-
1
-
-
84947251443
-
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks
-
Cambridge, Springer, Berlin
-
F. Stajano and R. Anderson, "The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks," in Proceedings of 7th International Workshop on Security Protocols, Cambridge. Picture Notes in Computer Science, Vol. 1796, Springer, Berlin 1999, pp. 172-194.
-
(1999)
Proceedings of 7th International Workshop on Security Protocols
, vol.1796
, pp. 172-194
-
-
Stajano, F.1
Anderson, R.2
-
2
-
-
84947273682
-
The Sybil Attack
-
March, Cambridge, MA
-
J. Douceur, "The Sybil Attack," in Proceedings of IPTPS 2002, March 2002, Cambridge, MA, pp. 251-260.
-
(2002)
Proceedings of IPTPS 2002
, pp. 251-260
-
-
Douceur, J.1
-
3
-
-
84889391669
-
Generic Threats to Routing Protocols
-
draft-ietf-rpsec-routing-threats-07, October
-
A. Sabir, S. Murphy, and Y. Yang, "Generic Threats to Routing Protocols," draft-ietf-rpsec-routing-threats-07, October 2004.
-
(2004)
-
-
Sabir, A.1
Murphy, S.2
Yang, Y.3
-
4
-
-
4544342574
-
A Specification-Based Intrusion Detection System For AODV
-
in Workshop on Security in Ad Hoc and Sensor Networks (SASN)'03
-
C.-Y. Tseng, P. Balasubramanyam, C. Ko, R. Limprasittiporn, J. Rowe, and K. Levitt, "A Specification-Based Intrusion Detection System For AODV," in Workshop on Security in Ad Hoc and Sensor Networks (SASN)'03.
-
-
-
Tseng, C.-Y.1
Balasubramanyam, P.2
Ko, C.3
Limprasittiporn, R.4
Rowe, J.5
Levitt, K.6
-
5
-
-
21644441634
-
An Intrusion Detection Tool for AODV-based Ad hoc Wireless Networks
-
Tucson, AZ, December
-
G. Vigna, S. Gwalani, K. Srinivasan, E. Belding-Royer, and R. Kemmerer, "An Intrusion Detection Tool for AODV-based Ad hoc Wireless Networks," in Proceedings of the Annual Computer Security Applications Conference (ACSAC), Tucson, AZ, December 2004, pp. 16-27.
-
(2004)
Proceedings of the Annual Computer Security Applications Conference (ACSAC)
, pp. 16-27
-
-
Vigna, G.1
Gwalani, S.2
Srinivasan, K.3
Belding-Royer, E.4
Kemmerer, R.5
-
6
-
-
84903836776
-
How to Misuse AODV: a Case Study of Insider Attacks against Mobile Ad-hoc Routing Protocols
-
United States Military Academy, West Point, NY, June
-
P. Ning and K. Sun, "How to Misuse AODV: a Case Study of Insider Attacks against Mobile Ad-hoc Routing Protocols," in Proceedings of the 2003 IEEE Workshop on Information Assurance. United States Military Academy, West Point, NY, June 2003.
-
(2003)
Proceedings of the 2003 IEEE Workshop on Information Assurance
-
-
Ning, P.1
Sun, K.2
-
8
-
-
0004104571
-
Unsafe at any Key Size; an Analysis of the WEP Encapsulation
-
IEEE P802.11, Wireless LANs, October
-
J. Walker, "Unsafe at any Key Size; an Analysis of the WEP Encapsulation," IEEE P802.11, Wireless LANs, October 2000.
-
(2000)
-
-
Walker, J.1
-
9
-
-
33745165448
-
Finding Collisions in the Full SHA-1
-
CRYPTO
-
X. Wang, Y. L. Yin, and H. Yu, "Finding Collisions in the Full SHA-1", CRYPTO, 2005.
-
(2005)
-
-
Wang, X.1
Yin, Y.L.2
Yu, H.3
-
10
-
-
15744368857
-
Efficient and Secure Source Authentication for Multicast
-
NDSS 2001, February
-
R. Canetti, D. Song, and D. Tygar, "Efficient and Secure Source Authentication for Multicast," Proceedings of Network and Distributed System Security Symposium, NDSS 2001, February 2001.
-
(2001)
Proceedings of Network and Distributed System Security Symposium
-
-
Canetti, R.1
Song, D.2
Tygar, D.3
-
11
-
-
0036738266
-
SPINS: Security Protocols for Sensor Networks
-
September
-
A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. D. Tygar, "SPINS: Security Protocols for Sensor Networks," Wireless Networks Journal (WINE), September 2002.
-
(2002)
Wireless Networks Journal (WINE)
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, J.D.5
-
12
-
-
0004115841
-
The Internet Key Exchange (IKE)
-
RFC 2409, November
-
D. Harkins and D. Carrel, "The Internet Key Exchange (IKE)," RFC 2409, November 1998; www.ietf.org/rfc/rfc2409.txt?number1/42409.
-
(1998)
-
-
Harkins, D.1
Carrel, D.2
-
13
-
-
0038687767
-
Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols
-
Washington, DC, USA
-
W. Aiello, S. M. Bellovin, M. Blaze, R. Canettia, J. Ioannidis, A. D. Keromytis, and O. Reingold, "Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols," in Proc. ACM Computer and Communications Security Conference, Washington, DC, USA, 2000, pp. 48-58.
-
(2000)
Proc. ACM Computer and Communications Security Conference
, pp. 48-58
-
-
Aiello, W.1
Bellovin, S.M.2
Blaze, M.3
Canettia, R.4
Ioannidis, J.5
Keromytis, A.D.6
Reingold, O.7
-
14
-
-
8344262333
-
A Key Management Scheme for Wireless Sensor Networks using Deployment Knowledge
-
W. Du, J. Deng, Y. S. Han, S. Chen, and P. K. Varshney, "A Key Management Scheme for Wireless Sensor Networks using Deployment Knowledge," in INFOCOM, 2004.
-
(2004)
INFOCOM
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Chen, S.4
Varshney, P.K.5
-
15
-
-
3042783638
-
A Pairwise Key Predistribution Scheme for Wireless Sensor Networks
-
October
-
W. Du, J. Deng, Y. Han, and P. Varshney, "A Pairwise Key Predistribution Scheme for Wireless Sensor Networks," in Proceedings of the Tenth ACM Conference on Computer and Communications Security (CCS 2003), October 2003, pp. 42-51.
-
(2003)
Proceedings of the Tenth ACM Conference on Computer and Communications Security (CCS 2003)
, pp. 42-51
-
-
Du, W.1
Deng, J.2
Han, Y.3
Varshney, P.4
-
16
-
-
23244467182
-
A Pairwise Key Predistribution Scheme for Wireless Sensor Networks
-
W. Du, J. Deng, Y. S. Han, P. Varshney, J. Katz, and A. Khalili, "A Pairwise Key Predistribution Scheme for Wireless Sensor Networks," ACM Transactions on Information and System Security (TISSEC), 2005, pp. 228-258.
-
(2005)
ACM Transactions on Information and System Security (TISSEC)
, pp. 228-258
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Varshney, P.4
Katz, J.5
Khalili, A.6
-
18
-
-
16644374371
-
Establishing Pairwise Keys in Distributed Sensor Networks
-
D. Liu, P. Ning, and R. Li, "Establishing Pairwise Keys in Distributed Sensor Networks," ACM Transactions on Information Systems Security, 8(1), 41-77 (2005).
-
(2005)
ACM Transactions on Information Systems Security
, vol.8
, Issue.1
, pp. 41-77
-
-
Liu, D.1
Ning, P.2
Li, R.3
-
19
-
-
33751044073
-
Talking to Strangers: Authentication in Ad Hoc Wireless Networks
-
San Diego, CA
-
D. Balfanz, D. Smetters, P. Stewart, and H. Wong, "Talking to Strangers: Authentication in Ad Hoc Wireless Networks," in Proceedings of 9th Annual Network and Distributed System Security Symposium, San Diego, CA, 2002.
-
(2002)
Proceedings of 9th Annual Network and Distributed System Security Symposium
-
-
Balfanz, D.1
Smetters, D.2
Stewart, P.3
Wong, H.4
-
20
-
-
7744232568
-
TIDS: threshold and identity based security scheme for wireless ad hoc networks
-
H. Deng and D. P. Agrawal, "TIDS: threshold and identity based security scheme for wireless ad hoc networks," Ad Hoc Networks, 2(3), 291-307 (2004).
-
(2004)
Ad Hoc Networks
, vol.2
, Issue.3
, pp. 291-307
-
-
Deng, H.1
Agrawal, D.P.2
-
22
-
-
35048841659
-
UGSP:SecureKey EstablishmentProtocol for Ad-hoc Networks
-
In R. K. Ghosh and H. Mohanty, eds, ICDCIT 2004, Bhubaneswar, India, December 22-24, Springer, Berlin
-
N.Arora andR.K.Shyamasundar. UGSP:SecureKey EstablishmentProtocol for Ad-hoc Networks. In R. K. Ghosh and H. Mohanty, eds, Distributed Computing and Internet Technology: First International Conference, ICDCIT 2004, Bhubaneswar, India, December 22-24, 2004. Proceedings, Volume 3347 of Lecture Notes in Computer Science, Springer, Berlin, 2004, pp. 391-399.
-
(2004)
Distributed Computing and Internet Technology: First International Conference
, vol.3347
, pp. 391-399
-
-
Arora, N.1
Shyamasundar, R.K.2
-
23
-
-
20344381294
-
A Public-key Infrastructure for Key Distribution in TinyOS Based on Elliptic Curve Cryptography
-
IEEE Secon
-
D. J. Malan, M. Welsh, and M. D. Smith, "A Public-key Infrastructure for Key Distribution in TinyOS Based on Elliptic Curve Cryptography," IEEE Secon 2004.
