-
1
-
-
17444426121
-
Ariadne: a secure on-demand routing protocol for ad hoc networks
-
Hu YC, Perrig A, Johnson DB. Ariadne: a secure on-demand routing protocol for ad hoc networks. Wireless Networks 2005; 11(1-2): 21-38.
-
(2005)
Wireless Networks
, vol.11
, Issue.1-2
, pp. 21-38
-
-
Hu, Y.C.1
Perrig, A.2
Johnson, D.B.3
-
2
-
-
84904904836
-
-
A secure routing protocol for ad hoc networks. ICNP, IEEE Computer Society, Proceedings of 10th IEEE International Conference on Network Protocols.
-
Sanzgiri K, Dahill B, Levine BN, Shields C, Belding-Royer EM. A secure routing protocol for ad hoc networks. ICNP, IEEE Computer Society, Proceedings of 10th IEEE International Conference on Network Protocols 2002; 78-89.
-
(2002)
, pp. 78-89
-
-
Sanzgiri, K.1
Dahill, B.2
Levine, B.N.3
Shields, C.4
Belding-Royer, E.M.5
-
4
-
-
34147173361
-
A survey on peer-to-peer key management for mobile ad hoc networks
-
Merwe JVD, Dawoud D, McDonald S. A survey on peer-to-peer key management for mobile ad hoc networks. ACM Computing Surveys 2007; 39(1): 1-45.
-
(2007)
ACM Computing Surveys
, vol.39
, Issue.1
, pp. 1-45
-
-
Merwe, J.V.D.1
Dawoud, D.2
McDonald, S.3
-
5
-
-
34247485399
-
-
A deployment tool for public safety ad-hoc networks. Proceedings of COMSWARE 2006, New Delhi, India
-
Zhao S, Jaskiewicz D, Karvo J. A deployment tool for public safety ad-hoc networks. Proceedings of COMSWARE 2006, New Delhi, India, 2006.
-
(2006)
-
-
Zhao, S.1
Jaskiewicz, D.2
Karvo, J.3
-
6
-
-
84877906755
-
-
Connectivity enhancement in deployable ad-hoc networks with moving nodes. 15th IST Mobile & Wireless Communications Summit, Myconos, Greece
-
Zhao S, Karvo J, Koskinen H. Connectivity enhancement in deployable ad-hoc networks with moving nodes. 15th IST Mobile & Wireless Communications Summit, Myconos, Greece, 2006.
-
(2006)
-
-
Zhao, S.1
Karvo, J.2
Koskinen, H.3
-
7
-
-
37149015186
-
-
A smart card based distributed identity management infrastructure for mobile ad hoc networks. Proceedings of WISTP, Lecture Notes in Computer Science, Vol. 4462, Springer
-
Atallah E, Chaumette S. A smart card based distributed identity management infrastructure for mobile ad hoc networks. Proceedings of WISTP, Lecture Notes in Computer Science, Vol. 4462, Springer, 2007; 1-13.
-
(2007)
, pp. 1-13
-
-
Atallah, E.1
Chaumette, S.2
-
8
-
-
1642464769
-
-
On-demand secure routing protocol for ad hoc network using id based cryptosystem. Proceedings of 4th ICPDCAT, IEEE
-
Lee YH, Kim H, Chung B, Lee J, Yoon H. On-demand secure routing protocol for ad hoc network using id based cryptosystem. Proceedings of 4th ICPDCAT, IEEE, 2003; 211-215.
-
(2003)
, pp. 211-215
-
-
Lee, Y.H.1
Kim, H.2
Chung, B.3
Lee, J.4
Yoon, H.5
-
9
-
-
24144443813
-
-
LSRP: a lightweight secure routing protocol with low cost for ad-hoc networks. Proceedings of International Conference on Convergence in Broadband and Mobile Networking, LNCS, Vol. 3391, Springer
-
Park BN, Myung J, Lee W. LSRP: a lightweight secure routing protocol with low cost for ad-hoc networks. Proceedings of International Conference on Convergence in Broadband and Mobile Networking, LNCS, Vol. 3391, Springer, 2005; 160-169.
