key cryptosystems
-
R.L. Rivest, A. Shamir, and L. Adleman A method for obtaining digital signatures and public-key cryptosystems Communications on ACM 26 1 1983 96 99
-
(1983)
Communications on ACM
, vol.26
, Issue.1
, pp. 96-99
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
36
-
-
33644947393
-
Advanced Encryption Standard (AES) Key Wrap Algorithm
-
September
-
J. Schaad, R. Housley, Advanced Encryption Standard (AES) Key Wrap Algorithm, RFC 3394, September 2002.
-
(2002)
RFC 3394
-
-
Schaad, J.1
Housley, R.2
-
37
-
-
0029720059
-
Waidner, Diffie-Hellman key distribution extended to group communication
-
M. Steiner, G. Tsudik, Waidner, Diffie-Hellman key distribution extended to group communication, in: CCS '96: Proceedings of the Third ACM Conference on Computer and Communications security, 1996, pp. 31-37.
-
(1996)
CCS '96: Proceedings of the Third ACM Conference on Computer and Communications Security
, pp. 31-37
-
-
Steiner, M.1
Tsudik, G.2
-
39
-
-
31844454281
-
Energy-efficient and scalable group key agreement for large ad hoc networks
-
DOI 10.1145/1089803.1089975, PE-WASUN'05 - Proceedings of the Second ACM International Workshop on Performance Evaluation of Wireless Ad Hoc, Sensor, and Ubiquitous Networks
-
J.C.M. Teo, C.H. Tan, Energy-efficient and scalable group key agreement for large ad hoc networks, in: Second ACM International Workshop on Performance Evaluation of Wireless ad hoc, Sensor, and Ubiquitous Networks (PE-WASUN'05), 2005, pp. 114-121. (Pubitemid 43183459)
-
(2005)
PE-WASUN'05 - Proceedings of the Second ACM International Workshop on Performance Evaluation of Wireless Ad Hoc, Sensor, and Ubiquitous Networks
, pp. 114-121
-
-
Teo, J.C.M.1
Tan, C.H.2
-
41
-
-
57849108988
-
A trust model robust to slander attacks in ad hoc networks
-
August
-
P.B. Velloso, R.P. Laufer, O.C.M.B. Duarte, G. Pujolle, A trust model robust to slander attacks in ad hoc networks, in: Worshop in Advanced Networking and Communications (ANC) jointly with ICCCN'2008, August 2008, pp. 1-6.
-
(2008)
Worshop in Advanced Networking and Communications (ANC) Jointly with ICCCN'2008
, pp. 1-6
-
-
Velloso, P.B.1
Laufer, R.P.2
Duarte, O.C.M.B.3
Pujolle, G.4
-
42
-
-
33846981846
-
Local detection of selfish routing behavior in ad hoc networks
-
Los Alamitos, CA, USA
-
B. Wang, S. Soltani, J.K. Shapiro, P.-N. Tan, Local detection of selfish routing behavior in ad hoc networks, in: International Symposium on Parallel Architectures, Algorithms, and Networks, IEEE Computer Society, Los Alamitos, CA, USA, 2005, pp. 392-399.
-
(2005)
International Symposium on Parallel Architectures, Algorithms, and Networks, IEEE Computer Society
, pp. 392-399
-
-
Wang, B.1
Soltani, S.2
Shapiro, J.K.3
Tan, P.-N.4
-
43
-
-
0033357103
-
Securing ad hoc networks
-
DOI 10.1109/65.806983
-
L. Zhou, and Z.J. Haas Securing ad hoc networks IEEE Network 13 6 1999 24 30 (Pubitemid 30526484)
-
(1999)
IEEE Network
, vol.13
, Issue.6
, pp. 24-30
-
-
Zhou, L.1
Haas, Z.J.2
|