메뉴 건너뛰기




Volumn 1, Issue , 2015, Pages 826-833

Securing network-assisted direct communication: The case of unreliable cellular connectivity

Author keywords

Cellular networks; Device to device; LTE assisted WiFi Direct; Security and privacy; Unreliable connectivity

Indexed keywords

ALGORITHMS; ELECTRONIC DATA INTERCHANGE; MOBILE SECURITY; NETWORK ARCHITECTURE; NEXT GENERATION NETWORKS; WI-FI; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 84966936618     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/Trustcom.2015.453     Document Type: Conference Paper
Times cited : (21)

References (32)
  • 9
    • 0000629443 scopus 로고    scopus 로고
    • Dynamic source routing in ad hoc wireless networks
    • Springer
    • D. B. Johnson and D. A. Maltz, "Dynamic source routing in ad hoc wireless networks," in Mobile computing, pp. 153-181, Springer, 1996.
    • (1996) Mobile Computing , pp. 153-181
    • Johnson, D.B.1    Maltz, D.A.2
  • 11
    • 67650822699 scopus 로고    scopus 로고
    • Security and privacy challenges in the smart grid
    • P. MCDANIEL and S. MCLAUGHLIN, "Security and privacy challenges in the smart grid," IEEE Security &Privacy, vol. 7, no. 3, pp. 75-77, 2009.
    • (2009) IEEE Security &Privacy , vol.7 , Issue.3 , pp. 75-77
    • McDaniel, P.1    McLaughlin, S.2
  • 12
    • 3042594839 scopus 로고    scopus 로고
    • The security and privacy of smart vehicles
    • LCAARTICLE-2004-007
    • J.-P. Hubaux, S. Capkun, and J. Luo, "The security and privacy of smart vehicles," IEEE Security &Privacy Magazine, vol. 2, no. LCAARTICLE-2004-007, pp. 49-55, 2004.
    • (2004) IEEE Security &Privacy Magazine , vol.2 , pp. 49-55
    • Hubaux, J.-P.1    Capkun, S.2    Luo, J.3
  • 15
    • 0018545449 scopus 로고
    • How to Share a Secret
    • A. Shamir, "How to Share a Secret," Communications of the ACM, vol. 22, no. 11, pp. 612-613, 1979.
    • (1979) Communications of the ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 19
    • 33847120377 scopus 로고    scopus 로고
    • LEAP+: Efficient security mechanisms for large-scale distributed sensor networks
    • S. Zhu, S. Setia, and S. Jajodia, "LEAP+: Efficient security mechanisms for large-scale distributed sensor networks," ACM Transactions on Sensor Networks (TOSN), vol. 2, no. 4, pp. 500-528, 2006.
    • (2006) ACM Transactions on Sensor Networks (TOSN) , vol.2 , Issue.4 , pp. 500-528
    • Zhu, S.1    Setia, S.2    Jajodia, S.3
  • 21
    • 0033357103 scopus 로고    scopus 로고
    • Securing ad hoc networks
    • L. Zhou and Z. J. Haas, "Securing ad hoc networks," Network, IEEE, vol. 13, no. 6, pp. 24-30, 1999.
    • (1999) Network, IEEE , vol.13 , Issue.6 , pp. 24-30
    • Zhou, L.1    Haas, Z.J.2
  • 22
    • 20444502239 scopus 로고    scopus 로고
    • An ID-based broadcast encryption scheme for key distribution
    • X. Du, Y.Wang, J. Ge, and Y.Wang, "An ID-based broadcast encryption scheme for key distribution," IEEE Transactions on Broadcasting, vol. 51, no. 2, pp. 264-266, 2005.
    • (2005) IEEE Transactions on Broadcasting , vol.51 , Issue.2 , pp. 264-266
    • Du, X.1    Wang, Y.2    Ge, J.3    Wang, Y.4
  • 24
    • 84947929289 scopus 로고    scopus 로고
    • The interpolation attack on block ciphers
    • Springer
    • T. Jakobsen and L. R. Knudsen, "The interpolation attack on block ciphers," in Fast Software Encryption, pp. 28-40, Springer, 1997.
    • (1997) Fast Software Encryption , pp. 28-40
    • Jakobsen, T.1    Knudsen, L.R.2
  • 25
    • 0019608784 scopus 로고
    • On sharing secrets and reed-solomon codes
    • R. J. McEliece and D. V. Sarwate, "On Sharing Secrets and Reed-Solomon Codes," Communications of the ACM, vol. 24, no. 9, pp. 583-584, 1981.
    • (1981) Communications of the ACM , vol.24 , Issue.9 , pp. 583-584
    • McEliece, R.J.1    Sarwate, D.V.2
  • 27
    • 33144479559 scopus 로고    scopus 로고
    • Secret sharing schemes from three classes of linear codes
    • J. Yuan and C. Ding, "Secret sharing schemes from three classes of linear codes," Information Theory, IEEE Transactions on, vol. 52, no. 1, pp. 206-212, 2006.
    • (2006) Information Theory, IEEE Transactions on , vol.52 , Issue.1 , pp. 206-212
    • Yuan, J.1    Ding, C.2
  • 29
    • 0016949746 scopus 로고
    • A lattice model of secure information flow
    • D. E. Denning, "A Lattice Model of Secure Information Flow," Communications of the ACM, vol. 19, no. 5, pp. 236-243, 1976.
    • (1976) Communications of the ACM , vol.19 , Issue.5 , pp. 236-243
    • Denning, D.E.1
  • 30
    • 0002448405 scopus 로고
    • A public-key cryptosystem based on algebraic coding theory
    • January-February
    • R. McEliece, "A Public-Key Cryptosystem Based on Algebraic Coding Theory," DSN Progress Report, pp. 42-44, January-February 1978.
    • (1978) DSN Progress Report , pp. 42-44
    • McEliece, R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.