-
(2005)
, pp. 160-169
-
-
Park, B.N.1
Myung, J.2
Lee, W.3
-
10
-
-
33744972272
-
-
Security enhancement in ad hoc network with id-based cryptosystem. Proceedings of the 7th International Conference on Advanced Communication Technology, IEEE Computer Society Press
-
Song J, Kim H, Lee S, Yoon H. Security enhancement in ad hoc network with id-based cryptosystem. Proceedings of the 7th International Conference on Advanced Communication Technology, IEEE Computer Society Press, 2005.
-
(2005)
-
-
Song, J.1
Kim, H.2
Lee, S.3
Yoon, H.4
-
11
-
-
25844478002
-
ISMANET: a secure routing protocol using identity-based signcryption scheme for mobile ad-hoc networks
-
Park BN, Lee W. ISMANET: a secure routing protocol using identity-based signcryption scheme for mobile ad-hoc networks. IEICE Transactions on Communications 2005; .
-
(2005)
IEICE Transactions on Communications
-
-
Park, B.N.1
Lee, W.2
-
12
-
-
35048904149
-
-
Optimizing authentication mechanisms using ID-based cryptography in ad hoc wireless mobile networks. Proceedings of International Conference on Information Networking, Networking Technologies for Broadband and Mobile Networks, LNCS, Vol. 3090, Springer
-
Lee W, Sriborrirux W. Optimizing authentication mechanisms using ID-based cryptography in ad hoc wireless mobile networks. Proceedings of International Conference on Information Networking, Networking Technologies for Broadband and Mobile Networks, LNCS, Vol. 3090, Springer, 2004; 925-934.
-
(2004)
, pp. 925-934
-
-
Lee, W.1
Sriborrirux, W.2
-
13
-
-
7744232568
-
TIDS: threshold and identity-based security scheme for wireless ad hoc networks
-
Deng H, Agrawal DP. TIDS: threshold and identity-based security scheme for wireless ad hoc networks. Ad Hoc Networks 2004; 2(3): 291-307.
-
(2004)
Ad Hoc Networks
, vol.2
, Issue.3
, pp. 291-307
-
-
Deng, H.1
Agrawal, D.P.2
-
14
-
-
3042546547
-
-
Threshold and identity-based key management and authentication for wireless ad hoc networks. ITCC (1), IEEE Computer Society
-
Deng H, Mukherjee A, Agrawal DP. Threshold and identity-based key management and authentication for wireless ad hoc networks. ITCC (1), IEEE Computer Society, 2004; 107-111.
-
(2004)
, pp. 107-111
-
-
Deng, H.1
Mukherjee, A.2
Agrawal, D.P.3
-
16
-
-
0033357103
-
Securing ad hoc networks
-
Zhou L, Haas ZJ. Securing ad hoc networks. IEEE Network 1999; 13(6): 24-30.
-
(1999)
IEEE Network
, vol.13
, Issue.6
, pp. 24-30
-
-
Zhou, L.1
Haas, Z.J.2
-
17
-
-
84877892572
-
-
Secure extension to the olsr protocol. Proceedings of OLSR Interop and Workshop
-
Hafslund A, Tonnesen A, Andersson J, Rotvik RB, Kure O. Secure extension to the olsr protocol. Proceedings of OLSR Interop and Workshop, 2004.
-
(2004)
-
-
Hafslund, A.1
Tonnesen, A.2
Andersson, J.3
Rotvik, R.B.4
Kure, O.5
-
18
-
-
33744502133
-
-
Secure OLSR. Proceedings of the 19th International Conference on Advanced Information Networking and Applications
-
Hong F, Hong L, Fu C. Secure OLSR. Proceedings of the 19th International Conference on Advanced Information Networking and Applications, 2005.
-
(2005)
-
-
Hong, F.1
Hong, L.2
Fu, C.3
-
19
-
-
84877895609
-
-
Attacks against OLSR: distributed key management for security. Proceedings of OLSR Interop and Workshop
-
Adjih C, Raffo D, Muhlethaler P. Attacks against OLSR: distributed key management for security. Proceedings of OLSR Interop and Workshop, 2005.
