메뉴 건너뛰기




Volumn , Issue , 2006, Pages 1-247

Security for Wireless Ad Hoc Networks

Author keywords

[No Author keywords available]

Indexed keywords


EID: 84889307591     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.1002/9780470118474     Document Type: Book
Times cited : (95)

References (210)
  • 1
    • 84947251443 scopus 로고    scopus 로고
    • The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks
    • Cambridge, Springer, Berlin
    • F. Stajano and R. Anderson, "The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks," in Proceedings of 7th International Workshop on Security Protocols, Cambridge. Picture Notes in Computer Science, Vol. 1796, Springer, Berlin 1999, pp. 172-194.
    • (1999) Proceedings of 7th International Workshop on Security Protocols , vol.1796 , pp. 172-194
    • Stajano, F.1    Anderson, R.2
  • 2
    • 84947273682 scopus 로고    scopus 로고
    • The Sybil Attack
    • March, Cambridge, MA
    • J. Douceur, "The Sybil Attack," in Proceedings of IPTPS 2002, March 2002, Cambridge, MA, pp. 251-260.
    • (2002) Proceedings of IPTPS 2002 , pp. 251-260
    • Douceur, J.1
  • 3
    • 84889391669 scopus 로고    scopus 로고
    • Generic Threats to Routing Protocols
    • draft-ietf-rpsec-routing-threats-07, October
    • A. Sabir, S. Murphy, and Y. Yang, "Generic Threats to Routing Protocols," draft-ietf-rpsec-routing-threats-07, October 2004.
    • (2004)
    • Sabir, A.1    Murphy, S.2    Yang, Y.3
  • 4
    • 4544342574 scopus 로고    scopus 로고
    • A Specification-Based Intrusion Detection System For AODV
    • in Workshop on Security in Ad Hoc and Sensor Networks (SASN)'03
    • C.-Y. Tseng, P. Balasubramanyam, C. Ko, R. Limprasittiporn, J. Rowe, and K. Levitt, "A Specification-Based Intrusion Detection System For AODV," in Workshop on Security in Ad Hoc and Sensor Networks (SASN)'03.
    • Tseng, C.-Y.1    Balasubramanyam, P.2    Ko, C.3    Limprasittiporn, R.4    Rowe, J.5    Levitt, K.6
  • 6
    • 84903836776 scopus 로고    scopus 로고
    • How to Misuse AODV: a Case Study of Insider Attacks against Mobile Ad-hoc Routing Protocols
    • United States Military Academy, West Point, NY, June
    • P. Ning and K. Sun, "How to Misuse AODV: a Case Study of Insider Attacks against Mobile Ad-hoc Routing Protocols," in Proceedings of the 2003 IEEE Workshop on Information Assurance. United States Military Academy, West Point, NY, June 2003.
    • (2003) Proceedings of the 2003 IEEE Workshop on Information Assurance
    • Ning, P.1    Sun, K.2
  • 7
    • 84944878354 scopus 로고    scopus 로고
    • Handbook of Applied Cryptography
    • CRC Press, October
    • A. J. Menezes, P. C. van Oorschot, and S. A. Vanstone, Handbook of Applied Cryptography, CRC Press, October 1996.
    • (1996)
    • Menezes, A.J.1    Van Oorschot, P.C.2    Vanstone, S.A.3
  • 8
    • 0004104571 scopus 로고    scopus 로고
    • Unsafe at any Key Size; an Analysis of the WEP Encapsulation
    • IEEE P802.11, Wireless LANs, October
    • J. Walker, "Unsafe at any Key Size; an Analysis of the WEP Encapsulation," IEEE P802.11, Wireless LANs, October 2000.
    • (2000)
    • Walker, J.1
  • 9
    • 33745165448 scopus 로고    scopus 로고
    • Finding Collisions in the Full SHA-1
    • CRYPTO
    • X. Wang, Y. L. Yin, and H. Yu, "Finding Collisions in the Full SHA-1", CRYPTO, 2005.
    • (2005)
    • Wang, X.1    Yin, Y.L.2    Yu, H.3
  • 12
    • 0004115841 scopus 로고    scopus 로고
    • The Internet Key Exchange (IKE)
    • RFC 2409, November
    • D. Harkins and D. Carrel, "The Internet Key Exchange (IKE)," RFC 2409, November 1998; www.ietf.org/rfc/rfc2409.txt?number1/42409.
    • (1998)
    • Harkins, D.1    Carrel, D.2
  • 14
    • 8344262333 scopus 로고    scopus 로고
    • A Key Management Scheme for Wireless Sensor Networks using Deployment Knowledge
    • W. Du, J. Deng, Y. S. Han, S. Chen, and P. K. Varshney, "A Key Management Scheme for Wireless Sensor Networks using Deployment Knowledge," in INFOCOM, 2004.
    • (2004) INFOCOM
    • Du, W.1    Deng, J.2    Han, Y.S.3    Chen, S.4    Varshney, P.K.5
  • 20
    • 7744232568 scopus 로고    scopus 로고
    • TIDS: threshold and identity based security scheme for wireless ad hoc networks
    • H. Deng and D. P. Agrawal, "TIDS: threshold and identity based security scheme for wireless ad hoc networks," Ad Hoc Networks, 2(3), 291-307 (2004).
    • (2004) Ad Hoc Networks , vol.2 , Issue.3 , pp. 291-307
    • Deng, H.1    Agrawal, D.P.2
  • 22
    • 35048841659 scopus 로고    scopus 로고
    • UGSP:SecureKey EstablishmentProtocol for Ad-hoc Networks
    • In R. K. Ghosh and H. Mohanty, eds, ICDCIT 2004, Bhubaneswar, India, December 22-24, Springer, Berlin
    • N.Arora andR.K.Shyamasundar. UGSP:SecureKey EstablishmentProtocol for Ad-hoc Networks. In R. K. Ghosh and H. Mohanty, eds, Distributed Computing and Internet Technology: First International Conference, ICDCIT 2004, Bhubaneswar, India, December 22-24, 2004. Proceedings, Volume 3347 of Lecture Notes in Computer Science, Springer, Berlin, 2004, pp. 391-399.
    • (2004) Distributed Computing and Internet Technology: First International Conference , vol.3347 , pp. 391-399
    • Arora, N.1    Shyamasundar, R.K.2
  • 23
    • 20344381294 scopus 로고    scopus 로고
    • A Public-key Infrastructure for Key Distribution in TinyOS Based on Elliptic Curve Cryptography
    • IEEE Secon
    • D. J. Malan, M. Welsh, and M. D. Smith, "A Public-key Infrastructure for Key Distribution in TinyOS Based on Elliptic Curve Cryptography," IEEE Secon 2004.
