메뉴 건너뛰기




Volumn 9, Issue 1, 2015, Pages 1-105

A clean slate approach to secure wireless networking

Author keywords

[No Author keywords available]

Indexed keywords

AD HOC NETWORKS; DESIGN; NETWORK PROTOCOLS; TELECOMMUNICATION NETWORKS; WIRELESS AD HOC NETWORKS;

EID: 84940988433     PISSN: 1554057X     EISSN: 15540588     Source Type: Journal    
DOI: 10.1561/1300000037     Document Type: Article
Times cited : (7)

References (44)
  • 3
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • February
    • David L. Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM, 24(2):84-90, February 1981.
    • (1981) Commun. ACM , vol.24 , Issue.2 , pp. 84-90
    • Chaum, D.L.1
  • 5
    • 0032201622 scopus 로고    scopus 로고
    • Private information retrieval
    • November
    • Benny Chor, Eyal Kushilevitz, Oded Goldreich, and Madhu Sudan. Private information retrieval. J. ACM, 45(6):965-981, November 1998.
    • (1998) J. ACM , vol.45 , Issue.6 , pp. 965-981
    • Chor, B.1    Kushilevitz, E.2    Goldreich, O.3    Sudan, M.4
  • 11
    • 33646501487 scopus 로고    scopus 로고
    • Gradient clock synchronization
    • March
    • Rui Fan and Nancy Lynch. Gradient clock synchronization. Distrib. Comput., 18(4):255-266, March 2006.
    • (2006) Distrib. Comput. , vol.18 , Issue.4 , pp. 255-266
    • Fan, R.1    Lynch, N.2
  • 12
    • 79958247985 scopus 로고    scopus 로고
    • Fundamental limits on synchronizing clocks over networks
    • Nikolaos M. Freris, Scott R. Graham, and P. R. Kumar. Fundamental limits on synchronizing clocks over networks. IEEE Trans. Automat. Contr., 56(6):1352-1364, 2011.
    • (2011) IEEE Trans. Automat. Contr. , vol.56 , Issue.6 , pp. 1352-1364
    • Freris, N.M.1    Graham, S.R.2    Kumar, P.R.3
  • 14
    • 0031675225 scopus 로고    scopus 로고
    • Towards an archival intermemory
    • IEEE Computer Society
    • Andrew V. Goldberg and Peter N. Yianilos. Towards an archival intermemory. In ADL, pages 147-156. IEEE Computer Society, 1998.
    • (1998) ADL , pp. 147-156
    • Goldberg, A.V.1    Yianilos, P.N.2
  • 18
    • 11244269535 scopus 로고    scopus 로고
    • Sead: Secure efficient distance vector routing for mobile wireless ad hoc networks
    • Yih-Chun Hu, David B. Johnson, and Adrian Perrig. Sead: secure efficient distance vector routing for mobile wireless ad hoc networks. Ad Hoc Networks, 1:175-192, 2003.
    • (2003) Ad Hoc Networks , vol.1 , pp. 175-192
    • Hu, Y.-C.1    Johnson, D.B.2    Perrig, A.3
  • 20
    • 17444426121 scopus 로고    scopus 로고
    • Ariadne: A secure on-demand routing protocol for ad hoc networks
    • January
    • Yih-Chun Hu, Adrian Perrig, and David B. Johnson. Ariadne: A secure on-demand routing protocol for ad hoc networks. Wireless Networks, 11(1-2):21-38, January 2005.
    • (2005) Wireless Networks , vol.11 , Issue.1-2 , pp. 21-38
    • Hu, Y.-C.1    Perrig, A.2    Johnson, D.B.3
  • 23
    • 0012580890 scopus 로고
    • Integration of security in network routing protocols
    • April
    • Brijesh Kumar. Integration of security in network routing protocols. SIGSAC Rev., 11(2):18-25, April 1993.
    • (1993) SIGSAC Rev. , vol.11 , Issue.2 , pp. 18-25
    • Kumar, B.1
  • 28
    • 0021470560 scopus 로고
    • An upper and lower bound for clock synchronization
    • August/September
    • Jennifer Lundelius and Nancy A. Lynch. An upper and lower bound for clock synchronization. Information and Control, 62(2/3):190-204, August/September 1984.
    • (1984) Information and Control , vol.62 , Issue.2-3 , pp. 190-204
    • Lundelius, J.1    Lynch, N.A.2
  • 30
    • 0003973079 scopus 로고
    • Addison Wesley Longman Publishing Co., Inc., Redwood City, CA, USA
    • Radia Perlman. Interconnections: Bridges and Routers. Addison Wesley Longman Publishing Co., Inc., Redwood City, CA, USA, 1992.
    • (1992) Interconnections: Bridges and Routers
    • Perlman, R.1
  • 32
    • 0036738266 scopus 로고    scopus 로고
    • Spins: Security protocols for sensor networks
    • September
    • Adrian Perrig, Robert Szewczyk, J. D. Tygar, Victor Wen, and David E. Culler. Spins: Security protocols for sensor networks. Wirel. Netw., 8(5):521-534, September 2002.
    • (2002) Wirel. Netw. , vol.8 , Issue.5 , pp. 521-534
    • Perrig, A.1    Szewczyk, R.2    Tygar, J.D.3    Wen, V.4    Culler, D.E.5
  • 35
    • 0001777423 scopus 로고    scopus 로고
    • Anonymous web transactions with crowds
    • February
    • Michael K. Reiter and Aviel D. Rubin. Anonymous web transactions with crowds. Commun. ACM, 42(2):32-48, February 1999.
    • (1999) Commun. ACM , vol.42 , Issue.2 , pp. 32-48
    • Reiter, M.K.1    Rubin, A.D.2
  • 40
    • 85084163931 scopus 로고    scopus 로고
    • Publius: A robust, tamper-evident, censorship-resistant web publishing system
    • SSYM'00, Berkeley, CA, USA, USENIX Association
    • Marc Waldman, Aviel D. Rubin, and Lorrie Faith Cranor. Publius: A robust, tamper-evident, censorship-resistant web publishing system. In Proceedings of the 9th Conference on USENIX Security Symposium - Volume 9, SSYM'00, pages 5-5, Berkeley, CA, USA, 2000. USENIX Association.
    • (2000) Proceedings of the 9th Conference on USENIX Security Symposium , vol.9 , pp. 5-5
    • Waldman, M.1    Rubin, A.D.2    Cranor, L.F.3
  • 42
    • 2442582716 scopus 로고    scopus 로고
    • Secure ad hoc on-demand distance vector routing
    • June
    • Manel Guerrero Zapata. Secure ad hoc on-demand distance vector routing. SIGMOBILE Mob. Comput. Commun. Rev., 6(3):106-107, June 2002.
    • (2002) SIGMOBILE Mob. Comput. Commun. Rev. , vol.6 , Issue.3 , pp. 106-107
    • Zapata, M.G.1
  • 44
    • 0033357103 scopus 로고    scopus 로고
    • Securing ad hoc networks
    • Lidong Zhou and Z.J. Haas. Securing ad hoc networks. Network, IEEE, 13(6):24-30, 1999.
    • (1999) Network, IEEE , vol.13 , Issue.6 , pp. 24-30
    • Zhou, L.1    Haas, Z.J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.