-
(2005)
-
-
Adjih, C.1
Raffo, D.2
Muhlethaler, P.3
-
20
-
-
85163569142
-
-
Bootstrapping security associations for routing in mobile ad-hoc networks. IEEE Global Telecommunications Conference 2003, IEEE Computer Society Press
-
Bobba R, Eschenauer L, Gligor V, Arbaugh W. Bootstrapping security associations for routing in mobile ad-hoc networks. IEEE Global Telecommunications Conference 2003, IEEE Computer Society Press, 2003.
-
(2003)
-
-
Bobba, R.1
Eschenauer, L.2
Gligor, V.3
Arbaugh, W.4
-
21
-
-
56349109552
-
Distributed and secure bootstrapping of mobile ad hoc networks: framework and constructions
-
Xu S, Čapkun S. Distributed and secure bootstrapping of mobile ad hoc networks: framework and constructions. ACM Transactions on Information and System Security 2008; 12(1): 1-37. doi: http://doi.acm.org/10.1145/1410234.1410236
-
(2008)
ACM Transactions on Information and System Security
, vol.12
, Issue.1
, pp. 1-37
-
-
Xu, S.1
Čapkun, S.2
-
22
-
-
84943807207
-
-
Toward secure key distribution in truly ad-hoc networks. SAINT Workshops, IEEE Computer Society
-
Khalili A, Katz J, Arbaugh WA. Toward secure key distribution in truly ad-hoc networks. SAINT Workshops, IEEE Computer Society, 2003; 342-346.
-
(2003)
, pp. 342-346
-
-
Khalili, A.1
Katz, J.2
Arbaugh, W.A.3
-
23
-
-
84877919517
-
-
Identity based authenticated key agreement protocols from pairings. Technical Report HPL-2003-25, Hewlett Packard Laboratories Feb 12 .
-
Chen L, Kudla C. Identity based authenticated key agreement protocols from pairings. Technical Report HPL-2003-25, Hewlett Packard Laboratories Feb 12 2003.
-
(2003)
-
-
Chen, L.1
Kudla, C.2
-
24
-
-
84877896045
-
-
ID-based signatures from pairings on elliptic curves. Report 2002/004, Cryptology ePrint Archive January .
-
Paterson KG. ID-based signatures from pairings on elliptic curves. Report 2002/004, Cryptology ePrint Archive January 2002.
-
(2002)
-
-
Paterson, K.G.1
-
25
-
-
35248867510
-
-
Efficient identity based signature schemes based on pairings. SAC: Annual International Workshop on Selected Areas in Cryptography, Vol. 2595, LNCS
-
Hess F. Efficient identity based signature schemes based on pairings. SAC: Annual International Workshop on Selected Areas in Cryptography, Vol. 2595, LNCS, 2003.
-
(2003)
-
-
Hess, F.1
-
26
-
-
84877885791
-
-
Gentry. Certificate-based encryption and the certificate revocation problem. EUROCRYPT: Advances in Cryptology: Proceedings of EUROCRYPT
-
Gentry. Certificate-based encryption and the certificate revocation problem. EUROCRYPT: Advances in Cryptology: Proceedings of EUROCRYPT, 2003.
-
(2003)
-
-
-
27
-
-
84877896621
-
-
Secure Key Issuing in ID-based Cryptography, Conferences in Research and Practice in Information Technology, Vol. 32. ACS
-
Lee B, Boyd C, Dawson E, Kim K, Yang J, Yoo S. Secure Key Issuing in ID-based Cryptography, Conferences in Research and Practice in Information Technology, Vol. 32. ACS, 2004.
-
(2004)
-
-
Lee, B.1
Boyd, C.2
Dawson, E.3
Kim, K.4
Yang, J.5
Yoo, S.6
-
28
-
-
0242696170
-
-
ANODR: ANonymous On Demand Routing with Untraceable Routes for Mobile Ad-hoc Networks. ACM MOBIHOC'03
-
Kong J, Hong X. ANODR: ANonymous On Demand Routing with Untraceable Routes for Mobile Ad-hoc Networks. ACM MOBIHOC'03, 2003; 291-302.
