-
1
-
-
0035363950
-
Spontaneous networking: An application-oriented approach to ad hoc networking
-
DOI 10.1109/35.925687
-
L.M. Feeney, B. Ahlgren, and A. Westerlund, "Spontaneous Networking: An Application-Oriented Approach to Ad-hoc Networking," IEEE Comm. Magazine, vol. 39, no. 6, pp. 176-181, June 2001. (Pubitemid 32583325)
-
(2001)
IEEE Communications Magazine
, vol.39
, Issue.6
, pp. 176-181
-
-
Feeney, L.M.1
Ahlgren, B.2
Westerlund, A.3
-
2
-
-
84863073593
-
User-oriented and service-oriented spontaneous ad hoc and sensor wireless networks
-
J. Lloret, L. Shu, R. Lacuesta, and M. Chen, "User-Oriented and Service-Oriented Spontaneous Ad Hoc and Sensor Wireless Networks," Ad Hoc and Sensor Wireless Networks, vol. 14, nos. 1/ 2, pp. 1-8, 2012.
-
(2012)
Ad Hoc and Sensor Wireless Networks
, vol.14
, Issue.1-2
, pp. 1-8
-
-
Lloret, J.1
Shu, L.2
Lacuesta, R.3
Chen, M.4
-
3
-
-
77955290890
-
Overview of spontaneous networking - Evolving concepts and technologies
-
S. Preuß and C.H. Cap, "Overview of Spontaneous Networking - Evolving Concepts and Technologies," Rostocker Informatik- Berichte, vol. 24, pp. 113-123, 2000.
-
(2000)
Rostocker Informatik- Berichte
, vol.24
, pp. 113-123
-
-
Preuß, S.1
Cap, C.H.2
-
4
-
-
77955283021
-
A Spontaneous Ad-Hoc network to share WWW access
-
article 18
-
R. Lacuesta, J. Lloret, M. Garcia, and L. Pen? alver, "A Spontaneous Ad-Hoc Network to Share WWW Access," EURASIP J. Wireless Comm. and Networking, vol. 2010, article 18, 2010.
-
(2010)
EURASIP J. Wireless Comm. and Networking
, vol.2010
-
-
Lacuesta, R.1
Lloret, J.2
Garcia, M.3
Pen Alver, L.4
-
5
-
-
34548038583
-
A survey of key management schemes in wireless sensor networks
-
DOI 10.1016/j.comcom.2007.04.009, PII S0140366407001752
-
Y. Xiao, V.K. Rayi, B. Sun, X. Du, F. Hu, and M. Galloway, "A Survey of Key Management Schemes in Wireless Sensor Networks," Computer Comm., vol. 30, nos. 11/12, pp. 2314-2341, Sept. 2007. (Pubitemid 47285291)
-
(2007)
Computer Communications
, vol.30
, Issue.11-12
, pp. 2314-2341
-
-
Xiao, Y.1
Rayi, V.K.2
Sun, B.3
Du, X.4
Hu, F.5
Galloway, M.6
-
6
-
-
66649108365
-
Securing wireless sensor networks with public key techniques
-
V. Kumar and M.L. Das, "Securing Wireless Sensor Networks with Public Key Techniques," Ad Hoc and Sensor Wireless Networks, vol. 5, nos. 3/4, pp. 189-201, 2008.
-
(2008)
Ad Hoc and Sensor Wireless Networks
, vol.5
, Issue.3-4
, pp. 189-201
-
-
Kumar, V.1
Das, M.L.2
-
7
-
-
33745197327
-
LHAP: A lightweight network access control protocol for ad hoc networks
-
DOI 10.1016/j.adhoc.2005.06.002, PII S1570870505000387
-
S. Zhu, S. Xu, S. Setia, and S. Jajodia, "LHAP: A Lightweight Hopby- Hop Authentication Protocol For Ad-Hoc Networks," Ad Hoc Networks J., vol. 4, no. 5, pp. 567-585, Sept. 2006. (Pubitemid 43913099)
-
(2006)
Ad Hoc Networks
, vol.4
, Issue.5
, pp. 567-585
-
-
Zhu, S.1
Xu, S.2
Setia, S.3
Jajodia, S.4
-
8
-
-
78751520891
-
Dynamic threshold cryptosystem without group manager
-
Oct.
-
A. Noack and S. Spitz, "Dynamic Threshold Cryptosystem without Group Manager," Network Protocols and Algorithms, vol. 1, no. 1, Oct. 2009.