    • (2004)
    • Malan, D.J.1    Welsh, M.2    Smith, M.D.3
  • 24
    • 0033357103 scopus 로고    scopus 로고
    • Securing Ad Hoc Networks
    • L. Zhou and Z. Haas, "Securing Ad Hoc Networks," IEEE Network, 13(6), 24-30 (1999).
    • (1999) IEEE Network , vol.13 , Issue.6 , pp. 24-30
    • Zhou, L.1    Haas, Z.2
  • 25
    • 11244320485 scopus 로고    scopus 로고
    • URSA: Ubiquitous and Robust Access Control for Mobile Ad Hoc Networks
    • December
    • H. Luo, J. Kong, P. Zerfos, S. Lu, and L. Zhang, "URSA: Ubiquitous and Robust Access Control for Mobile Ad Hoc Networks," IEEE/ACM Transactions on Networking, December 2004, pp. 1049-1063.
    • (2004) IEEE/ACM Transactions on Networking , pp. 1049-1063
    • Luo, H.1    Kong, J.2    Zerfos, P.3    Lu, S.4    Zhang, L.5
  • 28
    • 0035789229 scopus 로고    scopus 로고
    • The Quest for Security in Mobile Ad hoc Networks
    • ACM, New York
    • J.-P. Hubaux, L. Buttyan, and S. Capkun, "The Quest for Security in Mobile Ad hoc Networks," in MobiHoc. ACM, New York, 2001, pp. 146-155.
    • (2001) MobiHoc. , pp. 146-155
    • Hubaux, J.-P.1    Buttyan, L.2    Capkun, S.3
  • 29
    • 0013093839 scopus 로고    scopus 로고
    • Child-proof Authentication for MIPv6 (CAM)
    • G. O'Shea and M. Roe, "Child-proof Authentication for MIPv6 (CAM)," ACM Computer Communications Review, 31(2), 4-8 (2001).
    • (2001) ACM Computer Communications Review , vol.31 , Issue.2 , pp. 4-8
    • O'Shea, G.1    Roe, M.2
  • 30
    • 1642324009 scopus 로고    scopus 로고
    • Statistically Unique and Cryptographically Verifiable (SUCV) Identifiers and Addresses
    • G. Montenegro and C. Castelluccia, "Statistically Unique and Cryptographically Verifiable (SUCV) Identifiers and Addresses," in Proceedings of NDSS, 2002.
    • (2002) Proceedings of NDSS
    • Montenegro, G.1    Castelluccia, C.2
  • 31
    • 31344438973 scopus 로고    scopus 로고
    • Key Agreement in Peer-to-Peer Wireless Networks
    • (Special Issue on Cryptography and Security), February
    • M. Cagalj, S. Capkun, and J. P. Hubaux, "Key Agreement in Peer-to-Peer Wireless Networks," in Proceedings of the IEEE (Special Issue on Cryptography and Security), February 2006, pp. 467-478.
    • (2006) Proceedings of the IEEE , pp. 467-478
    • Cagalj, M.1    Capkun, S.2    Hubaux, J.P.3
  • 33
    • 23944521144 scopus 로고    scopus 로고
    • Manual Authentication for Wireless Devices
    • C. Gehrmann, C. Mitchell, and K. Nyberg, "Manual Authentication for Wireless Devices," RSA Cryptobytes, 7(1), 29-37 (2004).
    • (2004) RSA Cryptobytes , vol.7 , Issue.1 , pp. 29-37
    • Gehrmann, C.1    Mitchell, C.2    Nyberg, K.3
  • 35
    • 34247333484 scopus 로고    scopus 로고
    • The Ephemeral Pairing Problem
    • Key West, FL, February
    • J.-H. Hoepman, "The Ephemeral Pairing Problem," in Intl Conference on Financial Cryptography, Key West, FL, February 2004, Vol. 3110, pp. 212-226.
    • (2004) Intl Conference on Financial Cryptography , vol.3110 , pp. 212-226
    • Hoepman, J.-H.1
  • 40
    • 15244360279 scopus 로고    scopus 로고
    • An Efficient Key Predistribution Scheme for Ad Hoc Network Security
    • M. Ramkumar and N. Memon, "An Efficient Key Predistribution Scheme for Ad Hoc Network Security," IEEE Journal of Selected Areas of Communication, 23(3), 611-621 (2005).
    • (2005) IEEE Journal of Selected Areas of Communication , vol.23 , Issue.3 , pp. 611-621
    • Ramkumar, M.1    Memon, N.2
  • 42
    • 85028765277 scopus 로고
    • Perfectly-secure Key Distribution for Dynamic Conferences
    • in E. F. Brickell, ed, Lecture Notes in Computer Science, Springer, Berlin
    • C. Blundo, A. De Santis, A. Herzberg, S. Kutten, U. Vaccaro, and M. Yung, "Perfectly-secure Key Distribution for Dynamic Conferences," in E. F. Brickell, ed., Advances in Cryptology-Crypto092. Lecture Notes in Computer Science Vol. 740. Springer, Berlin, 1992, pp. 471-480.
    • (1992) Advances in Cryptology-Crypto092 , vol.740 , pp. 471-480
    • Blundo, C.1    De Santis, A.2    Herzberg, A.3    Kutten, S.4    Vaccaro, U.5    Yung, M.6
  • 44
    • 25844435733 scopus 로고    scopus 로고
    • PIKE: Peer Intermediaries for Key Establishment in Sensor Networks
    • IEEE Infocom
    • H. Chan and A. Perrig, "PIKE: Peer Intermediaries for Key Establishment in Sensor Networks," IEEE Infocom, 2005.
    • (2005)
    • Chan, H.1    Perrig, A.2
  • 45
    • 4544293215 scopus 로고    scopus 로고
    • Location Based Pairwise Key Establishments for Static Sensor Networks
    • SASN
    • D. Liu and P. Ning, "Location Based Pairwise Key Establishments for Static Sensor Networks," SASN 2003.
    • (2003)
    • Liu, D.1    Ning, P.2
  • 47
    • 0003973079 scopus 로고
    • Interconnections: Bridges and Routers
    • Addison-Wesley, Reading, MA
    • R. Perlman, Interconnections: Bridges and Routers. Addison-Wesley, Reading, MA, 1993.
    • (1993)
    • Perlman, R.1
  • 48
    • 0003843664 scopus 로고    scopus 로고
    • Ad hoc On-Demand Distance Vector (AODV) Routing
    • IETF RFC, July
    • C. Perkins, E. Belding-Royer and S. Das, "Ad hoc On-Demand Distance Vector (AODV) Routing," IETF RFC, July 2003; //www.faqs.org/rfcs/rfc3561.html.