-
(2003)
, pp. 291-302
-
-
Kong, J.1
Hong, X.2
-
29
-
-
25844443821
-
-
Anonymous communications in mobile ad hoc networks. INFOCOM, IEEE
-
Zhang Y, Liu W, Lou W. Anonymous communications in mobile ad hoc networks. INFOCOM, IEEE, 2005; 1940-1951.
-
(2005)
, pp. 1940-1951
-
-
Zhang, Y.1
Liu, W.2
Lou, W.3
-
30
-
-
84874324906
-
-
Identity-based encryption from the weil pairing. Proceedings of Crypto 2001, Lecture Notes in Computer Science, Vol. 2139, Springer
-
Boneh F. Identity-based encryption from the weil pairing. Proceedings of Crypto 2001, Lecture Notes in Computer Science, Vol. 2139, Springer, 2001; 213-219.
-
(2001)
, pp. 213-219
-
-
Boneh, F.1
-
31
-
-
33749603013
-
-
Key revocation for identity-based schemes in mobile ad hoc networks. ADHOC-NOW, Lecture Notes in Computer Science, Vol. 4104, Kunz T, Ravi SS (eds). Springer
-
Hoeper K, Gong G. Key revocation for identity-based schemes in mobile ad hoc networks. ADHOC-NOW, Lecture Notes in Computer Science, Vol. 4104, Kunz T, Ravi SS (eds). Springer, 2006; 224-237.
-
(2006)
, pp. 224-237
-
-
Hoeper, K.1
Gong, G.2
-
32
-
-
34548839108
-
Improved id-based security framework for ad-hoc network
-
Chien H, Lin R. Improved id-based security framework for ad-hoc network. Ad Hoc Networks 2008; 6: 47-60.
-
(2008)
Ad Hoc Networks
, vol.6
, pp. 47-60
-
-
Chien, H.1
Lin, R.2
-
33
-
-
84877881033
-
-
Authenticated identity-based encryption. Cryptology ePrint Archive, Report 2002/072 11 July .
-
Lynn B. Authenticated identity-based encryption. Cryptology ePrint Archive, Report 2002/072 11 July 2002.
-
(2002)
-
-
Lynn, B.1
-
34
-
-
84877898906
-
-
Multipurpose identity-based signcryption: a swiss army knife for identity-based cryptography. CRYPTO: Proceedings of Crypto
-
Boyen X. Multipurpose identity-based signcryption: a swiss army knife for identity-based cryptography. CRYPTO: Proceedings of Crypto, 2003.
-
(2003)
-
-
Boyen, X.1
-
35
-
-
51649122765
-
-
A secure routing protocol in proactive security approach for mobile ad-hoc networks. Wireless Communications and Networking Conference, IEEE
-
Zhao S, Aggarwal A, Liu S, Wu H. A secure routing protocol in proactive security approach for mobile ad-hoc networks. Wireless Communications and Networking Conference, IEEE, 2008; 2627-2632.
-
(2008)
, pp. 2627-2632
-
-
Zhao, S.1
Aggarwal, A.2
Liu, S.3
Wu, H.4
-
36
-
-
84877879895
-
-
RFC3626-Optimized Link State Routing Protocol (OLSR) .
-
Clausen T, Jacquet P. RFC3626-Optimized Link State Routing Protocol (OLSR) 2003.
-
(2003)
-
-
Clausen, T.1
Jacquet, P.2
-
37
-
-
84877913704
-
-
Identity-based key exchange protocols for ad hoc networks. Proceedings of Canadian Workshop on Information Theory
-
Hoeper K, Gong G. Identity-based key exchange protocols for ad hoc networks. Proceedings of Canadian Workshop on Information Theory, 2005.
-
(2005)
-
-
Hoeper, K.1
Gong, G.2
-
38
-
-
84877890860
-
-
The design of Rijndael: AES-the Advanced Encryption Standard. Springer
-
Daemen J, Rijmen V. The design of Rijndael: AES-the Advanced Encryption Standard. Springer, 2002.
-
(2002)
-
-
Daemen, J.1
Rijmen, V.2
|