-
(2009)
Network Protocols and Algorithms
, vol.1
, Issue.1
-
-
Noack, A.1
Spitz, S.2
-
9
-
-
78651427233
-
Key pre-distribution scheme with node revocation for wireless sensor networks
-
J. Yan, J. Ma, F. Li, and S.J. Moon, "Key Pre-distribution Scheme with Node Revocation for Wireless Sensor Networks," Ad Hoc and Sensor Wireless Networks, vol. 10, nos. 2/3, pp. 235-251, 2010.
-
(2010)
Ad Hoc and Sensor Wireless Networks
, vol.10
, Issue.2-3
, pp. 235-251
-
-
Yan, J.1
Ma, J.2
Li, F.3
Moon, S.J.4
-
10
-
-
79960583916
-
Security aspects in mobile Ad Hoc network (MANETs): Technical review
-
Dec.
-
M. Mukesh and K.R. Rishi, "Security Aspects in Mobile Ad Hoc Network (MANETs): Technical Review," Int'l J. Computer Applications, vol. 12, no. 2, pp. 37-43, Dec. 2010.
-
(2010)
Int'l J. Computer Applications
, vol.12
, Issue.2
, pp. 37-43
-
-
Mukesh, M.1
Rishi, K.R.2
-
11
-
-
84874848444
-
Impact of security attacks on a new security protocol for mobile ad hoc networks
-
K. Sahadevaiah and P.V.G.D. Prasad Reddy, "Impact of Security Attacks on a New Security Protocol for Mobile Ad Hoc Networks," Network Protocols and Algorithms, vol 3, no. 4, pp. 122-140, 2011.
-
(2011)
Network Protocols and Algorithms
, vol.3
, Issue.4
, pp. 122-140
-
-
Sahadevaiah, K.1
Prasad Reddy, P.V.G.D.2
-
15
-
-
3142734903
-
A communication architecture for spontaneous systems
-
June
-
J. Latvakoski, D. Pakkala, and P. Paakkonen, "A Communication Architecture for Spontaneous Systems," IEEE Wireless Comm., vol. 11, no. 3, pp. 36-42, June 2004.
-
(2004)
EE Wireless Comm.
, vol.11
, Issue.3
, pp. 36-42
-
-
Latvakoski, J.1
Pakkala, D.2
Paakkonen, P.3
-
16
-
-
84863038265
-
Adaptive service discovery on service-oriented and spontaneous sensor systems
-
L. Liu, J. Xu, N. Antonopoulos, J. Li, and K. Wu, "Adaptive Service Discovery on Service-Oriented and Spontaneous Sensor Systems," Ad Hoc and Sensor Wireless Networks, vol. 14, nos. 1/2, pp. 107-132, 2012.
-
(2012)
Ad Hoc and Sensor Wireless Networks
, vol.14
, Issue.1-2
, pp. 107-132
-
-
Liu, L.1
Xu, J.2
Antonopoulos, N.3
Li, J.4
Wu, K.5
-
17
-
-
27644545114
-
Rapid and energy efficient neighbor discovery for spontaneous networks
-
t.
-
S. Gallo, L. Galluccio, G. Morabito, and S. Palazzo, "Rapid and Energy Efficient Neighbor Discovery for Spontaneous Networks," Proc. Seventh ACM Int'l Symp. Modeling, Analysis and Simulation of Wireless and Mobile Systems, Oct. 2004.
-
(2004)
Proc. Seventh ACM Int'l Symp. Modeling, Analysis and Simulation of Wireless and Mobile Systems
-
-
Gallo, S.1
Galluccio, L.2
Morabito, G.3
Palazzo, S.4
-
19
-
-
13244292351
-
Lilith: An interconnection architecture based on label switching for spontaneous edge networks
-
Aug.
-
V. Untz, M. Heusse, F. Rousseau, and A. Duda, "Lilith: an Interconnection Architecture Based on Label Switching for Spontaneous Edge Networks," Proc. First Ann. Int'l Conf. Mobile and Ubiquitous Systems: Networking and Services (Mobiquitous '04), Aug. 2004.
-
(2004)
Proc. First Ann. Int'l Conf. Mobile and Ubiquitous Systems: Networking and Services (Mobiquitous '04)
-
-
Untz, V.1
Heusse, M.2
Rousseau, F.3
Duda, A.4
-
20
-
-
84958214660
-
Spontnet: Experiences in configuring and securing small Ad Hoc networks
-
Oct.
