-
2
-
-
0033314753
-
An overview of PKI trust models
-
Nov.-Dec.
-
R. Perlman, "An overview of PKI trust models", IEEE Network, p. 38-43, vol. 13, (no. 6) Nov.-Dec. 1999
-
(1999)
IEEE Network
, vol.13
, Issue.6
, pp. 38-43
-
-
Perlman, R.1
-
4
-
-
0034546898
-
Intrusion detection in wireless ad hoc networks
-
Y. Zhang and W. Lee, "Intrusion detection in wireless ad hoc networks, " ACM MOBICOM, 2000
-
(2000)
ACM MOBICOM
-
-
Zhang, Y.1
Lee, W.2
-
5
-
-
0003237987
-
The Kerberos network authentication service (version 5)
-
J. Kohl and B. Neuman, "The Kerberos network authentication service (version 5), " RFC-1510
-
RFC-1510
-
-
Kohl, J.1
Neuman, B.2
-
6
-
-
4143108145
-
Providing robust and ubiquitous security support for MANET
-
J. Kong, P. Zerfos, H. Luo, S. Lu and L. Zhang, "Providing robust and ubiquitous security support for MANET, " IEEE ICNP 2001, 2001.
-
(2001)
IEEE ICNP 2001
-
-
Kong, J.1
Zerfos, P.2
Luo, H.3
Lu, S.4
Zhang, L.5
-
8
-
-
0027617271
-
Increasing availability and security of an authentication service
-
Jun.
-
L. Gong, "Increasing availability and security of an authentication service, " IEEE Journal on Selected Areas in Communications, Vol. 11, No. 5, Jun. 1993
-
(1993)
IEEE Journal on Selected Areas in Communications
, vol.11
, Issue.5
-
-
Gong, L.1
-
10
-
-
0031375570
-
Optimalresilience proactive public-key cryptosystems
-
Y. Frankel, P. Gemmel, P. MacKenzie, M. Yung, "Optimalresilience proactive public-key cryptosystems, " FOCS '97, 1997.
-
(1997)
FOCS '97
-
-
Frankel, Y.1
Gemmel, P.2
Mackenzie, P.3
Yung, M.4
-
14
-
-
84883894284
-
Proactive secret sharing
-
A. Herzberg, S. Jarecki, H. Krawczyk, and M. Yung, "Proactive secret sharing, " Extended abstract, 1995
-
(1995)
Extended Abstract
-
-
Herzberg, A.1
Jarecki, S.2
Krawczyk, H.3
Yung, M.4
-
15
-
-
0030415891
-
Security on the move: Indirect authentication using Kerberos
-
A. Fox and S. Gribble, "Security on the move: Indirect authentication using Kerberos, " ACM MOBICOM, 1996
-
(1996)
ACM MOBICOM
-
-
Fox, A.1
Gribble, S.2
-
16
-
-
0033357103
-
Securing ad hoc networks
-
L. Zhou and Z. J. Haas. "Securing ad hoc networks, " IEEE Networks, 13(6):24-30, 1999
-
(1999)
IEEE Networks
, vol.13
, Issue.6
, pp. 24-30
-
-
Zhou, L.1
Haas, Z.J.2
-
18
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
S. Marti, T. Giuli, K. Lai and M. Baker, "Mitigating routing misbehavior in mobile ad hoc networks, " ACM MOBICOM, 2000
-
(2000)
ACM MOBICOM
-
-
Marti, S.1
Giuli, T.2
Lai, K.3
Baker, M.4
-
20
-
-
0008144151
-
Ubiquitous and robust authentication services for ad hoc wireless networks
-
Technical Report 200030, Oct.
-
H. Luo and S. Lu, "Ubiquitous and robust authentication services for ad hoc wireless networks, " UCLA Computer Science Technical Report 200030, Oct. 2000
-
(2000)
UCLA Computer Science
-
-
Luo, H.1
Lu, S.2
-
21
-
-
4944253148
-
Maintaining authenticated communication in the presence of break-ins
-
R. Canetti, S. Halevi, and A. Herzberg, "Maintaining authenticated communication in the presence of break-ins, " Journal of Cryptology, 13(1):61-105, 2000
-
(2000)
Journal of Cryptology
, vol.13
, Issue.1
, pp. 61-105
-
-
Canetti, R.1
Halevi, S.2
Herzberg, A.3
-
23
-
-
84883897255
-
-
Standard Performance Evaluation Corporation
-
Standard Performance Evaluation Corporation, http://www. specbench. org
-
-
-
|