-
(2004)
-
-
Malan, D.J.1
Welsh, M.2
Smith, M.D.3
-
24
-
-
0033357103
-
Securing Ad Hoc Networks
-
L. Zhou and Z. Haas, "Securing Ad Hoc Networks," IEEE Network, 13(6), 24-30 (1999).
-
(1999)
IEEE Network
, vol.13
, Issue.6
, pp. 24-30
-
-
Zhou, L.1
Haas, Z.2
-
25
-
-
11244320485
-
URSA: Ubiquitous and Robust Access Control for Mobile Ad Hoc Networks
-
December
-
H. Luo, J. Kong, P. Zerfos, S. Lu, and L. Zhang, "URSA: Ubiquitous and Robust Access Control for Mobile Ad Hoc Networks," IEEE/ACM Transactions on Networking, December 2004, pp. 1049-1063.
-
(2004)
IEEE/ACM Transactions on Networking
, pp. 1049-1063
-
-
Luo, H.1
Kong, J.2
Zerfos, P.3
Lu, S.4
Zhang, L.5
-
26
-
-
0035704362
-
Providing Robust and Ubiquitous Security Support for Mobile Ad Hoc Networks
-
November
-
J. Kong, P. Zerfos, H. Luo, S. Lu, and L. Zhang, "Providing Robust and Ubiquitous Security Support for Mobile Ad Hoc Networks," in Proceedings of Ninth International Conference on Network Protocols (ICNP), November 2001.
-
(2001)
Proceedings of Ninth International Conference on Network Protocols (ICNP)
-
-
Kong, J.1
Zerfos, P.2
Luo, H.3
Lu, S.4
Zhang, L.5
-
27
-
-
0242678584
-
Self-Organized Public-Key Management for Mobile Ad Hoc Networks
-
S. Capkun, L. Buttyan, and J.-P. Hubaux, "Self-Organized Public-Key Management for Mobile Ad Hoc Networks," IEEE Transactions on Mobile Computing, 2(1), 52-64 (2003).
-
(2003)
IEEE Transactions on Mobile Computing
, vol.2
, Issue.1
, pp. 52-64
-
-
Capkun, S.1
Buttyan, L.2
Hubaux, J.-P.3
-
28
-
-
0035789229
-
The Quest for Security in Mobile Ad hoc Networks
-
ACM, New York
-
J.-P. Hubaux, L. Buttyan, and S. Capkun, "The Quest for Security in Mobile Ad hoc Networks," in MobiHoc. ACM, New York, 2001, pp. 146-155.
-
(2001)
MobiHoc.
, pp. 146-155
-
-
Hubaux, J.-P.1
Buttyan, L.2
Capkun, S.3
-
29
-
-
0013093839
-
Child-proof Authentication for MIPv6 (CAM)
-
G. O'Shea and M. Roe, "Child-proof Authentication for MIPv6 (CAM)," ACM Computer Communications Review, 31(2), 4-8 (2001).
-
(2001)
ACM Computer Communications Review
, vol.31
, Issue.2
, pp. 4-8
-
-
O'Shea, G.1
Roe, M.2
-
30
-
-
1642324009
-
Statistically Unique and Cryptographically Verifiable (SUCV) Identifiers and Addresses
-
G. Montenegro and C. Castelluccia, "Statistically Unique and Cryptographically Verifiable (SUCV) Identifiers and Addresses," in Proceedings of NDSS, 2002.
-
(2002)
Proceedings of NDSS
-
-
Montenegro, G.1
Castelluccia, C.2
-
31
-
-
31344438973
-
Key Agreement in Peer-to-Peer Wireless Networks
-
(Special Issue on Cryptography and Security), February
-
M. Cagalj, S. Capkun, and J. P. Hubaux, "Key Agreement in Peer-to-Peer Wireless Networks," in Proceedings of the IEEE (Special Issue on Cryptography and Security), February 2006, pp. 467-478.
-
(2006)
Proceedings of the IEEE
, pp. 467-478
-
-
Cagalj, M.1
Capkun, S.2
Hubaux, J.P.3
-
33
-
-
23944521144
-
Manual Authentication for Wireless Devices
-
C. Gehrmann, C. Mitchell, and K. Nyberg, "Manual Authentication for Wireless Devices," RSA Cryptobytes, 7(1), 29-37 (2004).
-
(2004)
RSA Cryptobytes
, vol.7
, Issue.1
, pp. 29-37
-
-
Gehrmann, C.1
Mitchell, C.2
Nyberg, K.3
-
35
-
-
34247333484
-
The Ephemeral Pairing Problem
-
Key West, FL, February
-
J.-H. Hoepman, "The Ephemeral Pairing Problem," in Intl Conference on Financial Cryptography, Key West, FL, February 2004, Vol. 3110, pp. 212-226.
-
(2004)
Intl Conference on Financial Cryptography
, vol.3110
, pp. 212-226
-
-
Hoepman, J.-H.1
-
37
-
-
0035789267
-
Secure Pebblenet
-
MobiHoc 2001, Long Beach, CA, 4-5 October
-
S. Basagni, K. Herrin, D. Bruschi, and E. Rosti, "Secure Pebblenet," in Proceedings of the 2001 ACM Iternational Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc 2001, Long Beach, CA, 4-5 October 2001, pp. 156-163.
-
(2001)
Proceedings of the 2001 ACM Iternational Symposium on Mobile Ad Hoc Networking and Computing
, pp. 156-163
-
-
Basagni, S.1
Herrin, K.2
Bruschi, D.3
Rosti, E.4
-
38
-
-
10044284351
-
LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks
-
Washington, DC, October
-
S. Zhu, S. Setia, and S. Jajodia. "LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks," in Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS '03), Washington, DC, October 2003.
-
(2003)
Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS '03)
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
-
39
-
-
0038487088
-
Random Key Predistribution Schemes for Sensor Networks
-
May
-
H. Chan, A. Perrig, and D. Song, "Random Key Predistribution Schemes for Sensor Networks," in IEEE Symposium on Security and Privacy, May 2003, pp. 197-213.
-
(2003)
IEEE Symposium on Security and Privacy
, pp. 197-213
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
40
-
-
15244360279
-
An Efficient Key Predistribution Scheme for Ad Hoc Network Security
-
M. Ramkumar and N. Memon, "An Efficient Key Predistribution Scheme for Ad Hoc Network Security," IEEE Journal of Selected Areas of Communication, 23(3), 611-621 (2005).
-
(2005)
IEEE Journal of Selected Areas of Communication
, vol.23
, Issue.3
, pp. 611-621
-
-
Ramkumar, M.1
Memon, N.2
-
42
-
-
85028765277
-
Perfectly-secure Key Distribution for Dynamic Conferences
-
in E. F. Brickell, ed, Lecture Notes in Computer Science, Springer, Berlin
-
C. Blundo, A. De Santis, A. Herzberg, S. Kutten, U. Vaccaro, and M. Yung, "Perfectly-secure Key Distribution for Dynamic Conferences," in E. F. Brickell, ed., Advances in Cryptology-Crypto092. Lecture Notes in Computer Science Vol. 740. Springer, Berlin, 1992, pp. 471-480.
-
(1992)
Advances in Cryptology-Crypto092
, vol.740
, pp. 471-480
-
-
Blundo, C.1
De Santis, A.2
Herzberg, A.3
Kutten, S.4
Vaccaro, U.5
Yung, M.6
-
44
-
-
25844435733
-
PIKE: Peer Intermediaries for Key Establishment in Sensor Networks
-
IEEE Infocom
-
H. Chan and A. Perrig, "PIKE: Peer Intermediaries for Key Establishment in Sensor Networks," IEEE Infocom, 2005.
-
(2005)
-
-
Chan, H.1
Perrig, A.2
-
45
-
-
4544293215
-
Location Based Pairwise Key Establishments for Static Sensor Networks
-
SASN
-
D. Liu and P. Ning, "Location Based Pairwise Key Establishments for Static Sensor Networks," SASN 2003.
-
(2003)
-
-
Liu, D.1
Ning, P.2
-
47
-
-
0003973079
-
Interconnections: Bridges and Routers
-
Addison-Wesley, Reading, MA
-
R. Perlman, Interconnections: Bridges and Routers. Addison-Wesley, Reading, MA, 1993.
-
(1993)
-
-
Perlman, R.1
-
48
-
-
0003843664
-
Ad hoc On-Demand Distance Vector (AODV) Routing
-
IETF RFC, July
-
C. Perkins, E. Belding-Royer and S. Das, "Ad hoc On-Demand Distance Vector (AODV) Routing," IETF RFC, July 2003; //www.faqs.org/rfcs/rfc3561.html.
-
(2003)
-
-
Perkins, C.1
Belding-Royer, E.2
Das, S.3
-
49
-
-
84889469821
-
Draft-guerrero-manet-saodv-02.txt
-
Manel Guerrero Zapata, "Draft-guerrero-manet-saodv-02.txt"; http://ietfreport.isoc.org/idref/draft-guerrero-manet-saodv/.
-
-
-
Manel Guerrero Zapata1
-
50
-
-
0036980294
-
Securing Ad hoc Routing Protocols
-
WiSe, September
-
M. G. Zapata and N. Asokan, "Securing Ad hoc Routing Protocols," WiSe, September 2002.
-
(2002)
-
-
Zapata, M.G.1
Asokan, N.2
-
51
-
-
0842283101
-
A Secure Routing Protocol for Ad hoc Networks
-
International Conference on Network Protocols (ICNP)
-
K. Sanzgiri, B. Dahill, B. N. Levine, C. Shields, and E. M. Belding-Royer, "A Secure Routing Protocol for Ad hoc Networks," in International Conference on Network Protocols (ICNP), 2002.
-
(2002)
-
-
Sanzgiri, K.1
Dahill, B.2
Levine, B.N.3
Shields, C.4
Belding-Royer, E.M.5
-
52
-
-
4143142052
-
A Security-Aware Routing Protocol forWireless Ad Hoc Networks
-
S. Yi, P. Naldurg, and R. Kravets, "A Security-Aware Routing Protocol forWireless Ad Hoc Networks," in 6th World Multi-Conference on Systemics, Cybernetics and Informatics (SCI 2002), 2002.