-
L.M. Feeney, B. Ahlgren, A. Westerlund, and A. Dunkels, "Spontnet: Experiences in Configuring and Securing Small Ad Hoc Networks," Proc. Fifth Int'l Workshop Network Appliances, Oct. 2002.
-
(2002)
Proc. Fifth Int'l Workshop Network Appliances
-
-
Feeney, L.M.1
Ahlgren, B.2
Westerlund, A.3
Dunkels, A.4
-
21
-
-
24944463724
-
Implementation of a cellular framework for spontaneous network establishment
-
Mar.
-
M. Danzeisen, T. Braun, S. Winiker, D. Rodellar, "Implementation of a Cellular Framework for Spontaneous Network Establishment," Proc. IEEE Wireless Comm. and Networking Conf. (WCNC '05), Mar. 2005.
-
(2005)
Proc. IEEE Wireless Comm. and Networking Conf. (WCNC '05)
-
-
Danzeisen, M.1
Braun, T.2
Winiker, S.3
Rodellar, D.4
-
22
-
-
32244434861
-
SyncTap: Synchronous user operation for spontaneous network connection
-
May
-
J. Rekimoto, "SyncTap: Synchronous User Operation for Spontaneous Network Connection," Personal and Ubiquitous Computing, vol. 8, no. 2, pp. 126-134, May 2004.
-
(2004)
Personal and Ubiquitous Computing
, vol.8
, Issue.2
, pp. 126-134
-
-
Rekimoto, J.1
-
23
-
-
57349110591
-
Anonysense: Privacy-aware people-centric sensing
-
June
-
C. Cornelius, A. Kapadia, D. Kotz, D. Peebles, M. Shin, and N. Triandopoulos, "Anonysense: Privacy-Aware People-Centric Sensing," Proc. Sixth Int'l Conf. Mobile Systems, Applications, and Services (MobiSys '08), pp. 17-20, June 2008.
-
(2008)
Proc. Sixth Int'l Conf. Mobile Systems, Applications, and Services (MobiSys '08)
, pp. 17-20
-
-
Cornelius, C.1
Kapadia, A.2
Kotz, D.3
Peebles, D.4
Shin, M.5
Triandopoulos, N.6
-
24
-
-
79251595458
-
Two secure and energy-saving spontaneous ad-hoc protocol for wireless mesh client networks
-
Mar.
-
R. Lacuesta, J. Lloret, M. Garcia, and L. Penalver, "Two Secure and Energy-Saving Spontaneous Ad-Hoc Protocol for Wireless Mesh Client Networks," J. Network and Computer Applications, vol. 34, no. 2, pp. 492-505, Mar. 2011.
-
(2011)
J. Network and Computer Applications
, vol.34
, Issue.2
, pp. 492-505
-
-
Lacuesta, R.1
Lloret, J.2
Garcia, M.3
Penalver, L.4
-
25
-
-
77955229114
-
An identity-based security system for user privacy in vehicular ad hoc networks
-
Set
-
J. Sun, C. Zhang, Y. Zhang, and Y. (Michael) Fang, "An Identity- Based Security System for User Privacy in Vehicular Ad Hoc Networks," IEEE Trans. Parallel and Distributed Systems, vol. 21, no. 9, pp. 1227-1239, Sept. 2010.
-
(2010)
IEEE Trans. Parallel and Distributed Systems
, vol.21
, Issue.9
, pp. 1227-1239
-
-
Sun, J.1
Zhang, C.2
Zhang, Y.3
Fang, Y.M.4
-
26
-
-
84874832470
-
-
FIPS 180-1 - Secure Hash Standard SHA-1, Feb.
-
FIPS 180-1 - Secure Hash Standard, SHA-1, "National Institute of Standards and Technology," http://www.itl.nist.gov/fipspubs/fip180-1.htm, Feb. 27, 2012.
-
(2012)
National Institute of Standards and Technology
, vol.27
-
-
-
27
-
-
33646581008
-
Energy analysis for public-key cryptography for wireless sensor networks
-
Mar.
-
A. Wander, N. Gura, H. Eberle, V. Gupta, and S. Chang, "Energy Analysis for Public-Key Cryptography for Wireless Sensor Networks," Proc. IEEE Third Int'l Conf. Pervasive Computing and Comm. (PerCom '05), pp. 8-12, Mar. 2005.
