-
1
-
-
33750285481
-
SybilGuard: Defending against sybil attacks via social networks
-
H. Yu, M. Kaminsky, and A. Flaxman, "SybilGuard: defending against sybil attacks via social networks," in Proc. 2006 SIGCOMM, pp. 267-278.
-
Proc. 2006 SIGCOMM
, pp. 267-278
-
-
Yu, H.1
Kaminsky, M.2
Flaxman, A.3
-
2
-
-
33947656426
-
Secure and efficient key management in mobile ad hoc networks
-
DOI 10.1016/j.jnca.2005.07.008, PII S1084804505000524
-
B. Wu, J. Wu, E. B. Fernandez, and S. Magliveras, "Secure and efficient key management in mobile ad hoc wireless networks," J. Network and Computer Applications, vol. 30, no. 3, pp. 937-954, Aug. 2007. (Pubitemid 46497022)
-
(2007)
Journal of Network and Computer Applications
, vol.30
, Issue.3
, pp. 937-954
-
-
Wu, B.1
Wu, J.2
Fernandez, E.B.3
Ilyas, M.4
Magliveras, S.5
-
3
-
-
79957478695
-
Securing peer-to-peer mobile communications using public key cryptography: New security strategy
-
Feb.
-
S. H. Al-Bakri, M. L. M. Kiah, A. A. Zaidan, B. B. Zaidan, and G. M. Alam, "Securing peer-to-peer mobile communications using public key cryptography: new security strategy," Int'l J. Physical Sciences, vol. 6, no. 4, pp. 930-938, Feb. 2011.
-
(2011)
Int'l J. Physical Sciences
, vol.6
, Issue.4
, pp. 930-938
-
-
Al-Bakri, S.H.1
Kiah, M.L.M.2
Zaidan, A.A.3
Zaidan, B.B.4
Alam, G.M.5
-
4
-
-
79960886232
-
Secure group key management using uni-directional proxy re-encryption schemes
-
Y. R. Chen, J. D. Tygar, and W. G. Tzeng, "Secure group key management using uni-directional proxy re-encryption schemes," in Proc. 2011 IEEE INFOCOM, pp. 1952-1960.
-
Proc. 2011 IEEE INFOCOM
, pp. 1952-1960
-
-
Chen, Y.R.1
Tygar, J.D.2
Tzeng, W.G.3
-
5
-
-
84870982127
-
Security of ad hoc networks and threshold cryptography
-
L. Ertaul and N. Chavan, "Security of ad hoc networks and threshold cryptography," IEEE 2005, pp. 1-6.
-
IEEE 2005
, pp. 1-6
-
-
Ertaul, L.1
Chavan, N.2
-
6
-
-
0242678584
-
Self-organized publickey management for mobile ad hoc networks
-
Mar.
-
S. Capkun, L. Buttyan, and J. P. Hubaux, "Self-organized publickey management for mobile ad hoc networks," IEEE Trans. Mobile Computing, vol. 2, no. 1, pp. 52-64, Mar. 2003.
-
(2003)
IEEE Trans. Mobile Computing
, vol.2
, Issue.1
, pp. 52-64
-
-
Capkun, S.1
Buttyan, L.2
Hubaux, J.P.3
-
7
-
-
32844466166
-
Mobility helps peer-to-peer security
-
DOI 10.1109/TMC.2006.12
-
S. Capkun, J. P. Hubaux, and L. Buttyan, "Mobility helps peer-to-peer security," IEEE Trans. Mobile Computing, vol. 2, no. 1, pp. 43-51 Mar. 2003. (Pubitemid 43251074)
-
(2006)
IEEE Transactions on Mobile Computing
, vol.5
, Issue.1
, pp. 43-51
-
-
Capkun, S.1
Hubaux, J.P.2
Buttyan, L.3
-
8
-
-
78649614864
-
A group trust model based on service similarity evaluation in P2P networks
-
Y. Zhang, H. Zheng, Y. Liu, K. Li, and W. Qu, "A group trust model based on service similarity evaluation in P2P networks," Int'l J. Intell. Syst., vol. 26, no. 2, pp. 47-62, 2011.