-
(2002)
6th World Multi-Conference on Systemics, Cybernetics and Informatics (SCI 2002)
-
-
Yi, S.1
Naldurg, P.2
Kravets, R.3
-
53
-
-
0003597247
-
The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks (DSR)
-
IETF Draft, draft-ietf-manet-dsr-10.txt, July
-
D. B. Johnson et al., "The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks (DSR)," IETF Draft, draft-ietf-manet-dsr-10.txt, July 2004.
-
(2004)
-
-
Johnson, D.B.1
-
57
-
-
85031307530
-
Highly Dynamic Destination-Sequenced Distance-vector Routing (DSDV) for Mobile Computers
-
SIGCOMM, UK
-
C. E. Perkins and P. Bhagwat, "Highly Dynamic Destination-Sequenced Distance-vector Routing (DSDV) for Mobile Computers," SIGCOMM, UK, 1994.
-
(1994)
-
-
Perkins, C.E.1
Bhagwat, P.2
-
58
-
-
85106319926
-
A Performance Comparison of Multihop Wireless Ad Hoc Network Routing Protocols
-
October
-
J. Broch, D. Maltz, D. Johnson, Y. Hu, and J. Jetcheva, "A Performance Comparison of Multihop Wireless Ad Hoc Network Routing Protocols," Proceedings of the Fourth Annual ACM/IEEE International Conference on Mobile Computing and Networking (Mobicom 98), October 1998.
-
(1998)
Proceedings of the Fourth Annual ACM/IEEE International Conference on Mobile Computing and Networking (Mobicom 98)
-
-
Broch, J.1
Maltz, D.2
Johnson, D.3
Hu, Y.4
Jetcheva, J.5
-
59
-
-
11244269535
-
SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks
-
Y.-C. Hu, D. B. Johnson, and A. Perrig. "SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks," Ad Hoc Networks, 1(1), 175-192 (2003).
-
(2003)
Ad Hoc Networks
, vol.1
, Issue.1
, pp. 175-192
-
-
Hu, Y.-C.1
Johnson, D.B.2
Perrig, A.3
-
60
-
-
35048873245
-
Securing the Destination Sequenced Distance Vector Routing Protocol (S-DSDV)
-
October, Malaga. Lecture Notes in Computer Science, J. Lopez, S. Qing, and E. Okamoto, eds. Berlin, Springer
-
T. Wan, E. Kranakis, and P. Van Oorschot, "Securing the Destination Sequenced Distance Vector Routing Protocol (S-DSDV)," in Proceedings of 6th International Conference on Information and Communications Security (ICICS'04), October 2004, Malaga. Lecture Notes in Computer Science, Vol. 3269, J. Lopez, S. Qing, and E. Okamoto, eds. Berlin, Springer, 2004.
-
(2004)
Proceedings of 6th International Conference on Information and Communications Security (ICICS'04)
, vol.3269
-
-
Wan, T.1
Kranakis, E.2
Van Oorschot, P.3
-
61
-
-
0003938947
-
Optimized Link State Routing Protocol (OLSR)
-
IETF RFC 3626, October
-
T. Clausen and P. Jacquet, eds, "Optimized Link State Routing Protocol (OLSR)," IETF RFC 3626, October 2003; //www.ietf.org/rfc/rfc3626.txt.
-
(2003)
-
-
Clausen, T.1
Jacquet, P.2
-
62
-
-
84889339036
-
Secure Extension to the OLSR Protocol
-
OLSR Interop and Workshop
-
A. Halfslund, A. Tonnesen, R. B. Rotvik, J. Andersson, and O. Kure, "Secure Extension to the OLSR Protocol," OLSR Interop and Workshop, 2004.
-
(2004)
-
-
Halfslund, A.1
Tonnesen, A.2
Rotvik, R.B.3
Andersson, J.4
Kure, O.5
-
63
-
-
14844323027
-
An Advanced Signature System for OLSR
-
SASN'04, October
-
D. Raffo, T. Clausen, C. Adjih, and P. Muhlethaler, "An Advanced Signature System for OLSR," SASN'04, October 2004.
-
(2004)
-
-
Raffo, D.1
Clausen, T.2
Adjih, C.3
Muhlethaler, P.4
-
64
-
-
84866985446
-
Securing the OLSR Protocol
-
June
-
C. Adjih, T. Clausen, P. Jacquet, A. Laouiti, P. Muhlethaler, and D. Raffo, "Securing the OLSR Protocol," Proceedings of Med-Hoc-Net, June 2003.
-
(2003)
Proceedings of Med-Hoc-Net
-
-
Adjih, C.1
Clausen, T.2
Jacquet, P.3
Laouiti, A.4
Muhlethaler, P.5
Raffo, D.6
-
66
-
-
3042632485
-
ANODR: Anonymous On Demand Routing with Untraceable Routes for Mobile Ad-hoc Networks
-
ACM MobiHoc, June
-
J. Kong and X. Hong, "ANODR: Anonymous On Demand Routing with Untraceable Routes for Mobile Ad-hoc Networks," ACM MobiHoc, June 2003.
-
(2003)
-
-
Kong, J.1
Hong, X.2
-
67
-
-
84889451594
-
MASK: an Anonymous Routing Protocol for Mobile Ad Hoc Networks
-
in press
-
Y. Zhang, W. Liu, W. Lou, and Y. Fang, "MASK: an Anonymous Routing Protocol for Mobile Ad Hoc Networks," IEEE Transaction on Wireless Communications, in press.
-
IEEE Transaction on Wireless Communications
-
-
Zhang, Y.1
Liu, W.2
Lou, W.3
Fang, Y.4
-
68
-
-
25844443821
-
Anonymous Communications in Mobile Ad hoc Networks
-
IEEE INFOCOM 2005, Miami, FL, March
-
Y. Zhang, W. Liu, and W. Lou, "Anonymous Communications in Mobile Ad hoc Networks," IEEE INFOCOM 2005, Miami, FL, March 2005.
-
(2005)
-
-
Zhang, Y.1
Liu, W.2
Lou, W.3
-
69
-
-
0012970453
-
Identify-based Encryption from the Weil Pairing
-
Springer, Berlin
-
D. Boneh and M. Franklin, "Identify-based Encryption from the Weil Pairing," in Proc. CRYPTO 01, Springer, Berlin, 2001.
-
(2001)
Proc. CRYPTO 01
-
-
Boneh, D.1
Franklin, M.2
-
70
-
-
0842304788
-
Efficient Algorithms for Pairing-Based Cryptosystems
-
Springer Berlin, August
-
P. S. L. M. Barreto, H. Y. Kim, B. Bynn, and M. Scott, "Efficient Algorithms for Pairing-Based Cryptosystems," in Proc. CRYPTO 02, Springer Berlin, August 2002.
-
(2002)
Proc. CRYPTO 02
-
-
Barreto, P.S.L.M.1
Kim, H.Y.2
Bynn, B.3
Scott, M.4
-
71
-
-
0041973497
-
Packet Leashes: a Defense Against Wormhole Attacks in Wireless Ad Hoc Networks
-
San Francisco, CA, April
-
Y. Hu, A. Perrig, and D. Johnson, "Packet Leashes: a Defense Against Wormhole Attacks in Wireless Ad Hoc Networks," in Proceedings of INFOCOM, San Francisco, CA, April 2003, pp. 1976-1986.
-
(2003)
Proceedings of INFOCOM
, pp. 1976-1986
-
-
Hu, Y.1
Perrig, A.2
Johnson, D.3
-
72
-
-
84977898401
-
Using Directional Antennas to Prevent Wormhole Attacks
-
San Diego, CA, 5-6 February
-
L. Hu and D. Evans, "Using Directional Antennas to Prevent Wormhole Attacks," Network and Distributed System Security Symposium, San Diego, CA, 5-6 February 2004.
-
(2004)
Network and Distributed System Security Symposium
-
-
Hu, L.1
Evans, D.2
-
73
-
-
34548347881
-
A Graph Theoretic Framework for Preventing the Wormhole Attack in Wireless Ad Hoc Networks
-
press
-
R. Poovendran and L. Lazos, "A Graph Theoretic Framework for Preventing the Wormhole Attack in Wireless Ad Hoc Networks," ACM Journal on Wireless Networks (WINET), in press.
-
ACM Journal on Wireless Networks (WINET)
-
-
Poovendran, R.1
Lazos, L.2
-
74
-
-
1542317831
-
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols
-
ACM, San Diego, CA, September
-
Y.-C. Hu, A. Perrig, and D. B. Johnson, "Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols," Proceedings of the 2003 ACM Workshop on Wireless Security (WiSe 2003), ACM, San Diego, CA, September 2003, pp. 30-40.
-
(2003)
Proceedings of the 2003 ACM Workshop on Wireless Security (WiSe 2003)
, pp. 30-40
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
76
-
-
3042785862
-
The Sybil Attack in Sensor Networks: Analysis and Defenses (PS, PDF, BIB)
-
J. Newsome, A. Perrig, E. Shi, and D. Song, "The Sybil Attack in Sensor Networks: Analysis and Defenses (PS, PDF, BIB)," Third International Symposium on Information Processing in Sensor Networks (IPSN), 2004.
-
(2004)
Third International Symposium on Information Processing in Sensor Networks (IPSN)
-
-
Newsome, J.1
Perrig, A.2
Shi, E.3
Song, D.4
-
77
-
-
38549179594
-
Defending Sybil Attacks in Sensor Networks
-
June
-
Q. Zhang, P. Wang, D. S. Reeves, and P. Ning, "Defending Sybil Attacks in Sensor Networks," in Proceedings of the International Workshop on Security in Distributed Computing Systems (SDCS-2005), June 2005, pp. 185-191.