    • (2003)
    • Perkins, C.1    Belding-Royer, E.2    Das, S.3
  • 49
    • 84889469821 scopus 로고    scopus 로고
    • Draft-guerrero-manet-saodv-02.txt
    • Manel Guerrero Zapata, "Draft-guerrero-manet-saodv-02.txt"; http://ietfreport.isoc.org/idref/draft-guerrero-manet-saodv/.
    • Manel Guerrero Zapata1
  • 50
    • 0036980294 scopus 로고    scopus 로고
    • Securing Ad hoc Routing Protocols
    • WiSe, September
    • M. G. Zapata and N. Asokan, "Securing Ad hoc Routing Protocols," WiSe, September 2002.
    • (2002)
    • Zapata, M.G.1    Asokan, N.2
  • 51
    • 0842283101 scopus 로고    scopus 로고
    • A Secure Routing Protocol for Ad hoc Networks
    • International Conference on Network Protocols (ICNP)
    • K. Sanzgiri, B. Dahill, B. N. Levine, C. Shields, and E. M. Belding-Royer, "A Secure Routing Protocol for Ad hoc Networks," in International Conference on Network Protocols (ICNP), 2002.
    • (2002)
    • Sanzgiri, K.1    Dahill, B.2    Levine, B.N.3    Shields, C.4    Belding-Royer, E.M.5
  • 53
    • 0003597247 scopus 로고    scopus 로고
    • The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks (DSR)
    • IETF Draft, draft-ietf-manet-dsr-10.txt, July
    • D. B. Johnson et al., "The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks (DSR)," IETF Draft, draft-ietf-manet-dsr-10.txt, July 2004.
    • (2004)
    • Johnson, D.B.1
  • 57
    • 85031307530 scopus 로고
    • Highly Dynamic Destination-Sequenced Distance-vector Routing (DSDV) for Mobile Computers
    • SIGCOMM, UK
    • C. E. Perkins and P. Bhagwat, "Highly Dynamic Destination-Sequenced Distance-vector Routing (DSDV) for Mobile Computers," SIGCOMM, UK, 1994.
    • (1994)
    • Perkins, C.E.1    Bhagwat, P.2
  • 59
    • 11244269535 scopus 로고    scopus 로고
    • SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks
    • Y.-C. Hu, D. B. Johnson, and A. Perrig. "SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks," Ad Hoc Networks, 1(1), 175-192 (2003).
    • (2003) Ad Hoc Networks , vol.1 , Issue.1 , pp. 175-192
    • Hu, Y.-C.1    Johnson, D.B.2    Perrig, A.3
  • 60
    • 35048873245 scopus 로고    scopus 로고
    • Securing the Destination Sequenced Distance Vector Routing Protocol (S-DSDV)
    • October, Malaga. Lecture Notes in Computer Science, J. Lopez, S. Qing, and E. Okamoto, eds. Berlin, Springer
    • T. Wan, E. Kranakis, and P. Van Oorschot, "Securing the Destination Sequenced Distance Vector Routing Protocol (S-DSDV)," in Proceedings of 6th International Conference on Information and Communications Security (ICICS'04), October 2004, Malaga. Lecture Notes in Computer Science, Vol. 3269, J. Lopez, S. Qing, and E. Okamoto, eds. Berlin, Springer, 2004.
    • (2004) Proceedings of 6th International Conference on Information and Communications Security (ICICS'04) , vol.3269
    • Wan, T.1    Kranakis, E.2    Van Oorschot, P.3
  • 61
    • 0003938947 scopus 로고    scopus 로고
    • Optimized Link State Routing Protocol (OLSR)
    • IETF RFC 3626, October
    • T. Clausen and P. Jacquet, eds, "Optimized Link State Routing Protocol (OLSR)," IETF RFC 3626, October 2003; //www.ietf.org/rfc/rfc3626.txt.
    • (2003)
    • Clausen, T.1    Jacquet, P.2
  • 63
    • 14844323027 scopus 로고    scopus 로고
    • An Advanced Signature System for OLSR
    • SASN'04, October
    • D. Raffo, T. Clausen, C. Adjih, and P. Muhlethaler, "An Advanced Signature System for OLSR," SASN'04, October 2004.
    • (2004)
    • Raffo, D.1    Clausen, T.2    Adjih, C.3    Muhlethaler, P.4
  • 66
    • 3042632485 scopus 로고    scopus 로고
    • ANODR: Anonymous On Demand Routing with Untraceable Routes for Mobile Ad-hoc Networks
    • ACM MobiHoc, June
    • J. Kong and X. Hong, "ANODR: Anonymous On Demand Routing with Untraceable Routes for Mobile Ad-hoc Networks," ACM MobiHoc, June 2003.
    • (2003)
    • Kong, J.1    Hong, X.2
  • 68
    • 25844443821 scopus 로고    scopus 로고
    • Anonymous Communications in Mobile Ad hoc Networks
    • IEEE INFOCOM 2005, Miami, FL, March
    • Y. Zhang, W. Liu, and W. Lou, "Anonymous Communications in Mobile Ad hoc Networks," IEEE INFOCOM 2005, Miami, FL, March 2005.
    • (2005)
    • Zhang, Y.1    Liu, W.2    Lou, W.3
  • 69
    • 0012970453 scopus 로고    scopus 로고
    • Identify-based Encryption from the Weil Pairing
    • Springer, Berlin
    • D. Boneh and M. Franklin, "Identify-based Encryption from the Weil Pairing," in Proc. CRYPTO 01, Springer, Berlin, 2001.
    • (2001) Proc. CRYPTO 01
    • Boneh, D.1    Franklin, M.2
  • 70
    • 0842304788 scopus 로고    scopus 로고
    • Efficient Algorithms for Pairing-Based Cryptosystems
    • Springer Berlin, August
    • P. S. L. M. Barreto, H. Y. Kim, B. Bynn, and M. Scott, "Efficient Algorithms for Pairing-Based Cryptosystems," in Proc. CRYPTO 02, Springer Berlin, August 2002.
    • (2002) Proc. CRYPTO 02
    • Barreto, P.S.L.M.1    Kim, H.Y.2    Bynn, B.3    Scott, M.4
  • 71
    • 0041973497 scopus 로고    scopus 로고
    • Packet Leashes: a Defense Against Wormhole Attacks in Wireless Ad Hoc Networks
    • San Francisco, CA, April
    • Y. Hu, A. Perrig, and D. Johnson, "Packet Leashes: a Defense Against Wormhole Attacks in Wireless Ad Hoc Networks," in Proceedings of INFOCOM, San Francisco, CA, April 2003, pp. 1976-1986.
