-
1
-
-
84880874867
-
Survey of routing attacks and countermeasures in mobile ad hoc networks
-
Washington, DC, USA, 2013. IEEE Computer Society
-
A. K. Abdelaziz, M. Nafaa, and G. Salim. Survey of routing attacks and countermeasures in mobile ad hoc networks. In Proceedings of the 2013 UKSim 15th International Conference on Computer Modelling and Simulation, UKSIM '13, pages 693-698, Washington, DC, USA, 2013. IEEE Computer Society.
-
Proceedings of the 2013 UKSim 15th International Conference on Computer Modelling and Simulation, UKSIM '13
, pp. 693-698
-
-
Abdelaziz, A.K.1
Nafaa, M.2
Salim, G.3
-
2
-
-
60849083522
-
Xena: An access negotiation framework using xacml
-
D. Abi Haidar, N. Cuppens Boulahia, F. Cuppens, and H. Debar. Xena: an access negotiation framework using xacml. annals of telecommunications-annales des tlcommunications, 64 (1-2): 155-169, 2009.
-
(2009)
Annals of Telecommunications-annales des Tlcommunications
, vol.64
, Issue.1-2
, pp. 155-169
-
-
Abi Haidar, D.1
Cuppens Boulahia, N.2
Cuppens, F.3
Debar, H.4
-
4
-
-
0034777649
-
Intercepting mobile communications: The insecurity of 802. 11
-
New York, NY, USA. ACM
-
N. Borisov, I. Goldberg, and D. Wagner. Intercepting mobile communications: The insecurity of 802. 11. In Proceedings of the 7th Annual International Conference on Mobile Computing and Networking, MobiCom '01, pages 180-189, New York, NY, USA, 2001. ACM.
-
(2001)
Proceedings of the 7th Annual International Conference on Mobile Computing and Networking, MobiCom '01
, pp. 180-189
-
-
Borisov, N.1
Goldberg, I.2
Wagner, D.3
-
6
-
-
84892421665
-
A reputation-based clustering mechanism for manet routing security
-
A. B. Chehida, R. Abassi, and S. G. E. Fatmi. A reputation-based clustering mechanism for manet routing security. The 8th International Conference on Availability, Reliability and Security ARES, pages 310-315, 2013.
-
(2013)
The 8th International Conference on Availability, Reliability and Security ARES
, pp. 310-315
-
-
Chehida, A.B.1
Abassi, R.2
Fatmi, S.G.E.3
-
8
-
-
46749116030
-
Resource classification based negotiation in web services
-
August 29-31, 2007, Manchester, United Kingdom
-
D. A. Haidar, N. Cuppens-Boulahia, F. Cuppens, and H. Debar. Resource classification based negotiation in web services. In Proceedings of the Third International Symposium on Information Assurance and Security, IAS 2007, August 29-31, 2007, Manchester, United Kingdom, pages 313-318, 2007.
-
(2007)
Proceedings of the Third International Symposium on Information Assurance and Security, IAS 2007
, pp. 313-318
-
-
Haidar, D.A.1
Cuppens-Boulahia, N.2
Cuppens, F.3
Debar, H.4
-
9
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
New York, NY, USA. ACM
-
S. Marti, T. J. Giuli, K. Lai, and M. Baker. Mitigating routing misbehavior in mobile ad hoc networks. In Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, MobiCom '00, pages 255-265, New York, NY, USA, 2000. ACM.
-
(2000)
Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, MobiCom '00
, pp. 255-265
-
-
Marti, S.1
Giuli, T.J.2
Lai, K.3
Baker, M.4
-
10
-
-
85113133621
-
Core: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks
-
Deventer, The Netherlands, The Netherlands, 2002. Kluwer, B. V
-
P. Michiardi and R. Molva. Core: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In Proceedings of the IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security: Advanced Communications and Multimedia Security, pages 107-121, Deventer, The Netherlands, The Netherlands, 2002. Kluwer, B. V.
-
Proceedings of the IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security: Advanced Communications and Multimedia Security
, pp. 107-121
-
-
Michiardi, P.1
Molva, R.2
-
11
-
-
84961570469
-
Article: A new approach of secure power aware routing for mobile ad-hoc network
-
April . Full text available
-
M. P. Patil. Article: A new approach of secure power aware routing for mobile ad-hoc network. International Journal of Computer Applications, 67 (3): 24-34, April 2013. Full text available.
-
(2013)
International Journal of Computer Applications
, vol.67
, Issue.3
, pp. 24-34
-
-
Patil, M.P.1
-
13
-
-
24944461245
-
Trust management survey
-
Springer Berlin Heidelberg In P. Herrmann, V. Issarny, and S. Shiu, editors
-
S. Ruohomaa and L. Kutvonen. Trust management survey. In P. Herrmann, V. Issarny, and S. Shiu, editors, Trust Management, volume 3477 of Lecture Notes in Computer Science, pages 77-92. Springer Berlin Heidelberg, 2005.
-
(2005)
Trust Management of Lecture Notes in Computer Science
, vol.3477
, pp. 77-92
-
-
Ruohomaa, S.1
Kutvonen, L.2
-
15
-
-
84906312659
-
A distributed address configuration scheme for a manet
-
X. Wang and H. Qian. A distributed address configuration scheme for a manet. Journal of Network and Systems Management, 22 (4): 559-582, 2014.
-
(2014)
Journal of Network and Systems Management
, vol.22
, Issue.4
, pp. 559-582
-
-
Wang, X.1
Qian, H.2
-
16
-
-
33749080076
-
Attributed based access control (abac) for web services
-
Washington, DC, USA. IEEE Computer Society
-
E. Yuan and J. Tong. Attributed based access control (abac) for web services. In Proceedings of the IEEE International Conference on Web Services, ICWS '05, pages 561-569, Washington, DC, USA, 2005. IEEE Computer Society.
-
(2005)
Proceedings of the IEEE International Conference on Web Services, ICWS '05
, pp. 561-569
-
-
Yuan, E.1
Tong, J.2
|