-
(2005)
Proceedings of the International Workshop on Security in Distributed Computing Systems (SDCS-2005)
, pp. 185-191
-
-
Zhang, Q.1
Wang, P.2
Reeves, D.S.3
Ning, P.4
-
78
-
-
0003792238
-
StreamControl Transmission Protocol
-
; IETF RFC 2960, October
-
R. Stewart, Q. Xie, K.Morneault, C. Sharp, H. Schwarzbauer, T. Taylor, I. Rytina,M. Kalla, L. Zhang, andV. Paxson, "StreamControl Transmission Protocol," IETF RFC 2960, October 2000.
-
(2000)
-
-
Stewart, R.1
Xie, Q.2
Morneault, K.3
Sharp, C.4
Schwarzbauer, H.5
Taylor, T.6
Rytina, I.7
Kalla, M.8
Zhang, L.9
Paxson, V.10
-
79
-
-
1642309265
-
Hackers Beware
-
Sams Publishing, Indianapolis, Indiana
-
E. Cole. Hackers Beware, Sams Publishing, Indianapolis, Indiana, 2001.
-
(2001)
-
-
Cole, E.1
-
80
-
-
33144457480
-
Efficacy of Misuse Detection in Ad Hoc Networks: Part I
-
D. Subhadrabandhu, S. Sarkar, and F. Anjum, "Efficacy of Misuse Detection in Ad Hoc Networks: Part I," IEEE Journal for Selected Areas in Communications, special issue on Security in Wireless Networks, 24(2), 274-290 (2006).
-
(2006)
IEEE Journal for Selected Areas in Communications, special issue on Security in Wireless Networks
, vol.24
, Issue.2
, pp. 274-290
-
-
Subhadrabandhu, D.1
Sarkar, S.2
Anjum, F.3
-
81
-
-
33144490460
-
Efficacy of Misuse Detection in Ad Hoc Networks: Part II
-
D. Subhadrabandhu, S. Sarkar, and F. Anjum, "Efficacy of Misuse Detection in Ad Hoc Networks: Part II," IEEE Journal for Selected Areas in Communications, special issue on Security in Wireless Networks, 24(2), 290-305 (2006).
-
(2006)
IEEE Journal for Selected Areas in Communications, special issue on Security in Wireless Networks
, vol.24
, Issue.2
, pp. 290-305
-
-
Subhadrabandhu, D.1
Sarkar, S.2
Anjum, F.3
-
82
-
-
84889292571
-
RIDA: Robust Intrusion Detection in Ad Hoc Networks
-
University of Waterloo, Ontario, 2-5 May
-
D. Subhadrabandhu, S. Sarkar, and F. Anjum, "RIDA: Robust Intrusion Detection in Ad Hoc Networks," in Proceedings of 2005 IFIP Networking Conference, University of Waterloo, Ontario, 2-5 May 2005.
-
(2005)
Proceedings of 2005 IFIP Networking Conference
-
-
Subhadrabandhu, D.1
Sarkar, S.2
Anjum, F.3
-
83
-
-
20344400125
-
Efficacy of Misuse Detection in Adhoc Networks
-
Santa Clara, CA, 4-7 October
-
D. Subhadrabandhu, S. Sarkar, and F. Anjum, "Efficacy of Misuse Detection in Adhoc Networks," in Proceedings of the IEEE International Conference on Sensor and Ad hoc Communications and Networks (SECON), 2004, Santa Clara, CA, 4-7 October 2004.
-
(2004)
Proceedings of the IEEE International Conference on Sensor and Ad hoc Communications and Networks (SECON)
-
-
Subhadrabandhu, D.1
Sarkar, S.2
Anjum, F.3
-
84
-
-
0034541756
-
Mitigating Routing Misbehavior in Mobile Ad Hoc Networks
-
Boston, MA, August
-
S. Marti, T. J. Giuli, K. Lai, and M. Baker, "Mitigating Routing Misbehavior in Mobile Ad Hoc Networks," in Proceedings of the 6th International Conference on Mobile Computing and Networking, Boston, MA, August 2000, pp. 255-265.
-
(2000)
Proceedings of the 6th International Conference on Mobile Computing and Networking
, pp. 255-265
-
-
Marti, S.1
Giuli, T.J.2
Lai, K.3
Baker, M.4
-
85
-
-
85117735487
-
A General Cooperative Intrusion Detection Architecture for MANETs
-
March
-
D. Sterne, P. Balasubramanyam, D. Carman, B. Wilson, R. Talpade, C. Ko, R. Balupari, C. Tseng, T. Bowen, K. Levitt, and J. Rowe, "A General Cooperative Intrusion Detection Architecture for MANETs," in 3rd IEEE International Workshop on Information Assurance, March 2005.
-
(2005)
3rd IEEE International Workshop on Information Assurance
-
-
Sterne, D.1
Balasubramanyam, P.2
Carman, D.3
Wilson, B.4
Talpade, R.5
Ko, C.6
Balupari, R.7
Tseng, C.8
Bowen, T.9
Levitt, K.10
Rowe, J.11
-
87
-
-
0012797660
-
WCA: a Weighted Clustering Algorithm for Mobile Ad hoc Networks
-
M. Chatterjee, S. K. Das, and D. Turgut, "WCA: a Weighted Clustering Algorithm for Mobile Ad hoc Networks," Journal of Cluster Computing (special issue on Mobile Ad hoc Networks), 5(2), 193-204 (2002).
-
(2002)
Journal of Cluster Computing (special issue on Mobile Ad hoc Networks)
, vol.5
, Issue.2
, pp. 193-204
-
-
Chatterjee, M.1
Das, S.K.2
Turgut, D.3
-
88
-
-
0035009259
-
A Clustering Scheme for Hierarchical Control in Multi-hop Wireless Networks
-
S. Banerjee and S. Khuller, "A Clustering Scheme for Hierarchical Control in Multi-hop Wireless Networks," IEEE Infocom, 2001, pp. 1028-1037.
-
(2001)
IEEE Infocom
, pp. 1028-1037
-
-
Banerjee, S.1
Khuller, S.2
-
89
-
-
0031126049
-
A Cluster-based Approach for Routing in Dynamic Networks
-
P. Krishna, N. H. Vaidya, M. Chatterjee, and D.K. Pradhan, "A Cluster-based Approach for Routing in Dynamic Networks," ACM SIGCOMM Computer Communications Review, 27(20), 49-64 (1997).
-
(1997)
ACM SIGCOMM Computer Communications Review
, vol.27
, Issue.20
, pp. 49-64
-
-
Krishna, P.1
Vaidya, N.H.2
Chatterjee, M.3
Pradhan, D.K.4
-
91
-
-
0002101577
-
Reputation Systems
-
P. Resnick, R. Zeckhauser, E. Friedman, and K. Kuwabara, "Reputation Systems," Communications of the ACM, 43(12), 45-48 (2000).
-
(2000)
Communications of the ACM
, vol.43
, Issue.12
, pp. 45-48
-
-
Resnick, P.1
Zeckhauser, R.2
Friedman, E.3
Kuwabara, K.4
-
93
-
-
10644289075
-
Core: a Collaborative Reputation mechanism to enforce node cooperation inMobileAdHocNetworks
-
P. Michiardi and R. Molva, "Core: a Collaborative Reputation mechanism to enforce node cooperation inMobileAdHocNetworks," Communication and Multimedia Security Conference, 2002.
-
(2002)
Communication and Multimedia Security Conference
-
-
Michiardi, P.1
Molva, R.2
-
94
-
-
34547587401
-
ReputationMethods for Routing Security forMobile Ad Hoc Networks
-
Bratislava, October 2003, IEEE Press, New York
-
P.-W. Yau and C. J.Mitchell, "ReputationMethods for Routing Security forMobile Ad Hoc Networks," in Proceedings of SympoTIC'03, Joint ISTWorkshop on Mobile Future and Symposium on Trends in Communications, Bratislava, October 2003, IEEE Press, New York 2003, pp. 130-137.
-
(2003)
Proceedings of SympoTIC'03, Joint ISTWorkshop on Mobile Future and Symposium on Trends in Communications
, pp. 130-137
-
-
Yau, P.-W.1
Mitchell, C.J.2
-
96
-
-
0042877095
-
Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks
-
Technical Report no. DSC/2001/046, Swiss Federal Institute of Technology, Lausanne, August
-
L. Buttyan and J.-P. Hubaux, "Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks," Technical Report no. DSC/2001/046, Swiss Federal Institute of Technology, Lausanne, August 2001.
-
(2001)
-
-
Buttyan, L.1
Hubaux, J.-P.2
-
97
-
-
0042660545
-
Stimulating Cooperation in Self-organizing Mobile Ad Hoc Networks
-
March
-
L. Buttyan and J.-P. Hubaux, "Stimulating Cooperation in Self-organizing Mobile Ad Hoc Networks," MONET Journal of Mobile Networks, March 2002, pp. 579-592.
-
(2002)
MONET Journal of Mobile Networks
, pp. 579-592
-
-
Buttyan, L.1
Hubaux, J.-P.2
-
99
-
-
33847407910
-
Detecting Coordinated Attacks in Tactical Wireless Networks using Cooperative Signature-based Detectors
-
Milcom, October
-
M. Little and C. Ko, "Detecting Coordinated Attacks in Tactical Wireless Networks using Cooperative Signature-based Detectors," Milcom, October 2005.
-
(2005)
-
-
Little, M.1
Ko, C.2
-
100
-
-
2442509056
-
Decentralized Event Correlation for Intrusion Detection
-
Seoul, 6-7 December
-
C. Kruegel, T. Toth, and C. Kerer, "Decentralized Event Correlation for Intrusion Detection," in Proceedings of Information Security and Cryptology (ICISC), Seoul, 6-7 December 2001, pp. 114-131.
-
(2001)
Proceedings of Information Security and Cryptology (ICISC)
, pp. 114-131
-
-
Kruegel, C.1
Toth, T.2
Kerer, C.3
-
101
-
-
0842331554
-
Detecting Malicious Packet Dropping Using Statistically Regular Traffic Patterns in Multihop Wireless Networks that are not Bandwidth Limited
-
San Francisco, December
-
R. Rao and G. Kesidis, "Detecting Malicious Packet Dropping Using Statistically Regular Traffic Patterns in Multihop Wireless Networks that are not Bandwidth Limited," in Proceedings of IEEE Globecom, San Francisco, December 2003.