    • (2003) Proceedings of INFOCOM , pp. 1976-1986
    • Hu, Y.1    Perrig, A.2    Johnson, D.3
  • 72
    • 84977898401 scopus 로고    scopus 로고
    • Using Directional Antennas to Prevent Wormhole Attacks
    • San Diego, CA, 5-6 February
    • L. Hu and D. Evans, "Using Directional Antennas to Prevent Wormhole Attacks," Network and Distributed System Security Symposium, San Diego, CA, 5-6 February 2004.
    • (2004) Network and Distributed System Security Symposium
    • Hu, L.1    Evans, D.2
  • 73
    • 34548347881 scopus 로고    scopus 로고
    • A Graph Theoretic Framework for Preventing the Wormhole Attack in Wireless Ad Hoc Networks
    • press
    • R. Poovendran and L. Lazos, "A Graph Theoretic Framework for Preventing the Wormhole Attack in Wireless Ad Hoc Networks," ACM Journal on Wireless Networks (WINET), in press.
    • ACM Journal on Wireless Networks (WINET)
    • Poovendran, R.1    Lazos, L.2
  • 79
    • 1642309265 scopus 로고    scopus 로고
    • Hackers Beware
    • Sams Publishing, Indianapolis, Indiana
    • E. Cole. Hackers Beware, Sams Publishing, Indianapolis, Indiana, 2001.
    • (2001)
    • Cole, E.1
  • 88
    • 0035009259 scopus 로고    scopus 로고
    • A Clustering Scheme for Hierarchical Control in Multi-hop Wireless Networks
    • S. Banerjee and S. Khuller, "A Clustering Scheme for Hierarchical Control in Multi-hop Wireless Networks," IEEE Infocom, 2001, pp. 1028-1037.
    • (2001) IEEE Infocom , pp. 1028-1037
    • Banerjee, S.1    Khuller, S.2
  • 93
    • 10644289075 scopus 로고    scopus 로고
    • Core: a Collaborative Reputation mechanism to enforce node cooperation inMobileAdHocNetworks
    • P. Michiardi and R. Molva, "Core: a Collaborative Reputation mechanism to enforce node cooperation inMobileAdHocNetworks," Communication and Multimedia Security Conference, 2002.
    • (2002) Communication and Multimedia Security Conference
    • Michiardi, P.1    Molva, R.2
  • 96
    • 0042877095 scopus 로고    scopus 로고
    • Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks
    • Technical Report no. DSC/2001/046, Swiss Federal Institute of Technology, Lausanne, August
    • L. Buttyan and J.-P. Hubaux, "Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks," Technical Report no. DSC/2001/046, Swiss Federal Institute of Technology, Lausanne, August 2001.
    • (2001)
    • Buttyan, L.1    Hubaux, J.-P.2
  • 97
    • 0042660545 scopus 로고    scopus 로고
    • Stimulating Cooperation in Self-organizing Mobile Ad Hoc Networks
    • March
    • L. Buttyan and J.-P. Hubaux, "Stimulating Cooperation in Self-organizing Mobile Ad Hoc Networks," MONET Journal of Mobile Networks, March 2002, pp. 579-592.
    • (2002) MONET Journal of Mobile Networks , pp. 579-592
    • Buttyan, L.1    Hubaux, J.-P.2
  • 99
    • 33847407910 scopus 로고    scopus 로고
    • Detecting Coordinated Attacks in Tactical Wireless Networks using Cooperative Signature-based Detectors
    • Milcom, October
    • M. Little and C. Ko, "Detecting Coordinated Attacks in Tactical Wireless Networks using Cooperative Signature-based Detectors," Milcom, October 2005.
    • (2005)
    • Little, M.1    Ko, C.2
  • 101
    • 0842331554 scopus 로고    scopus 로고
    • Detecting Malicious Packet Dropping Using Statistically Regular Traffic Patterns in Multihop Wireless Networks that are not Bandwidth Limited
    • San Francisco, December
    • R. Rao and G. Kesidis, "Detecting Malicious Packet Dropping Using Statistically Regular Traffic Patterns in Multihop Wireless Networks that are not Bandwidth Limited," in Proceedings of IEEE Globecom, San Francisco, December 2003.
    • (2003) Proceedings of IEEE Globecom
    • Rao, R.1    Kesidis, G.2
  • 105
    • 0041473688 scopus 로고    scopus 로고
    • Intrusion Detection Techniques for Mobile Wireless Networks
    • Y. Zhang, W. Lee, and Y. Huang, "Intrusion Detection Techniques for Mobile Wireless Networks," in Mobile Networks and Applications, 9(5), 545-556 (2003).
    • (2003) Mobile Networks and Applications , vol.9 , Issue.5 , pp. 545-556
    • Zhang, Y.1    Lee, W.2    Huang, Y.3
  • 106
    • 0036506787 scopus 로고    scopus 로고
    • Security and Management Policy Specification
    • M. Slomin and E. Lupu, "Security and Management Policy Specification," IEEE Network, 16(2), 10-19 (2002).
    • (2002) IEEE Network , vol.16 , Issue.2 , pp. 10-19
    • Slomin, M.1    Lupu, E.2
  • 109
  • 110
    • 1542597401 scopus 로고    scopus 로고
    • Ismene: Provisioning and Policy Reconciliation in Secure Group Communication
    • Technical Report CSE-TR-438-00, Electrical Engineering and Computer Science, University of Michigan, December
    • P. McDaniel and A Prakash, "Ismene: Provisioning and Policy Reconciliation in Secure Group Communication," Technical Report CSE-TR-438-00, Electrical Engineering and Computer Science, University of Michigan, December 2000.
    • (2000)
    • McDaniel, P.1    Prakash, A.2
  • 111
    • 84964476016 scopus 로고    scopus 로고
    • Flexibly Constructing Secure Groups in Antigone 2.0
    • DISCEX 20001, California, June
    • P. McDaniel, A. Prakash, J. Irrer, S. Mittal, and T. Thuang, "Flexibly Constructing Secure Groups in Antigone 2.0," DISCEX 20001, California, June 2001.
    • (2001)
    • McDaniel, P.1    Prakash, A.2    Irrer, J.3    Mittal, S.4    Thuang, T.5
  • 112
    • 84889492882 scopus 로고    scopus 로고
    • Information Survivability Conference and Exposition
    • DISCEX, Washington DC,April 2003
    • Information Survivability Conference and Exposition, DISCEX 2003,Washington DC,April 2003.
    • (2003)
  • 113
    • 84889373021 scopus 로고    scopus 로고
    • Information Survivability Conference and Exposition
    • DARPA, DISCEX 2001, Anaheim, CA, June
    • DARPA, Information Survivability Conference and Exposition, DISCEX 2001, Anaheim, CA, June 2001.
    • (2001)
  • 118
    • 0003952766 scopus 로고    scopus 로고
    • Resource ReSerVation Protocol (RSVP)-Version 1 Functional Specification
    • IETF RFC 2205, September
    • R. Braden, "Resource ReSerVation Protocol (RSVP)-Version 1 Functional Specification," IETF RFC 2205, September 1997.