-
(2005)
Proc. IEEE Third Int'l Conf. Pervasive Computing and Comm. (PerCom '05)
, pp. 8-12
-
-
Wander, A.1
Gura, N.2
Eberle, H.3
Gupta, V.4
Chang, S.5
-
28
-
-
1542269608
-
Analyzing the energy consumption of security protocols
-
N.R. Potlapally, S. Ravi, A. Raghunathan, and N.K. Jha, "Analyzing the Energy Consumption of Security Protocols," Proc. Int'l Symp. Low Power Electronics and Design (ISLPED '03), 2003.
-
(2003)
Proc. Int'l Symp. Low Power Electronics and Design (ISLPED '03)
-
-
Potlapally, N.R.1
Ravi, S.2
Raghunathan, A.3
Jha, N.K.4
-
29
-
-
68549107605
-
An energy efficient reconfigurable public-key cryptography processor architecture
-
Cryptographic Hardware and Embedded Systems - CHES 2000 Second International Workshop Worcester, MA, USA, August 17-18, 2000 Proceedings
-
J. Goodman and A. Chandrakasan, "An Energy Efficient Reconfigurable Public-Key Cryptography Processor Architecture," Proc. Int'l Workshop Cryptographic Hardware and Embedded Systems (CHES '00), pp. 175-190, 2000. (Pubitemid 33213966)
-
(2000)
Lecture Notes in Computer Science
, Issue.1965
, pp. 175-190
-
-
Goodman, J.1
Chandrakasan, A.2
-
30
-
-
1442350122
-
Communications security for the twenty-first century: The advanced encryption standard
-
Apr
-
S. Landau, "Communications Security for the Twenty-First Century: The Advanced Encryption Standard," Notices of the Am. Math. Soc., vol. 47, no. 4, pp 450-459, Apr. 2000.
-
(2000)
Notices of the Am. Math. Soc.
, vol.47
, Issue.4
, pp. 450-459
-
-
Landau, S.1
-
32
-
-
18944395197
-
Securing passive objects in mobile ad-hoc peer-to-peer networks
-
Aug
-
R. Mayrhofer, F. Ortner, A. Ferscha, and M. Hechinger, "Securing Passive Objects in Mobile Ad-Hoc Peer-to-Peer Networks," Electronic Notes in Theoretical Computer Science, vol. 85, no. 3, pp. 105-121, Aug. 2003.
-
(2003)
Electronic Notes in Theoretical Computer Science
, vol.85
, Issue.3
, pp. 105-121
-
-
Mayrhofer, R.1
Ortner, F.2
Ferscha, A.3
Hechinger, M.4
-
33
-
-
85094635733
-
An architecture for a secure service discovery service
-
Aug.
-
S.E. Czerwinski, B.Y. Zhao, T.D. Hodes, A.D. Joseph, and R.H. Katz, "An Architecture for a Secure Service Discovery Service," Proc. ACM/IEEE MobiCom '99, Aug. 1999.
-
(1999)
Proc. ACM/IEEE MobiCom '99
-
-
Czerwinski, S.E.1
Zhao, B.Y.2
Hodes, T.D.3
Joseph, A.D.4
Katz, R.H.5
-
34
-
-
84863038265
-
Adaptive service discovery on service-oriented and spontaneous sensor systems
-
L. Liu, J. Xu, N. Antonopoulos, J. Li, and K. Wu, "Adaptive Service Discovery on Service-Oriented and Spontaneous Sensor Systems," Adhoc and Sensor Wireless Networks, vol. 14, nos. 1/2, pp. 107-132, 2012.
-
(2012)
Adhoc and Sensor Wireless Networks
, vol.14
, Issue.1-2
, pp. 107-132
-
-
Liu, L.1
Xu, J.2
Antonopoulos, N.3
Li, J.4
Wu, K.5
-
35
-
-
0242678584
-
Self-organized public-key management for mobile ad hoc networks
-
Jan.-Mar
-
S. Capkun, L. Buttyan, and J.-P. Hubaux, "Self-Organized Public- Key Management for Mobile Ad Hoc Networks," IEEE Trans. Mobile Computing, vol. 2, no. 1, pp. 52-64, Jan.-Mar. 2003.
-
(2003)
IEEE Trans. Mobile Computing
, vol.2
, Issue.1
, pp. 52-64
-
-
Capkun, S.1
Buttyan, L.2
Hubaux, J.-P.3
-
39
-
-
84874826489
-
-
Feb.
-
Netbeans website, at: http://netbeans.org/, Feb. 2012.
-
(2012)
Netbeans Website
-
-
|