-
(2003)
Proceedings of IEEE Globecom
-
-
Rao, R.1
Kesidis, G.2
-
105
-
-
0041473688
-
Intrusion Detection Techniques for Mobile Wireless Networks
-
Y. Zhang, W. Lee, and Y. Huang, "Intrusion Detection Techniques for Mobile Wireless Networks," in Mobile Networks and Applications, 9(5), 545-556 (2003).
-
(2003)
Mobile Networks and Applications
, vol.9
, Issue.5
, pp. 545-556
-
-
Zhang, Y.1
Lee, W.2
Huang, Y.3
-
106
-
-
0036506787
-
Security and Management Policy Specification
-
M. Slomin and E. Lupu, "Security and Management Policy Specification," IEEE Network, 16(2), 10-19 (2002).
-
(2002)
IEEE Network
, vol.16
, Issue.2
, pp. 10-19
-
-
Slomin, M.1
Lupu, E.2
-
107
-
-
84893084758
-
A Policy Language for a Pervasive Computing Environment
-
Policy 2003, Lake Como, Italy
-
L. Kagal, T. Finin, and A. Joshi, "A Policy Language for a Pervasive Computing Environment," IEEE 4th International Workshop on Policies for Distributed Systems and Networks, Policy 2003, Lake Como, Italy, 2003.
-
(2003)
IEEE 4th International Workshop on Policies for Distributed Systems and Networks
-
-
Kagal, L.1
Finin, T.2
Joshi, A.3
-
109
-
-
0032596611
-
A Policy Description Language
-
Orlando, FL, July
-
J. Lobo, R. Bhatia, and S. Naqvi, "A Policy Description Language," in Proceedings of AAAI, Orlando, FL, July 1999.
-
(1999)
Proceedings of AAAI
-
-
Lobo, J.1
Bhatia, R.2
Naqvi, S.3
-
110
-
-
1542597401
-
Ismene: Provisioning and Policy Reconciliation in Secure Group Communication
-
Technical Report CSE-TR-438-00, Electrical Engineering and Computer Science, University of Michigan, December
-
P. McDaniel and A Prakash, "Ismene: Provisioning and Policy Reconciliation in Secure Group Communication," Technical Report CSE-TR-438-00, Electrical Engineering and Computer Science, University of Michigan, December 2000.
-
(2000)
-
-
McDaniel, P.1
Prakash, A.2
-
111
-
-
84964476016
-
Flexibly Constructing Secure Groups in Antigone 2.0
-
DISCEX 20001, California, June
-
P. McDaniel, A. Prakash, J. Irrer, S. Mittal, and T. Thuang, "Flexibly Constructing Secure Groups in Antigone 2.0," DISCEX 20001, California, June 2001.
-
(2001)
-
-
McDaniel, P.1
Prakash, A.2
Irrer, J.3
Mittal, S.4
Thuang, T.5
-
112
-
-
84889492882
-
Information Survivability Conference and Exposition
-
DISCEX, Washington DC,April 2003
-
Information Survivability Conference and Exposition, DISCEX 2003,Washington DC,April 2003.
-
(2003)
-
-
-
113
-
-
84889373021
-
Information Survivability Conference and Exposition
-
DARPA, DISCEX 2001, Anaheim, CA, June
-
DARPA, Information Survivability Conference and Exposition, DISCEX 2001, Anaheim, CA, June 2001.
-
(2001)
-
-
-
114
-
-
11244271702
-
Policy-Based Mobile Ad Hoc Network Management
-
Yorktown Heights, NY, June
-
R. Chadha, Y.-H. Cheng, J. Chiang, G. Levin, S.-W. Li, and A. Poylisher, "Policy-Based Mobile Ad Hoc Network Management," Policy 2004, Yorktown Heights, NY, June 2004.
-
(2004)
Policy 2004
-
-
Chadha, R.1
Cheng, Y.-H.2
Chiang, J.3
Levin, G.4
Li, S.-W.5
Poylisher, A.6
-
115
-
-
27744537384
-
Policy-Based Mobile Ad Hoc Network Management for DRAMA
-
Milcom
-
R. Chadha, Y.-H. Cheng, J. Chiang, G. Levin, S.-W. Li, and A. Poylisher, "Policy-Based Mobile Ad Hoc Network Management for DRAMA," Milcom, 2004.
-
(2004)
-
-
Chadha, R.1
Cheng, Y.-H.2
Chiang, J.3
Levin, G.4
Li, S.-W.5
Poylisher, A.6
-
116
-
-
33847418864
-
Scalable Policy Management for Ad Hoc Networks
-
Milcom
-
R. Chadha, Y.-H. Cheng, J. Chiang, G. Levin, S.-W. Li, A. Poylisher, L. LaVergn, and S. Newan, "Scalable Policy Management for Ad Hoc Networks," Milcom, 2005.
-
(2005)
-
-
Chadha, R.1
Cheng, Y.-H.2
Chiang, J.3
Levin, G.4
Li, S.-W.5
Poylisher, A.6
LaVergn, L.7
Newan, S.8
-
117
-
-
0004247820
-
COPS Usage for RSVP
-
IETF RFC 2749, January
-
S. Herzog, J. Boyle, R. Cohen, D. Durham, R. Rajan and A. Sastry, "COPS Usage for RSVP," IETF RFC 2749, January 2000.
-
(2000)
-
-
Herzog, S.1
Boyle, J.2
Cohen, R.3
Durham, D.4
Rajan, R.5
Sastry, A.6
-
118
-
-
0003952766
-
Resource ReSerVation Protocol (RSVP)-Version 1 Functional Specification
-
IETF RFC 2205, September
-
R. Braden, "Resource ReSerVation Protocol (RSVP)-Version 1 Functional Specification," IETF RFC 2205, September 1997.
-
(1997)
-
-
Braden, R.1
-
119
-
-
0003522194
-
COPS Usage for Policy Provisioning (COPS-PR)
-
IETF RFC 3084, March
-
K. Chan, J. Seligson, D. Durham, S. Gai, K. McCloghrie, S. Herzog, F. Reichmeyer, R. Yavatkar, and A. Smith, "COPS Usage for Policy Provisioning (COPS-PR)," IETF RFC 3084, March 2001.
-
(2001)
-
-
Chan, K.1
Seligson, J.2
Durham, D.3
Gai, S.4
McCloghrie, K.5
Herzog, S.6
Reichmeyer, F.7
Yavatkar, R.8
Smith, A.9
-
120
-
-
0004094192
-
Lightweight Directory Access Protocol (v3)
-
IETF RFC 2251, December
-
M. Wahl, T. Howes, and S. Kille, "Lightweight Directory Access Protocol (v3)," IETF RFC 2251, December 1997.
-
(1997)
-
-
Wahl, M.1
Howes, T.2
Kille, S.3
-
121
-
-
0029700344
-
Decentralized Trust Management
-
IEEE Computer Society, New York
-
M. Blaze, J. Feigenbaum, and J. Lacy, "Decentralized Trust Management," Proceedings of the 17th IEEE Symposium on Security and Privacy, IEEE Computer Society, New York, 1996, pp. 164-173.
-
(1996)
Proceedings of the 17th IEEE Symposium on Security and Privacy
, pp. 164-173
-
-
Blaze, M.1
Feigenbaum, J.2
Lacy, J.3
-
122
-
-
0004078695
-
The KeyNote Trust-Management System Version 2
-
IETF RFC 2704, September
-
M. Blaze, J. Feigenbaum, J. Ioannidis, and A. Keromytis, "The KeyNote Trust-Management System Version 2," IETF RFC 2704, September 1999.
-
(1999)
-
-
Blaze, M.1
Feigenbaum, J.2
Ioannidis, J.3
Keromytis, A.4
-
123
-
-
61449106579
-
The STRONGMAN Architecture
-
DISCEX 20003, Washington, DC, April
-
A. D. Keromytis, S. Ioannidis, M. Greenwald, and J. Smith, "The STRONGMAN Architecture," DISCEX 20003, Washington, DC, April 2003.
-
(2003)
-
-
Keromytis, A.D.1
Ioannidis, S.2
Greenwald, M.3
Smith, J.4
-
124
-
-
84964467772
-
Automatic Management of Network Security Policy
-
DISCEX 2001, California, June
-
J. Burns, A. Cheng, P. Gurung, S. Rajagopalan, P. Rao, D. Rosenbluth, A. V. Surendran, and D. M. Martin Jr., "Automatic Management of Network Security Policy," DISCEX 2001, California, June 2001.
-
(2001)
-
-
Burns, J.1
Cheng, A.2
Gurung, P.3
Rajagopalan, S.4
Rao, P.5
Rosenbluth, D.6
Surendran, A.V.7
Martin Jr, D.M.8
-
125
-
-
84964562215
-
Security at the Network Edge: A Distributed Firewall Architecture
-
DISCEX 20001, California, June
-
T. Markham and C. Payne, "Security at the Network Edge: A Distributed Firewall Architecture," DISCEX 20001, California, June 2001.
-
(2001)
-
-
Markham, T.1
Payne, C.2
-
126
-
-
85116486060
-
Location-aided Routing (LAR) in Mobile Ad hoc Networks
-
Y. B. Ko, and N. Vaidya, "Location-aided Routing (LAR) in Mobile Ad hoc Networks," in Proceedings of MobiCom, 1998, pp. 66-75.
-
(1998)
Proceedings of MobiCom
, pp. 66-75
-
-
Ko, Y.B.1
Vaidya, N.2
-
127
-
-
85089416445
-
A Distance Routing Effect Algorithm for Mobility (DREAM)
-
Dallas, TX, October
-
S. Basagni, I. Chlamtac, V. Syrotiuk, and B. Woodward, "A Distance Routing Effect Algorithm for Mobility (DREAM)," in Proceedings of MOBICOM, Dallas, TX, October 1998, pp. 76-84.