    • (1997)
    • Braden, R.1
  • 120
    • 0004094192 scopus 로고    scopus 로고
    • Lightweight Directory Access Protocol (v3)
    • IETF RFC 2251, December
    • M. Wahl, T. Howes, and S. Kille, "Lightweight Directory Access Protocol (v3)," IETF RFC 2251, December 1997.
    • (1997)
    • Wahl, M.1    Howes, T.2    Kille, S.3
  • 122
    • 0004078695 scopus 로고    scopus 로고
    • The KeyNote Trust-Management System Version 2
    • IETF RFC 2704, September
    • M. Blaze, J. Feigenbaum, J. Ioannidis, and A. Keromytis, "The KeyNote Trust-Management System Version 2," IETF RFC 2704, September 1999.
    • (1999)
    • Blaze, M.1    Feigenbaum, J.2    Ioannidis, J.3    Keromytis, A.4
  • 123
    • 61449106579 scopus 로고    scopus 로고
    • The STRONGMAN Architecture
    • DISCEX 20003, Washington, DC, April
    • A. D. Keromytis, S. Ioannidis, M. Greenwald, and J. Smith, "The STRONGMAN Architecture," DISCEX 20003, Washington, DC, April 2003.
    • (2003)
    • Keromytis, A.D.1    Ioannidis, S.2    Greenwald, M.3    Smith, J.4
  • 125
    • 84964562215 scopus 로고    scopus 로고
    • Security at the Network Edge: A Distributed Firewall Architecture
    • DISCEX 20001, California, June
    • T. Markham and C. Payne, "Security at the Network Edge: A Distributed Firewall Architecture," DISCEX 20001, California, June 2001.
    • (2001)
    • Markham, T.1    Payne, C.2
  • 126
    • 85116486060 scopus 로고    scopus 로고
    • Location-aided Routing (LAR) in Mobile Ad hoc Networks
    • Y. B. Ko, and N. Vaidya, "Location-aided Routing (LAR) in Mobile Ad hoc Networks," in Proceedings of MobiCom, 1998, pp. 66-75.
    • (1998) Proceedings of MobiCom , pp. 66-75
    • Ko, Y.B.1    Vaidya, N.2
  • 127
    • 85089416445 scopus 로고    scopus 로고
    • A Distance Routing Effect Algorithm for Mobility (DREAM)
    • Dallas, TX, October
    • S. Basagni, I. Chlamtac, V. Syrotiuk, and B. Woodward, "A Distance Routing Effect Algorithm for Mobility (DREAM)," in Proceedings of MOBICOM, Dallas, TX, October 1998, pp. 76-84.
    • (1998) Proceedings of MOBICOM , pp. 76-84
    • Basagni, S.1    Chlamtac, I.2    Syrotiuk, V.3    Woodward, B.4
  • 128
    • 0034547115 scopus 로고    scopus 로고
    • GPSR: Greedy Perimeter Stateless Routing for Wireless Networks
    • Karp, B. and Kung, H.T., "GPSR: Greedy Perimeter Stateless Routing for Wireless Networks," in Proceedings of MobiCom. 2000, pp. 243-254.
    • (2000) Proceedings of MobiCom , pp. 243-254
    • Karp, B.1    Kung, H.T.2
  • 129
    • 0030714489 scopus 로고    scopus 로고
    • Geographic Addressing and Routing
    • Budapest, 26-30 September
    • J. C. Navas and T. Imielinski, "Geographic Addressing and Routing," in MOBICOM, Budapest, 26-30 September 1997.
    • (1997) MOBICOM
    • Navas, J.C.1    Imielinski, T.2
  • 130
    • 0000629443 scopus 로고    scopus 로고
    • Dynamic Source Routing in Ad Hoc Wireless Networks
    • D. Johnson and D. Maltz, "Dynamic Source Routing in Ad Hoc Wireless Networks," Mobile Computing, 1996, pp. 153-181.
    • (1996) Mobile Computing , pp. 153-181
    • Johnson, D.1    Maltz, D.2
  • 131
    • 0031353437 scopus 로고    scopus 로고
    • A Highly Adaptive Distributed Routing Algorithm for Mobile Wireless Networks
    • V. Park and M. Corson, "A Highly Adaptive Distributed Routing Algorithm for Mobile Wireless Networks," Proc. Infocom, 1997.
    • (1997) Proc. Infocom
    • Park, V.1    Corson, M.2
  • 133
    • 0036346677 scopus 로고    scopus 로고
    • Performance Comparison of Two Location Based Routing Protocols for Ad Hoc Networks
    • T. Camp, J. Boleng, B. Williams, L. Wilcox, and W. Navidi, "Performance Comparison of Two Location Based Routing Protocols for Ad Hoc Networks," Proc. IEEE Infocom, 2002.
    • (2002) Proc. IEEE Infocom
    • Camp, T.1    Boleng, J.2    Williams, B.3    Wilcox, L.4    Navidi, W.5
  • 134
    • 0141787007 scopus 로고    scopus 로고
    • Energy-aware Secure Multicast Communication in Ad-hoc Networks Using Geographic Location Information
    • Hong Kong, April
    • L. Lazos and R. Poovendran, "Energy-aware Secure Multicast Communication in Ad-hoc Networks Using Geographic Location Information," in Proceedings of IEEE ICASSP, Hong Kong, April 2003, Vol. 6, pp. 201-204.
    • (2003) Proceedings of IEEE ICASSP , vol.6 , pp. 201-204
    • Lazos, L.1    Poovendran, R.2
  • 136
    • 4544244334 scopus 로고    scopus 로고
    • SIA: Secure Information Aggregation in Sensor Networks
    • B. Przydatek, D. Song, and A. Perrig, "SIA: Secure Information Aggregation in Sensor Networks," ACM SenSys, 2003.
    • (2003) ACM SenSys
    • Przydatek, B.1    Song, D.2    Perrig, A.3
  • 138
    • 1542341270 scopus 로고    scopus 로고
    • Location-based Authentication: Grounding Cyberspace for Better Security
    • Elsevier, Amsterdam
    • D. E. Denning and P. F. MacDoran, "Location-based Authentication: Grounding Cyberspace for Better Security," in Computer Fraud and Security, Elsevier, Amsterdam, 1996, pp. 12-16; www.cosc.georgetown.edu/denning/infosec/Grounding.txt.