-
(2011)
Int'l J. Intell. Syst.
, vol.26
, Issue.2
, pp. 47-62
-
-
Zhang, Y.1
Zheng, H.2
Liu, Y.3
Li, K.4
Qu, W.5
-
9
-
-
0033357103
-
Securing ad hoc networks
-
DOI 10.1109/65.806983
-
L. Zhou and Z. J. Haas, "Securing ad hoc networks," IEEE Network, pp. 24-30, Dec. 1999. (Pubitemid 30526484)
-
(1999)
IEEE Network
, vol.13
, Issue.6
, pp. 24-30
-
-
Zhou, L.1
Haas, Z.J.2
-
10
-
-
77955717620
-
Revisiting WiMAX MBS security
-
G. Kambourakis, E. Konstantinou, and S. Gritzalis, "Revisiting WiMAX MBS security," Computers and Mathematics with Applications, vol. 60, pp. 217-223, 2010.
-
(2010)
Computers and Mathematics with Applications
, vol.60
, pp. 217-223
-
-
Kambourakis, G.1
Konstantinou, E.2
Gritzalis, S.3
-
12
-
-
84886728065
-
A scalable encryption scheme for multi-privileged group communications
-
published online Sep., DOI: 10.1007/s11227-011-0683-4
-
G. Wang, Q. Du, W. Zhou, and Q. Liu, "A scalable encryption scheme for multi-privileged group communications," J. Supercomputing, published online Sep. 2011, DOI: 10.1007/s11227-011-0683-4.
-
(2011)
J. Supercomputing
-
-
Wang, G.1
Du, Q.2
Zhou, W.3
Liu, Q.4
-
14
-
-
8344221947
-
Scalable hierarchical access control in secure group communications
-
Y. Sun and K. J. R. Liu, "Scalable hierarchical access control in secure group communications," in Proc. 2004 IEEE INFOCOM, pp. 1296-1306.
-
Proc. 2004 IEEE INFOCOM
, pp. 1296-1306
-
-
Sun, Y.1
Liu, K.J.R.2
-
15
-
-
0038341106
-
A key-management scheme for distributed sensor networks
-
L. Eschenauer and V. Gligor, "A key-management scheme for distributed sensor networks," in Proc. 2002 ACM CCS,, pp. 41-47.
-
Proc. 2002 ACM CCS
, pp. 41-47
-
-
Eschenauer, L.1
Gligor, V.2
-
16
-
-
3142738238
-
PeerTrust: Supporting reputation based trust for peer-to-peer electronic communities
-
July
-
L. Xiong and L. Liu, "PeerTrust: supporting reputation based trust for peer-to-peer electronic communities," IEEE Trans. Knowledge and Data Engineer., vol. 16, no. 7, pp. 843-857, July 2004.
-
(2004)
IEEE Trans. Knowledge and Data Engineer
, vol.16
, Issue.7
, pp. 843-857
-
-
Xiong, L.1
Liu, L.2
-
17
-
-
33846834126
-
A survery of trust and reputation systems for online service provision
-
A. Josang, R. Ismail, and C. Boyd, "A survery of trust and reputation systems for online service provision," Decision Support Systems, vol. 43, no. 2, pp. 618-644, 2077.
-
(2077)
Decision Support Systems
, vol.43
, Issue.2
, pp. 618-644
-
-
Josang, A.1
Ismail, R.2
Boyd, C.3
-
18
-
-
79957616752
-
Novel key pre-distribution scheme in wireless sensor network
-
T. D. Subash and C. Divya, "Novel key pre-distribution scheme in wireless sensor network," in Proc. 2011 ICETECT, pp. 959-970.
-
Proc. 2011 ICETECT
, pp. 959-970
-
-
Subash, T.D.1
Divya, C.2
-
19
-
-
3042783638
-
A pairwise key predistribution scheme for wireless sensor networks
-
W. Du, J. Deng, Y. S. Han, and P. K. Varshney, "A pairwise key predistribution scheme for wireless sensor networks," in Proc. 2003 ACM Conference on Computer and Communications Security, pp. 42-51.