-
(1998)
Proceedings of MOBICOM
, pp. 76-84
-
-
Basagni, S.1
Chlamtac, I.2
Syrotiuk, V.3
Woodward, B.4
-
128
-
-
0034547115
-
GPSR: Greedy Perimeter Stateless Routing for Wireless Networks
-
Karp, B. and Kung, H.T., "GPSR: Greedy Perimeter Stateless Routing for Wireless Networks," in Proceedings of MobiCom. 2000, pp. 243-254.
-
(2000)
Proceedings of MobiCom
, pp. 243-254
-
-
Karp, B.1
Kung, H.T.2
-
129
-
-
0030714489
-
Geographic Addressing and Routing
-
Budapest, 26-30 September
-
J. C. Navas and T. Imielinski, "Geographic Addressing and Routing," in MOBICOM, Budapest, 26-30 September 1997.
-
(1997)
MOBICOM
-
-
Navas, J.C.1
Imielinski, T.2
-
130
-
-
0000629443
-
Dynamic Source Routing in Ad Hoc Wireless Networks
-
D. Johnson and D. Maltz, "Dynamic Source Routing in Ad Hoc Wireless Networks," Mobile Computing, 1996, pp. 153-181.
-
(1996)
Mobile Computing
, pp. 153-181
-
-
Johnson, D.1
Maltz, D.2
-
131
-
-
0031353437
-
A Highly Adaptive Distributed Routing Algorithm for Mobile Wireless Networks
-
V. Park and M. Corson, "A Highly Adaptive Distributed Routing Algorithm for Mobile Wireless Networks," Proc. Infocom, 1997.
-
(1997)
Proc. Infocom
-
-
Park, V.1
Corson, M.2
-
133
-
-
0036346677
-
Performance Comparison of Two Location Based Routing Protocols for Ad Hoc Networks
-
T. Camp, J. Boleng, B. Williams, L. Wilcox, and W. Navidi, "Performance Comparison of Two Location Based Routing Protocols for Ad Hoc Networks," Proc. IEEE Infocom, 2002.
-
(2002)
Proc. IEEE Infocom
-
-
Camp, T.1
Boleng, J.2
Williams, B.3
Wilcox, L.4
Navidi, W.5
-
134
-
-
0141787007
-
Energy-aware Secure Multicast Communication in Ad-hoc Networks Using Geographic Location Information
-
Hong Kong, April
-
L. Lazos and R. Poovendran, "Energy-aware Secure Multicast Communication in Ad-hoc Networks Using Geographic Location Information," in Proceedings of IEEE ICASSP, Hong Kong, April 2003, Vol. 6, pp. 201-204.
-
(2003)
Proceedings of IEEE ICASSP
, vol.6
, pp. 201-204
-
-
Lazos, L.1
Poovendran, R.2
-
135
-
-
0036983290
-
GHT: a Geographic Hash Table for Data-Centric Storage
-
S. Ratnasamy, B. Karp, L. Yin, F. Yu, D. Estrin, R. Govindan, and S. Shenker, "GHT: a Geographic Hash Table for Data-Centric Storage," in Proceedings of WSNA, 2002.
-
(2002)
Proceedings of WSNA
-
-
Ratnasamy, S.1
Karp, B.2
Yin, L.3
Yu, F.4
Estrin, D.5
Govindan, R.6
Shenker, S.7
-
136
-
-
4544244334
-
SIA: Secure Information Aggregation in Sensor Networks
-
B. Przydatek, D. Song, and A. Perrig, "SIA: Secure Information Aggregation in Sensor Networks," ACM SenSys, 2003.
-
(2003)
ACM SenSys
-
-
Przydatek, B.1
Song, D.2
Perrig, A.3
-
138
-
-
1542341270
-
Location-based Authentication: Grounding Cyberspace for Better Security
-
Elsevier, Amsterdam
-
D. E. Denning and P. F. MacDoran, "Location-based Authentication: Grounding Cyberspace for Better Security," in Computer Fraud and Security, Elsevier, Amsterdam, 1996, pp. 12-16; www.cosc.georgetown.edu/denning/infosec/Grounding.txt.
-
(1996)
Computer Fraud and Security
, pp. 12-16
-
-
Denning, D.E.1
MacDoran, P.F.2
-
139
-
-
4544302904
-
The Effect of Mobility-induced Location Errors on Geographic Routing in Mobile Ad Hoc and Sensor Networks: Analysis and Improvement Using Mobility Prediction
-
D. Son, A. Helmy, and B. Krishnamachari, "The Effect of Mobility-induced Location Errors on Geographic Routing in Mobile Ad Hoc and Sensor Networks: Analysis and Improvement Using Mobility Prediction," IEEE Transactions on Mobile Computing, 3(3), 233-245 (2004).
-
(2004)
IEEE Transactions on Mobile Computing
, vol.3
, Issue.3
, pp. 233-245
-
-
Son, D.1
Helmy, A.2
Krishnamachari, B.3
-
140
-
-
3042696776
-
On the Effect of Localization Errors on Geographic Face Routing in Sensor Networks
-
in IPSN'04, 26-27 April 2004, Berkeley, CA
-
K. Seada, A. Helmy, and R. Govindan, "On the Effect of Localization Errors on Geographic Face Routing in Sensor Networks," in IPSN'04, 26-27 April 2004, Berkeley, CA, 2004.
-
(2004)
-
-
Seada, K.1
Helmy, A.2
Govindan, R.3
-
142
-
-
25844493197
-
A Beacon-less Location Discovery Scheme for Wireless Sensor Networks
-
INFOCOM005, 13-17 March, Miami, FL
-
L. Fang, W. Du, and P. Ning, "A Beacon-less Location Discovery Scheme for Wireless Sensor Networks," Proceedings of the IEEE, INFOCOM005, 13-17 March 2005, Miami, FL.
-
(2005)
Proceedings of the IEEE
-
-
Fang, L.1
Du, W.2
Ning, P.3
-
143
-
-
0003460495
-
Understanding GPS Principles and Applications
-
Artech House, Norwood, MA
-
E. Kaplan, Understanding GPS Principles and Applications. Artech House, Norwood, MA, 1996.
-
(1996)
-
-
Kaplan, E.1
-
145
-
-
84889384589
-
-
LORAN
-
LORAN, www.navcen.uscg.mil/loran/Default.htm#Link.
-
-
-
-
147
-
-
0034775930
-
Dynamic Fine-grained Localization in Ad-hoc Networks of Sensors
-
Rome, July
-
A. Savvides, C. Han, and M. Srivastava, "Dynamic Fine-grained Localization in Ad-hoc Networks of Sensors," in Proceedings of ACM MOBICOM, Rome, July 2001, pp. 166-179.
-
(2001)
Proceedings of ACM MOBICOM
, pp. 166-179
-
-
Savvides, A.1
Han, C.2
Srivastava, M.3
-
148
-
-
34249777023
-
Radio Interferometric Geolocation
-
(Vanderbilt University)
-
M. Maroti, B. Kusy, G. Balogh, P. Volgyesi, A. Nadas, K. Molnar, S. Dora, and A. Ledeczi (Vanderbilt University), "Radio Interferometric Geolocation," ACM Sensys 2005.
-
(2005)
ACM Sensys
-
-
Maroti, M.1
Kusy, B.2
Balogh, G.3
Volgyesi, P.4
Nadas, A.5
Molnar, K.6
Dora, S.7
Ledeczi, A.8
-
149
-
-
0041973656
-
Ad Hoc Positioning System (APS) using AoA
-
INFOCOM, San Francisco, CA
-
D. Niculescu and B. Nath, "Ad Hoc Positioning System (APS) using AoA," INFOCOM 2003, San Francisco, CA.
-
(2003)
-
-
Niculescu, D.1
Nath, B.2
-
151
-
-
35248891504
-
Organizing a Global Coordinate System from Local Information on an Ad Hoc Sensor Network
-
R. Nagpal, H. Shrobe, and J. Bachrach, "Organizing a Global Coordinate System from Local Information on an Ad Hoc Sensor Network," in Proceedings of IPSN, Vol. 2634, 2003, pp. 333-348.
-
(2003)
Proceedings of IPSN
, vol.2634
, pp. 333-348
-
-
Nagpal, R.1
Shrobe, H.2
Bachrach, J.3
-
152
-
-
0034291601
-
Gps-less Low Cost Outdoor Localization for Very Small Devices
-
N. Bulusu, J. Heidemann, and D. Estrin, "Gps-less Low Cost Outdoor Localization for Very Small Devices," IEEE Personal Communications Magazine 7(5), 28-34 (2000).
-
(2000)
IEEE Personal Communications Magazine
, vol.7
, Issue.5
, pp. 28-34
-
-
Bulusu, N.1
Heidemann, J.2
Estrin, D.3
-
153
-
-
20844444606
-
Scalable, Ad Hoc Deployable RF-based Localization
-
Vancouver, October
-
N. Bulusu, V. Bychkovskiy, D. Estrin and J. Heidemann, "Scalable, Ad Hoc Deployable RF-based Localization," in Proceedings of the Grace Hopper Celebration of Women in Computing Conference 2002, Vancouver, October 2002.
-
(2002)
Proceedings of the Grace Hopper Celebration of Women in Computing Conference 2002
-
-
Bulusu, N.1
Bychkovskiy, V.2
Estrin, D.3
Heidemann, J.4
-
154
-
-
1542329081
-
Range-free Localization Schemes in Large Scale Sensor Network
-
T. He, C. Huang, B. Blum, J. Stankovic, and T. Abdelzaher, "Range-free Localization Schemes in Large Scale Sensor Network, in Proceedings of ACM MOBICOM, 2003, pp. 81-95.
-
(2003)
Proceedings of ACM MOBICOM
, pp. 81-95
-
-
He, T.1
Huang, C.2
Blum, B.3
Stankovic, J.4
Abdelzaher, T.5
-
156
-
-
25844439422
-
Secure Positioning of Wireless Devices with Application to Sensor Networks
-
S. Capkun and J. Hubaux, "Secure Positioning of Wireless Devices with Application to Sensor Networks," in Proceedings of Infocom, 2005.