    • (1996) Computer Fraud and Security , pp. 12-16
    • Denning, D.E.1    MacDoran, P.F.2
  • 139
    • 4544302904 scopus 로고    scopus 로고
    • The Effect of Mobility-induced Location Errors on Geographic Routing in Mobile Ad Hoc and Sensor Networks: Analysis and Improvement Using Mobility Prediction
    • D. Son, A. Helmy, and B. Krishnamachari, "The Effect of Mobility-induced Location Errors on Geographic Routing in Mobile Ad Hoc and Sensor Networks: Analysis and Improvement Using Mobility Prediction," IEEE Transactions on Mobile Computing, 3(3), 233-245 (2004).
    • (2004) IEEE Transactions on Mobile Computing , vol.3 , Issue.3 , pp. 233-245
    • Son, D.1    Helmy, A.2    Krishnamachari, B.3
  • 140
    • 3042696776 scopus 로고    scopus 로고
    • On the Effect of Localization Errors on Geographic Face Routing in Sensor Networks
    • in IPSN'04, 26-27 April 2004, Berkeley, CA
    • K. Seada, A. Helmy, and R. Govindan, "On the Effect of Localization Errors on Geographic Face Routing in Sensor Networks," in IPSN'04, 26-27 April 2004, Berkeley, CA, 2004.
    • (2004)
    • Seada, K.1    Helmy, A.2    Govindan, R.3
  • 142
    • 25844493197 scopus 로고    scopus 로고
    • A Beacon-less Location Discovery Scheme for Wireless Sensor Networks
    • INFOCOM005, 13-17 March, Miami, FL
    • L. Fang, W. Du, and P. Ning, "A Beacon-less Location Discovery Scheme for Wireless Sensor Networks," Proceedings of the IEEE, INFOCOM005, 13-17 March 2005, Miami, FL.
    • (2005) Proceedings of the IEEE
    • Fang, L.1    Du, W.2    Ning, P.3
  • 143
    • 0003460495 scopus 로고    scopus 로고
    • Understanding GPS Principles and Applications
    • Artech House, Norwood, MA
    • E. Kaplan, Understanding GPS Principles and Applications. Artech House, Norwood, MA, 1996.
    • (1996)
    • Kaplan, E.1
  • 145
    • 84889384589 scopus 로고    scopus 로고
    • LORAN
    • LORAN, www.navcen.uscg.mil/loran/Default.htm#Link.
  • 147
    • 0034775930 scopus 로고    scopus 로고
    • Dynamic Fine-grained Localization in Ad-hoc Networks of Sensors
    • Rome, July
    • A. Savvides, C. Han, and M. Srivastava, "Dynamic Fine-grained Localization in Ad-hoc Networks of Sensors," in Proceedings of ACM MOBICOM, Rome, July 2001, pp. 166-179.
    • (2001) Proceedings of ACM MOBICOM , pp. 166-179
    • Savvides, A.1    Han, C.2    Srivastava, M.3
  • 149
    • 0041973656 scopus 로고    scopus 로고
    • Ad Hoc Positioning System (APS) using AoA
    • INFOCOM, San Francisco, CA
    • D. Niculescu and B. Nath, "Ad Hoc Positioning System (APS) using AoA," INFOCOM 2003, San Francisco, CA.
    • (2003)
    • Niculescu, D.1    Nath, B.2
  • 150
  • 151
    • 35248891504 scopus 로고    scopus 로고
    • Organizing a Global Coordinate System from Local Information on an Ad Hoc Sensor Network
    • R. Nagpal, H. Shrobe, and J. Bachrach, "Organizing a Global Coordinate System from Local Information on an Ad Hoc Sensor Network," in Proceedings of IPSN, Vol. 2634, 2003, pp. 333-348.
    • (2003) Proceedings of IPSN , vol.2634 , pp. 333-348
    • Nagpal, R.1    Shrobe, H.2    Bachrach, J.3
  • 156
    • 25844439422 scopus 로고    scopus 로고
    • Secure Positioning of Wireless Devices with Application to Sensor Networks
    • S. Capkun and J. Hubaux, "Secure Positioning of Wireless Devices with Application to Sensor Networks," in Proceedings of Infocom, 2005.
    • (2005) Proceedings of Infocom
    • Capkun, S.1    Hubaux, J.2
  • 159
    • 33750318709 scopus 로고    scopus 로고
    • Proving the Location of Tamper Resistent Devices
    • B. Waters and E. Felten, "Proving the Location of Tamper Resistent Devices," //www.cs.princeton.edu/~bwaters/research/location_proving.ps.
    • Waters, B.1    Felten, E.2
  • 160
    • 33144454801 scopus 로고    scopus 로고
    • Secure Positioning in Wireless Networks
    • special issue on security in ad-hoc networks
    • S. Capkun and J. Hubaux, "Secure Positioning in Wireless Networks," IEEE JSAC, special issue on security in ad-hoc networks, 24(2) 221-232 (2006).
    • (2006) IEEE JSAC , vol.24 , Issue.2 , pp. 221-232
    • Capkun, S.1    Hubaux, J.2
  • 163
    • 84866469313 scopus 로고    scopus 로고
    • SeRLoc: Robust Localization for Wireless Sensor Networks
    • L. Lazos and R. Poovendran, "SeRLoc: Robust Localization for Wireless Sensor Networks," ACM Sensor Networks, 2005.
    • (2005) ACM Sensor Networks
    • Lazos, L.1    Poovendran, R.2
  • 164
    • 33144475948 scopus 로고    scopus 로고
    • HiRLoc: Hi-resolution Robust Localization for Wireless Sensor Networks
    • L. Lazos and R. Poovendran, "HiRLoc: Hi-resolution Robust Localization for Wireless Sensor Networks," in IEEE JSAC, special issue on wireless security, 24(2), 233-246 (2006).
    • (2006) IEEE JSAC, special issue on wireless security , vol.24 , Issue.2 , pp. 233-246
    • Lazos, L.1    Poovendran, R.2
  • 165
    • 0035684931 scopus 로고    scopus 로고
    • Ad-hoc Positioning Systems (APS)
    • D. Niculescu and B. Nath, "Ad-hoc Positioning Systems (APS)," in Proceedings of IEEE GLOBECOM, Vol. 5, 2001, pp. 2926-2931.
    • (2001) Proceedings of IEEE GLOBECOM , vol.5 , pp. 2926-2931
    • Niculescu, D.1    Nath, B.2
  • 166
    • 33750303903 scopus 로고    scopus 로고
    • Secure Localization in Sensor Networks using Transmission Range Variation
    • 1st International Workshop on Resource Provisioning and Management in Sensor Networks (RPMSN05), IEEE Conference on Mobile Ad Hoc and Sensor Systems, November
    • F. Anjum, S. Pandey, and P. Agrawal, "Secure Localization in Sensor Networks using Transmission Range Variation," 1st International Workshop on Resource Provisioning and Management in Sensor Networks (RPMSN05), IEEE Conference on Mobile Ad Hoc and Sensor Systems, November 2005.