-
Proc. 2003 ACM Conference on Computer and Communications Security
, pp. 42-51
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Varshney, P.K.4
-
20
-
-
84871004637
-
Framework of decentralized PKI key management based on dynamic trust
-
Z. Xu and H. Jiang, "Framework of decentralized PKI key management based on dynamic trust," in Proc. 2008 IPCV, pp. 1-7.
-
Proc. 2008 IPCV
, pp. 1-7
-
-
Xu, Z.1
Jiang, H.2
-
22
-
-
80053282008
-
A survey on cluster-based group key agreement protocols for WSNs
-
Third Quarter
-
E. Klaoudatou, E. Konstantinou, G. Kambourakis, and S. Gritzalis, "A survey on cluster-based group key agreement protocols for WSNs," IEEE Cmmun. Surveys and Tutorials, vol. 13, no. 3, pp. 429-442, Third Quarter 2011.
-
(2011)
IEEE Cmmun. Surveys and Tutorials
, vol.13
, Issue.3
, pp. 429-442
-
-
Klaoudatou, E.1
Konstantinou, E.2
Kambourakis, G.3
Gritzalis, S.4
-
23
-
-
67650682832
-
Asymmetric group key agreement
-
Springer-Verlag
-
Q. Wu, Y. Mu, W. Susilo, B. Qin, and J. D. Ferrer, "Asymmetric group key agreement," Advances in Cryptology-EUROCRYPT, Lecture Notes in Computer Science (5479), Springer-Verlag, 2009, pp. 153-170.
-
(2009)
Advances in Cryptology-EUROCRYPT, Lecture Notes in Computer Science (5479)
, pp. 153-170
-
-
Wu, Q.1
Mu, Y.2
Susilo, W.3
Qin, B.4
Ferrer, J.D.5
-
24
-
-
77953887822
-
Constructing efficient attribute-based broadcast encryption
-
Z. Zhou and D. Huang, "Constructing efficient attribute-based broadcast encryption," in Proc. 2010 IEEE INFOCOM, pp. 1-2.
-
Proc. 2010 IEEE INFOCOM
, pp. 1-2
-
-
Zhou, Z.1
Huang, D.2
-
25
-
-
0037623983
-
Identity-based encryption from the Weil pairing
-
D. Boneh and M. K. Franklin, "Identity-based encryption from the Weil pairing," SIAM J. Computing, vol. 32, no. 3, pp. 586-615, 2003.
-
(2003)
SIAM J. Computing
, vol.32
, Issue.3
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.K.2
-
26
-
-
34547273527
-
Attribute-based encryption for fine grained access control of encrypted data
-
V. Goyal, A. Pandey, A. Sahai, and B. Waters, "Attribute-based encryption for fine grained access control of encrypted data," in Proc. 2006 ACM Conference on Computer and Communicatioins Security, pp. 89-98.
-
Proc. 2006 ACM Conference on Computer and Communicatioins Security
, pp. 89-98
-
-
Goyal, V.1
Pandey, A.2
Sahai, A.3
Waters, B.4
-
29
-
-
84864182941
-
Reputation and trust-based system for ad-hoc and sensor networks
-
A. Boukerche, editor. Wiley and Sons
-
A. Srinivasan, J. Teitelbaum, H. Liang, J. Wu, and M. Cardei, "Reputation and trust-based system for ad-hoc and sensor networks," in Algorithms and Protocols for Wireless Ad-Hoc and Sensor Networks, A. Boukerche, editor. Wiley and Sons, 2008.
-
(2008)
Algorithms and Protocols for Wireless Ad-Hoc and Sensor Networks
-
-
Srinivasan, A.1
Teitelbaum, J.2
Liang, H.3
Wu, J.4
Cardei, M.5
-
31
-
-
84871008163
-
Study of security issues on traditional and new generation of e-commerce model
-
S. M. R. Farshchi, F. Gharib, R. Ziyaeef, "Study of security issues on traditional and new generation of e-commerce model," in Proc. 2011 IPCSIT (9), pp. 113-117.