-
(2005)
Proceedings of Infocom
-
-
Capkun, S.1
Hubaux, J.2
-
158
-
-
1542317849
-
Secure Verification of Location Claims
-
N. Sastry, U. Shankar, and D. Wagner, "Secure Verification of Location Claims," in Proceedings of ACM WISE, 2002, pp. 1-10.
-
(2002)
Proceedings of ACM WISE
, pp. 1-10
-
-
Sastry, N.1
Shankar, U.2
Wagner, D.3
-
159
-
-
33750318709
-
Proving the Location of Tamper Resistent Devices
-
B. Waters and E. Felten, "Proving the Location of Tamper Resistent Devices," //www.cs.princeton.edu/~bwaters/research/location_proving.ps.
-
-
-
Waters, B.1
Felten, E.2
-
160
-
-
33144454801
-
Secure Positioning in Wireless Networks
-
special issue on security in ad-hoc networks
-
S. Capkun and J. Hubaux, "Secure Positioning in Wireless Networks," IEEE JSAC, special issue on security in ad-hoc networks, 24(2) 221-232 (2006).
-
(2006)
IEEE JSAC
, vol.24
, Issue.2
, pp. 221-232
-
-
Capkun, S.1
Hubaux, J.2
-
163
-
-
84866469313
-
SeRLoc: Robust Localization for Wireless Sensor Networks
-
L. Lazos and R. Poovendran, "SeRLoc: Robust Localization for Wireless Sensor Networks," ACM Sensor Networks, 2005.
-
(2005)
ACM Sensor Networks
-
-
Lazos, L.1
Poovendran, R.2
-
164
-
-
33144475948
-
HiRLoc: Hi-resolution Robust Localization for Wireless Sensor Networks
-
L. Lazos and R. Poovendran, "HiRLoc: Hi-resolution Robust Localization for Wireless Sensor Networks," in IEEE JSAC, special issue on wireless security, 24(2), 233-246 (2006).
-
(2006)
IEEE JSAC, special issue on wireless security
, vol.24
, Issue.2
, pp. 233-246
-
-
Lazos, L.1
Poovendran, R.2
-
166
-
-
33750303903
-
Secure Localization in Sensor Networks using Transmission Range Variation
-
1st International Workshop on Resource Provisioning and Management in Sensor Networks (RPMSN05), IEEE Conference on Mobile Ad Hoc and Sensor Systems, November
-
F. Anjum, S. Pandey, and P. Agrawal, "Secure Localization in Sensor Networks using Transmission Range Variation," 1st International Workshop on Resource Provisioning and Management in Sensor Networks (RPMSN05), IEEE Conference on Mobile Ad Hoc and Sensor Systems, November 2005.
-
(2005)
-
-
Anjum, F.1
Pandey, S.2
Agrawal, P.3
-
167
-
-
84889475834
-
-
Wireless Integrated Network Systems (WINS)
-
Wireless Integrated Network Systems (WINS), http://wins.rsc.rockwell.com/.
-
-
-
-
168
-
-
33144472023
-
ROPE: Robust Position Estimation in Wireless Sensor Networks
-
The Fourth International Conference on Information Processing in Sensor Networks (IPSN 005), April
-
L. Lazos, S. Capkun, and R. Poovendran, "ROPE: Robust Position Estimation in Wireless Sensor Networks," The Fourth International Conference on Information Processing in Sensor Networks (IPSN 005), April 2005.
-
(2005)
-
-
Lazos, L.1
Capkun, S.2
Poovendran, R.3
-
169
-
-
27944459744
-
Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks
-
June
-
D. Liu, P. Ning, and W. Du, "Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks," in Proceedings of the The 25th International Conference on Distributed Computing Systems (ICDCS '05), June 2005, pp. 609-619.
-
(2005)
Proceedings of the The 25th International Conference on Distributed Computing Systems (ICDCS '05)
, pp. 609-619
-
-
Liu, D.1
Ning, P.2
Du, W.3
-
170
-
-
33144467903
-
Attack-resistant Location Estimation in Sensor Networks
-
April
-
D. Liu, P. Ning, and W. Du, "Attack-resistant Location Estimation in Sensor Networks," in Proceedings of The Fourth International Symposium on Information Processing in Sensor Networks (IPSN '05), April 2005, pp. 99-106.
-
(2005)
Proceedings of The Fourth International Symposium on Information Processing in Sensor Networks (IPSN '05)
, pp. 99-106
-
-
Liu, D.1
Ning, P.2
Du, W.3
-
171
-
-
33144467507
-
Robust Statistical Methods for Securing Wireless Localization in Sensor Networks
-
Z. Li, Y. Zhang, W. Trappe, and B. Nath, "Robust Statistical Methods for Securing Wireless Localization in Sensor Networks," in International Symposium on Information Processing in Sensor Networks (IPSN), 2005, pp. 91-98.
-
(2005)
International Symposium on Information Processing in Sensor Networks (IPSN)
, pp. 91-98
-
-
Li, Z.1
Zhang, Y.2
Trappe, W.3
Nath, B.4
-
172
-
-
0036461820
-
Building Safer Cars
-
W. Jones, "Building Safer Cars," IEEE Spectrum, 39(1), 82-85 (2002).
-
(2002)
IEEE Spectrum
, vol.39
, Issue.1
, pp. 82-85
-
-
Jones, W.1
-
174
-
-
33745955725
-
Of Sticker Tags and 5.9 GHz
-
P. Samuel, "Of Sticker Tags and 5.9 GHz," ITS International, 2004.
-
(2004)
ITS International
-
-
Samuel, P.1
-
176
-
-
84977830295
-
Intrusion Detection for Wireless Adhoc Networks
-
Wireless Security Symposium, Orlando, Florida, October
-
F. Anjum, D. Subhadrabandhu, and S. Sarkar, "Intrusion Detection for Wireless Adhoc Networks," Proceedings of Vehicular Technology Conference, Wireless Security Symposium, Orlando, Florida, October 2003.
-
(2003)
Proceedings of Vehicular Technology Conference
-
-
Anjum, F.1
Subhadrabandhu, D.2
Sarkar, S.3
-
179
-
-
11244254627
-
SECTOR: Secure Tracking of Node Encounters in Multi-hop Wireless Networks
-
Washington, DC, October
-
S. Capkun, L. Buttyan, and J.-P. Hubaux, "SECTOR: Secure Tracking of Node Encounters in Multi-hop Wireless Networks," in Proceedings of SASN, Washington, DC, October 2003.
-
(2003)
Proceedings of SASN
-
-
Capkun, S.1
Buttyan, L.2
Hubaux, J.-P.3
-
180
-
-
0034976472
-
Gps-free Positioning in Mobile Ad-hoc Networks
-
S. Capkun, M. Hamdi, and J. Hubaux, "Gps-free Positioning in Mobile Ad-hoc Networks," in Proceedings of HICCSS, 2001, pp. 3481-3490.
-
(2001)
Proceedings of HICCSS
, pp. 3481-3490
-
-
Capkun, S.1
Hamdi, M.2
Hubaux, J.3
-
181
-
-
1542317847
-
BISS: Building Secure Routing out of an Incomplete Set of Secure Associations
-
San Diego, CA, September
-
S. Capkun and J.-P. Hubaux, "BISS: Building Secure Routing out of an Incomplete Set of Secure Associations," in Procedings of 2nd ACM Wireless Security (WiSe'03), San Diego, CA, September 2003, pp. 21-29.
-
(2003)
Procedings of 2nd ACM Wireless Security (WiSe'03)
, pp. 21-29
-
-
Capkun, S.1
Hubaux, J.-P.2
-
183
-
-
0036506789
-
Policy-Based Networking
-
R. Chadha, G. Lapiotis, and S. Wright, "Policy-Based Networking," IEEE Network, special issue, 16(2), (2002).
-
(2002)
IEEE Network
, vol.16
, Issue.SPEC. ISS.
-
-
Chadha, R.1
Lapiotis, G.2
Wright, S.3
-
184
-
-
17444400853
-
Protecting File Systems with Transient Authentication
-
M. Corner and B. Noble, "Protecting File Systems with Transient Authentication," Wireless Networks, 11(1-2), 7-19 (2005).
-
(2005)
Wireless Networks
, vol.11
, Issue.1-2
, pp. 7-19
-
-
Corner, M.1
Noble, B.2
-
185
-
-
84961696448
-
Policy-based Security Management for Large Dynamic Groups: an Overview of the FCCM Project
-
DISCEX 2000, South Carolina, January
-
P. T. Dinsmore, D. M. Balenson, M. Heyman, P. S. Kruus, C. D. Scace, and A. T. Sherman, "Policy-based Security Management for Large Dynamic Groups: an Overview of the FCCM Project," DISCEX 2000, South Carolina, January 2000.
-
(2000)
-
-
Dinsmore, P.T.1
Balenson, D.M.2
Heyman, M.3
Kruus, P.S.4
Scace, C.D.5
Sherman, A.T.6
-
186
-
-
4143106700
-
A Comparison of Routing Strategies for Vehicular Ad Hoc Networks
-
Department of Computer Science, University of Mannheim, Mannheim, Technical Report no. TR-3-2002
-
H. Fuessler, M. Mauve, H. Hartenstein, M. Kaesemann, and D. Vollmer, "A Comparison of Routing Strategies for Vehicular Ad Hoc Networks," Department of Computer Science, University of Mannheim, Mannheim, Technical Report no. TR-3-2002, 2002.
-
(2002)
-
-
Fuessler, H.1
Mauve, M.2
Hartenstein, H.3
Kaesemann, M.4
Vollmer, D.5
-
187
-
-
0010439196
-
Navstar GPS User Equipment Introduction (Public Release Version)
-
Technical Report September
-
U. C. Guard, "Navstar GPS User Equipment Introduction (Public Release Version)," Technical Report September 1996.
-
(1996)
-
-
Guard, U.C.1
-
188
-
-
0003080798
-
The Anatomy of a Context-aware Application
-
Seattle, WA
-
A. Harter, A. Hopper, P. Steggles, A. Ward, and P. Webster, "The Anatomy of a Context-aware Application," in Proceedings of MOBICOM 099, Seattle, WA, 1999.