    • (2005)
    • Anjum, F.1    Pandey, S.2    Agrawal, P.3
  • 167
    • 84889475834 scopus 로고    scopus 로고
    • Wireless Integrated Network Systems (WINS)
    • Wireless Integrated Network Systems (WINS), http://wins.rsc.rockwell.com/.
  • 168
    • 33144472023 scopus 로고    scopus 로고
    • ROPE: Robust Position Estimation in Wireless Sensor Networks
    • The Fourth International Conference on Information Processing in Sensor Networks (IPSN 005), April
    • L. Lazos, S. Capkun, and R. Poovendran, "ROPE: Robust Position Estimation in Wireless Sensor Networks," The Fourth International Conference on Information Processing in Sensor Networks (IPSN 005), April 2005.
    • (2005)
    • Lazos, L.1    Capkun, S.2    Poovendran, R.3
  • 172
    • 0036461820 scopus 로고    scopus 로고
    • Building Safer Cars
    • W. Jones, "Building Safer Cars," IEEE Spectrum, 39(1), 82-85 (2002).
    • (2002) IEEE Spectrum , vol.39 , Issue.1 , pp. 82-85
    • Jones, W.1
  • 174
    • 33745955725 scopus 로고    scopus 로고
    • Of Sticker Tags and 5.9 GHz
    • P. Samuel, "Of Sticker Tags and 5.9 GHz," ITS International, 2004.
    • (2004) ITS International
    • Samuel, P.1
  • 177
    • 0034317075 scopus 로고    scopus 로고
    • Key Agreement in Ad Hoc Networks
    • N. Asokan and P. Ginzboorg, "Key Agreement in Ad Hoc Networks," Computer Communications, 23, 1627-1637, (2000).
    • (2000) Computer Communications , vol.23 , pp. 1627-1637
    • Asokan, N.1    Ginzboorg, P.2
  • 179
    • 11244254627 scopus 로고    scopus 로고
    • SECTOR: Secure Tracking of Node Encounters in Multi-hop Wireless Networks
    • Washington, DC, October
    • S. Capkun, L. Buttyan, and J.-P. Hubaux, "SECTOR: Secure Tracking of Node Encounters in Multi-hop Wireless Networks," in Proceedings of SASN, Washington, DC, October 2003.
    • (2003) Proceedings of SASN
    • Capkun, S.1    Buttyan, L.2    Hubaux, J.-P.3
  • 180
    • 0034976472 scopus 로고    scopus 로고
    • Gps-free Positioning in Mobile Ad-hoc Networks
    • S. Capkun, M. Hamdi, and J. Hubaux, "Gps-free Positioning in Mobile Ad-hoc Networks," in Proceedings of HICCSS, 2001, pp. 3481-3490.
    • (2001) Proceedings of HICCSS , pp. 3481-3490
    • Capkun, S.1    Hamdi, M.2    Hubaux, J.3
  • 181
    • 1542317847 scopus 로고    scopus 로고
    • BISS: Building Secure Routing out of an Incomplete Set of Secure Associations
    • San Diego, CA, September
    • S. Capkun and J.-P. Hubaux, "BISS: Building Secure Routing out of an Incomplete Set of Secure Associations," in Procedings of 2nd ACM Wireless Security (WiSe'03), San Diego, CA, September 2003, pp. 21-29.
    • (2003) Procedings of 2nd ACM Wireless Security (WiSe'03) , pp. 21-29
    • Capkun, S.1    Hubaux, J.-P.2
  • 183
    • 0036506789 scopus 로고    scopus 로고
    • Policy-Based Networking
    • R. Chadha, G. Lapiotis, and S. Wright, "Policy-Based Networking," IEEE Network, special issue, 16(2), (2002).
    • (2002) IEEE Network , vol.16 , Issue.SPEC. ISS.
    • Chadha, R.1    Lapiotis, G.2    Wright, S.3
  • 184
    • 17444400853 scopus 로고    scopus 로고
    • Protecting File Systems with Transient Authentication
    • M. Corner and B. Noble, "Protecting File Systems with Transient Authentication," Wireless Networks, 11(1-2), 7-19 (2005).
    • (2005) Wireless Networks , vol.11 , Issue.1-2 , pp. 7-19
    • Corner, M.1    Noble, B.2
  • 185
    • 84961696448 scopus 로고    scopus 로고
    • Policy-based Security Management for Large Dynamic Groups: an Overview of the FCCM Project
    • DISCEX 2000, South Carolina, January
    • P. T. Dinsmore, D. M. Balenson, M. Heyman, P. S. Kruus, C. D. Scace, and A. T. Sherman, "Policy-based Security Management for Large Dynamic Groups: an Overview of the FCCM Project," DISCEX 2000, South Carolina, January 2000.
    • (2000)
    • Dinsmore, P.T.1    Balenson, D.M.2    Heyman, M.3    Kruus, P.S.4    Scace, C.D.5    Sherman, A.T.6
  • 186
    • 4143106700 scopus 로고    scopus 로고
    • A Comparison of Routing Strategies for Vehicular Ad Hoc Networks
    • Department of Computer Science, University of Mannheim, Mannheim, Technical Report no. TR-3-2002
    • H. Fuessler, M. Mauve, H. Hartenstein, M. Kaesemann, and D. Vollmer, "A Comparison of Routing Strategies for Vehicular Ad Hoc Networks," Department of Computer Science, University of Mannheim, Mannheim, Technical Report no. TR-3-2002, 2002.
    • (2002)
    • Fuessler, H.1    Mauve, M.2    Hartenstein, H.3    Kaesemann, M.4    Vollmer, D.5
  • 187
    • 0010439196 scopus 로고    scopus 로고
    • Navstar GPS User Equipment Introduction (Public Release Version)
    • Technical Report September
    • U. C. Guard, "Navstar GPS User Equipment Introduction (Public Release Version)," Technical Report September 1996.
    • (1996)
    • Guard, U.C.1
  • 189
    • 33746574489 scopus 로고    scopus 로고
    • The Multicast Group Security Architecture
    • IETF RFC 3740, March
    • T. Hardjono and B. Weis, "The Multicast Group Security Architecture," IETF RFC 3740, March 2004.
    • (2004)
    • Hardjono, T.1    Weis, B.2
  • 190
    • 0003574092 scopus 로고    scopus 로고
    • Global Positioning System: Theory and Practice
    • Springer, Berlin
    • B. Hofmann-Wellenhof, H. Lichtenegger, and J. Collins, Global Positioning System: Theory and Practice. Springer, Berlin, 1997.