-
Proc. 2011 IPCSIT
, Issue.9
, pp. 113-117
-
-
Farshchi, S.M.R.1
Gharib, F.2
Ziyaeef, R.3
-
33
-
-
51249094081
-
A key management protocol for wireless sensor networks with multiple base stations
-
Y. Wang, B. Ramamurthy, and Y. Xue, "A key management protocol for wireless sensor networks with multiple base stations," in Proc. 2008 IEEE ICC, pp. 1625-1629.
-
Proc. 2008 IEEE ICC
, pp. 1625-1629
-
-
Wang, Y.1
Ramamurthy, B.2
Xue, Y.3
-
34
-
-
0033356116
-
Survey of security issues in multicast communications
-
DOI 10.1109/65.806981
-
M. J. Moyer, J. R. Rao, and P. Rohatgi, "A survey of security issues in multicast communications," IEEE Network, vol. 13, no. 6, pp. 12-23, Dec 1999. (Pubitemid 30526485)
-
(1999)
IEEE Network
, vol.13
, Issue.6
, pp. 12-23
-
-
Moyer, M.J.1
Rao, J.R.2
Rohatgi, P.3
-
35
-
-
0034782005
-
Chord: A scalable peer-to-peer lookup service for Internet applications
-
I. Stoica, R. Morris, D. Karger, M. F. Kaashoek, and H. Balarikishnan, "Chord: a scalable peer-to-peer lookup service for Internet applications," in Proc. 2001 ACM SIGCOMM,, pp. 149-160.
-
Proc. 2001 ACM SIGCOMM
, pp. 149-160
-
-
Stoica, I.1
Morris, R.2
Karger, D.3
Kaashoek, M.F.4
Balarikishnan, H.5
-
36
-
-
3543050471
-
Efficient self-healing group key distribution with revocation capability
-
D. Liu, P. Ning, and K. Sun, "Efficient self-healing group key distribution with revocation capability," in Proc. 2003 CCS, pp. 231-240.
-
Proc. 2003 CCS
, pp. 231-240
-
-
Liu, D.1
Ning, P.2
Sun, K.3
-
37
-
-
85028765277
-
-
Springer
-
C. Blundo, A. Santis, A. Herzberg, S. Kutten, U .Vaccaro, and M. Yung, Perfectly-Secure Key Distribution for Dynamic Conferences. Springer, 1998, pp. 471-486.
-
(1998)
Perfectly-Secure Key Distribution for Dynamic Conferences
, pp. 471-486
-
-
Blundo, C.1
Santis, A.2
Herzberg, A.3
Kutten, S.4
Vaccaro, U.5
Yung, M.6
-
38
-
-
79960859750
-
Fully secure pairwise and triple key distribution in wireless sensor networks using combinatorial designs
-
S. Ruj, A. Nayak, and I. Stojmenovic, "Fully secure pairwise and triple key distribution in wireless sensor networks using combinatorial designs," in Proc. 2011 IEEE INFOCOM, pp. 326-330.
-
Proc. 2011 IEEE INFOCOM
, pp. 326-330
-
-
Ruj, S.1
Nayak, A.2
Stojmenovic, I.3
-
39
-
-
77957676311
-
A distributed key management scheme based on SGC-PKC for P2P network
-
H. Jiang, R. Zhang, Y. Jia, and S. Liu, "A distributed key management scheme based on SGC-PKC for P2P network," in Proc. 2010 IEEE Wireless Communications, Networking and Information Security, pp. 491-495.
-
Proc. 2010 IEEE Wireless Communications, Networking and Information Security
, pp. 491-495
-
-
Jiang, H.1
Zhang, R.2
Jia, Y.3
Liu, S.4
-
40
-
-
84870998698
-
Public key infrastructure based on a peer-to-peer network
-
W. Thomas, "Public key infrastructure based on a peer-to-peer network," in Proc. 2005 IEEE System Sciences, pp. 1-10.
-
Proc. 2005 IEEE System Sciences
, pp. 1-10
-
-
Thomas, W.1
|