-
(1999)
Proceedings of MOBICOM 099
-
-
Harter, A.1
Hopper, A.2
Steggles, P.3
Ward, A.4
Webster, P.5
-
189
-
-
33746574489
-
The Multicast Group Security Architecture
-
IETF RFC 3740, March
-
T. Hardjono and B. Weis, "The Multicast Group Security Architecture," IETF RFC 3740, March 2004.
-
(2004)
-
-
Hardjono, T.1
Weis, B.2
-
190
-
-
0003574092
-
Global Positioning System: Theory and Practice
-
Springer, Berlin
-
B. Hofmann-Wellenhof, H. Lichtenegger, and J. Collins, Global Positioning System: Theory and Practice. Springer, Berlin, 1997.
-
(1997)
-
-
Hofmann-Wellenhof, B.1
Lichtenegger, H.2
Collins, J.3
-
191
-
-
84949023663
-
Secret-key Agreement without Public-key Cryptography
-
T. Leighton and S. Micali, "Secret-key Agreement without Public-key Cryptography," in Advances in Cryptology-Crypto 093, 1993, pp. 456-479.
-
(1993)
Advances in Cryptology-Crypto 093
, pp. 456-479
-
-
Leighton, T.1
Micali, S.2
-
193
-
-
24244459823
-
Multicast Security Policy
-
IRTF Internet draft, draft-irtf-smug-mcast-policy-01.txt, November
-
P. McDaniel, H. Harney, P. Dinsmore, and A. Prakash, "Multicast Security Policy," IRTF Internet draft, draft-irtf-smug-mcast-policy-01.txt, November 2000.
-
(2000)
-
-
McDaniel, P.1
Harney, H.2
Dinsmore, P.3
Prakash, A.4
-
194
-
-
84889376779
-
Antigone: Implementing Policy in Secure Group Communication
-
Technical Report CSE-TR-426-00, Electrical Engineering and Computer Science, University of Michigan, May
-
P. McDaniel and A. Prakash, "Antigone: Implementing Policy in Secure Group Communication," Technical Report CSE-TR-426-00, Electrical Engineering and Computer Science, University of Michigan, May 2000.
-
(2000)
-
-
McDaniel, P.1
Prakash, A.2
-
195
-
-
0032651001
-
A Mobility Based Framework for Adaptive Clustering in Wireless Ad-Hoc Networks
-
A. B. McDonald and T. Znati, "A Mobility Based Framework for Adaptive Clustering in Wireless Ad-Hoc Networks," IEEE Journal on Selected Areas in Communications, 17, 1466-1487 (1999).
-
(1999)
IEEE Journal on Selected Areas in Communications
, vol.17
, pp. 1466-1487
-
-
McDonald, A.B.1
Znati, T.2
-
196
-
-
0041973656
-
Ad Hoc Positioning System (APS) using AoA
-
INFOCOM' 03, San Francisco, CA
-
D. Niculescu and B. Nath, "Ad Hoc Positioning System (APS) using AoA," INFOCOM' 03, Vol. 3, San Francisco, CA, 2003, pp. 1734-1743.
-
(2003)
, vol.3
, pp. 1734-1743
-
-
Niculescu, D.1
Nath, B.2
-
197
-
-
18844451022
-
Anchor-free Distributed Localization in Sensor Networks
-
N. Priyantha, H. Balakrishnan, E. Demaine, and S. Teller, "Anchor-free Distributed Localization in Sensor Networks," in Proceedings of ACM SenSys, 2003, pp. 340-341.
-
(2003)
Proceedings of ACM SenSys
, pp. 340-341
-
-
Priyantha, N.1
Balakrishnan, H.2
Demaine, E.3
Teller, S.4
-
198
-
-
0034539094
-
The Cricket Location Support System
-
New York, August
-
N. B. Priyantha, A. Chakraborty, and H. Balakrishnan, "The Cricket Location Support System," in Proceedings of MOBICOM'00, New York, August 2000.
-
(2000)
Proceedings of MOBICOM'00
-
-
Priyantha, N.B.1
Chakraborty, A.2
Balakrishnan, H.3
-
199
-
-
0036983357
-
The Bits and Flops of the N-Hop Multilateration Primitive for Node Localization Problems
-
Atlanta, GA, September
-
A. Savvides, H. Park, and M. Srivastava, "The Bits and Flops of the N-Hop Multilateration Primitive for Node Localization Problems," in First ACM International Workshop on Wireless Sensor Networks and Application, Atlanta, GA, September 2002.
-
(2002)
First ACM International Workshop on Wireless Sensor Networks and Application
-
-
Savvides, A.1
Park, H.2
Srivastava, M.3
-
200
-
-
85084163355
-
Robust Positioning Algorithms for Distributed Ad-Hoc Wireless Sensor Networks
-
USENIX Technical Annual Conference, Monterey, CA, June
-
C. Savarese, J. Rabay, and K. Langendoen, "Robust Positioning Algorithms for Distributed Ad-Hoc Wireless Sensor Networks," USENIX Technical Annual Conference, Monterey, CA, June 2002.
-
(2002)
-
-
Savarese, C.1
Rabay, J.2
Langendoen, K.3
-
201
-
-
0018545449
-
How to Share a Secret
-
A. Shamir, "How to Share a Secret," Communications of the ACM, 22(11), 612-612 (1979).
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612-612
-
-
Shamir, A.1
-
202
-
-
0003902428
-
Cryptography and Network Security: Principles and Practice
-
Prentice Hall, Engelwood Cliffs, NJ
-
W. Stallings, Cryptography and Network Security: Principles and Practice, Prentice Hall, Engelwood Cliffs, NJ, 1999.
-
(1999)
-
-
Stallings, W.1
-
203
-
-
84889378879
-
On Optimal Placement of Intrusion Detection Modules in Wireless Sensor Networks
-
Invited Paper, in Proceedings of Broadnets, San Jose, CA, 25-29 October
-
D. Subhadrabandhu, F. Anjum, S. Sarkar, and R. Shetty, "On Optimal Placement of Intrusion Detection Modules in Wireless Sensor Networks," Invited Paper, in Proceedings of Broadnets, San Jose, CA, 25-29 October 2004.
-
(2004)
-
-
Subhadrabandhu, D.1
Anjum, F.2
Sarkar, S.3
Shetty, R.4
-
204
-
-
4243114087
-
Habitat Monitoring with Sensor Networks
-
R. Szewczyk, E. Osterweil, J. Polastre, M. Hamilton, A. Mainwaring, and D. Estrin, "Habitat Monitoring with Sensor Networks," Communications of ACM, 47, 34-40 (2004).
-
(2004)
Communications of ACM
, vol.47
, pp. 34-40
-
-
Szewczyk, R.1
Osterweil, E.2
Polastre, J.3
Hamilton, M.4
Mainwaring, A.5
Estrin, D.6
-
205
-
-
37149051976
-
KAoS Policy and Domain Services Towards a Description-Logic Approach to Policy Representation, Deconfliction, and Enforcement
-
Workshop on Policies for Distributed Systems and Networks
-
A. Uszok, J. Bradshaw, R. Jeffers, N. Suri, P. Hayes, M. Breedy, L. Bunch, M. Johnson, S. Kulkarni, and J. Lott, "KAoS Policy and Domain Services Towards a Description-Logic Approach to Policy Representation, Deconfliction, and Enforcement," in Policy 2003, Workshop on Policies for Distributed Systems and Networks.
-
(2003)
Policy
-
-
Uszok, A.1
Bradshaw, J.2
Jeffers, R.3
Suri, N.4
Hayes, P.5
Breedy, M.6
Bunch, L.7
Johnson, M.8
Kulkarni, S.9
Lott, J.10
-
206
-
-
0036506790
-
Simplifying Network Administration Using Policy-Based Management
-
D. Verma, "Simplifying Network Administration Using Policy-Based Management," IEEE Network, 16(2), 20-26 (2002).
-
(2002)
IEEE Network
, vol.16
, Issue.2
, pp. 20-26
-
-
Verma, D.1
-
207
-
-
0003754695
-
A Framework for Policy based Admission Control
-
IETF RFC 2753, January
-
R. Yavatkar, D. Pendarakis, and R. Guerin, "A Framework for Policy based Admission Control," IETF RFC 2753, January 2000.
-
(2000)
-
-
Yavatkar, R.1
Pendarakis, D.2
Guerin, R.3
-
208
-
-
33144476837
-
Location-based Compromise-tolerant Security Mechanisms for Wireless Sensor Networks
-
Y. Zhang, W. Liu, W. Lou, and Y. Fang "Location-based Compromise-tolerant Security Mechanisms for Wireless Sensor Networks," IEEE JSAC, special issue on Security in Ad-Hoc Networks, 24(2), 247-260 (2006).
-
(2006)
IEEE JSAC, special issue on Security in Ad-Hoc Networks
, vol.24
, Issue.2
, pp. 247-260
-
-
Zhang, Y.1
Liu, W.2
Lou, W.3
Fang, Y.4
-
209
-
-
33645362360
-
IPsec Configuration Policy Information Model
-
IETF RFC 3585, August
-
J. Jason, L. Rafalow, and E. Vyncke, "IPsec Configuration Policy Information Model," IETF RFC 3585, August 2003.
-
(2003)
-
-
Jason, J.1
Rafalow, L.2
Vyncke, E.3
-
210
-
-
0035424017
-
A Survey and Taxonomy of Location Systems for Ubiquitous Computing
-
J. Hightower and G. Borriella, "A Survey and Taxonomy of Location Systems for Ubiquitous Computing," IEEE Computer, 34(8), 57-66 (2001).
-
(2001)
IEEE Computer
, vol.34
, Issue.8
, pp. 57-66
-
-
Hightower, J.1
Borriella, G.2
|