    • (1997)
    • Hofmann-Wellenhof, B.1    Lichtenegger, H.2    Collins, J.3
  • 191
    • 84949023663 scopus 로고
    • Secret-key Agreement without Public-key Cryptography
    • T. Leighton and S. Micali, "Secret-key Agreement without Public-key Cryptography," in Advances in Cryptology-Crypto 093, 1993, pp. 456-479.
    • (1993) Advances in Cryptology-Crypto 093 , pp. 456-479
    • Leighton, T.1    Micali, S.2
  • 193
    • 24244459823 scopus 로고    scopus 로고
    • Multicast Security Policy
    • IRTF Internet draft, draft-irtf-smug-mcast-policy-01.txt, November
    • P. McDaniel, H. Harney, P. Dinsmore, and A. Prakash, "Multicast Security Policy," IRTF Internet draft, draft-irtf-smug-mcast-policy-01.txt, November 2000.
    • (2000)
    • McDaniel, P.1    Harney, H.2    Dinsmore, P.3    Prakash, A.4
  • 194
    • 84889376779 scopus 로고    scopus 로고
    • Antigone: Implementing Policy in Secure Group Communication
    • Technical Report CSE-TR-426-00, Electrical Engineering and Computer Science, University of Michigan, May
    • P. McDaniel and A. Prakash, "Antigone: Implementing Policy in Secure Group Communication," Technical Report CSE-TR-426-00, Electrical Engineering and Computer Science, University of Michigan, May 2000.
    • (2000)
    • McDaniel, P.1    Prakash, A.2
  • 195
    • 0032651001 scopus 로고    scopus 로고
    • A Mobility Based Framework for Adaptive Clustering in Wireless Ad-Hoc Networks
    • A. B. McDonald and T. Znati, "A Mobility Based Framework for Adaptive Clustering in Wireless Ad-Hoc Networks," IEEE Journal on Selected Areas in Communications, 17, 1466-1487 (1999).
    • (1999) IEEE Journal on Selected Areas in Communications , vol.17 , pp. 1466-1487
    • McDonald, A.B.1    Znati, T.2
  • 196
    • 0041973656 scopus 로고    scopus 로고
    • Ad Hoc Positioning System (APS) using AoA
    • INFOCOM' 03, San Francisco, CA
    • D. Niculescu and B. Nath, "Ad Hoc Positioning System (APS) using AoA," INFOCOM' 03, Vol. 3, San Francisco, CA, 2003, pp. 1734-1743.
    • (2003) , vol.3 , pp. 1734-1743
    • Niculescu, D.1    Nath, B.2
  • 200
    • 85084163355 scopus 로고    scopus 로고
    • Robust Positioning Algorithms for Distributed Ad-Hoc Wireless Sensor Networks
    • USENIX Technical Annual Conference, Monterey, CA, June
    • C. Savarese, J. Rabay, and K. Langendoen, "Robust Positioning Algorithms for Distributed Ad-Hoc Wireless Sensor Networks," USENIX Technical Annual Conference, Monterey, CA, June 2002.
    • (2002)
    • Savarese, C.1    Rabay, J.2    Langendoen, K.3
  • 201
    • 0018545449 scopus 로고
    • How to Share a Secret
    • A. Shamir, "How to Share a Secret," Communications of the ACM, 22(11), 612-612 (1979).
    • (1979) Communications of the ACM , vol.22 , Issue.11 , pp. 612-612
    • Shamir, A.1
  • 202
    • 0003902428 scopus 로고    scopus 로고
    • Cryptography and Network Security: Principles and Practice
    • Prentice Hall, Engelwood Cliffs, NJ
    • W. Stallings, Cryptography and Network Security: Principles and Practice, Prentice Hall, Engelwood Cliffs, NJ, 1999.
    • (1999)
    • Stallings, W.1
  • 203
    • 84889378879 scopus 로고    scopus 로고
    • On Optimal Placement of Intrusion Detection Modules in Wireless Sensor Networks
    • Invited Paper, in Proceedings of Broadnets, San Jose, CA, 25-29 October
    • D. Subhadrabandhu, F. Anjum, S. Sarkar, and R. Shetty, "On Optimal Placement of Intrusion Detection Modules in Wireless Sensor Networks," Invited Paper, in Proceedings of Broadnets, San Jose, CA, 25-29 October 2004.
    • (2004)
    • Subhadrabandhu, D.1    Anjum, F.2    Sarkar, S.3    Shetty, R.4
  • 205
    • 37149051976 scopus 로고    scopus 로고
    • KAoS Policy and Domain Services Towards a Description-Logic Approach to Policy Representation, Deconfliction, and Enforcement
    • Workshop on Policies for Distributed Systems and Networks
    • A. Uszok, J. Bradshaw, R. Jeffers, N. Suri, P. Hayes, M. Breedy, L. Bunch, M. Johnson, S. Kulkarni, and J. Lott, "KAoS Policy and Domain Services Towards a Description-Logic Approach to Policy Representation, Deconfliction, and Enforcement," in Policy 2003, Workshop on Policies for Distributed Systems and Networks.
    • (2003) Policy
    • Uszok, A.1    Bradshaw, J.2    Jeffers, R.3    Suri, N.4    Hayes, P.5    Breedy, M.6    Bunch, L.7    Johnson, M.8    Kulkarni, S.9    Lott, J.10
  • 206
    • 0036506790 scopus 로고    scopus 로고
    • Simplifying Network Administration Using Policy-Based Management
    • D. Verma, "Simplifying Network Administration Using Policy-Based Management," IEEE Network, 16(2), 20-26 (2002).
    • (2002) IEEE Network , vol.16 , Issue.2 , pp. 20-26
    • Verma, D.1
  • 207
    • 0003754695 scopus 로고    scopus 로고
    • A Framework for Policy based Admission Control
    • IETF RFC 2753, January
    • R. Yavatkar, D. Pendarakis, and R. Guerin, "A Framework for Policy based Admission Control," IETF RFC 2753, January 2000.
    • (2000)
    • Yavatkar, R.1    Pendarakis, D.2    Guerin, R.3
  • 208
  • 209
    • 33645362360 scopus 로고    scopus 로고
    • IPsec Configuration Policy Information Model
    • IETF RFC 3585, August
    • J. Jason, L. Rafalow, and E. Vyncke, "IPsec Configuration Policy Information Model," IETF RFC 3585, August 2003.
    • (2003)
    • Jason, J.1    Rafalow, L.2    Vyncke, E.3
  • 210
    • 0035424017 scopus 로고    scopus 로고
    • A Survey and Taxonomy of Location Systems for Ubiquitous Computing
    • J. Hightower and G. Borriella, "A Survey and Taxonomy of Location Systems for Ubiquitous Computing," IEEE Computer, 34(8), 57-66 (2001).
    • (2001) IEEE Computer , vol.34 , Issue.8 , pp. 57-66
    • Hightower, J.1    Borriella, G.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.