-
1
-
-
84900414104
-
Cellular Traffic Offloading onto network-assisted device-to-device connections
-
S. Andreev, A. Pyattaev, K. Johnsson, O. Galinina, and Y. Koucheryavy, "Cellular Traffic Offloading onto network-assisted device-to-device connections," Communications Magazine, IEEE, vol. 52, no. 4, pp. 20-31, 2014.
-
(2014)
Communications Magazine, IEEE
, vol.52
, Issue.4
, pp. 20-31
-
-
Andreev, S.1
Pyattaev, A.2
Johnsson, K.3
Galinina, O.4
Koucheryavy, Y.5
-
2
-
-
84966716836
-
LTE-assisted wifi direct trial
-
April
-
S. Andreev, Y. Koucheryavy, J. Hosek, and K. Johnsson, "LTE-Assisted WiFi Direct Trial," Global Communications Newsletter, vol. 4, p. 3, April 2015.
-
(2015)
Global Communications Newsletter
, vol.4
, pp. 3
-
-
Andreev, S.1
Koucheryavy, Y.2
Hosek, J.3
Johnsson, K.4
-
3
-
-
84923318649
-
Device-to-device communications for national security and public safety
-
G. Fodor, S. Parkvall, S. Sorrentino, P. Wallentin, Q. Lu, and N. Brahmi, "Device-to-Device Communications for National Security and Public Safety," IEEE Access, pp. 1510-1520, 2014.
-
(2014)
IEEE Access
, pp. 1510-1520
-
-
Fodor, G.1
Parkvall, S.2
Sorrentino, S.3
Wallentin, P.4
Lu, Q.5
Brahmi, N.6
-
5
-
-
0038233161
-
Wireless ad hoc networks
-
Z. J. Haas, J. Deng, B. Liang, P. Papadimitratos, and S. Sajama, "Wireless ad hoc networks," Encyclopedia of Telecommunications, 2002.
-
(2002)
Encyclopedia of Telecommunications
-
-
Haas, Z.J.1
Deng, J.2
Liang, B.3
Papadimitratos, P.4
Sajama, S.5
-
6
-
-
84893438813
-
Security aspects of military sensorbased defence systems
-
IEEE
-
M. N. Johnstone and R. Thompson, "Security aspects of military sensorbased defence systems," in Trust, Security and Privacy in Computing and Communications (TrustCom), 2013 12th IEEE International Conference on, pp. 302-309, IEEE, 2013.
-
(2013)
Trust, Security and Privacy in Computing and Communications (TrustCom), 2013 12th IEEE International Conference on
, pp. 302-309
-
-
Johnstone, M.N.1
Thompson, R.2
-
7
-
-
84943807207
-
Toward secure key distribution in truly ad-hoc networks
-
IEEE
-
A. Khalili, J. Katz, and W. A. Arbaugh, "Toward secure key distribution in truly ad-hoc networks," in Proc. of Symposium on Applications and the Internet Workshops., pp. 342-346, IEEE, 2003.
-
(2003)
Proc. of Symposium on Applications and the Internet Workshops
, pp. 342-346
-
-
Khalili, A.1
Katz, J.2
Arbaugh, W.A.3
-
8
-
-
84893452444
-
Privacy-preserving wireless medical sensor network
-
IEEE
-
X. Yi, J. Willemson, and F. Nait-Abdesselam, "Privacy-preserving wireless medical sensor network," in Trust, Security and Privacy in Computing and Communications (TrustCom), 2013 12th IEEE International Conference on, pp. 118-125, IEEE, 2013.
-
(2013)
Trust, Security and Privacy in Computing and Communications (TrustCom), 2013 12th IEEE International Conference on
, pp. 118-125
-
-
Yi, X.1
Willemson, J.2
Nait-Abdesselam, F.3
-
9
-
-
0000629443
-
Dynamic source routing in ad hoc wireless networks
-
Springer
-
D. B. Johnson and D. A. Maltz, "Dynamic source routing in ad hoc wireless networks," in Mobile computing, pp. 153-181, Springer, 1996.
-
(1996)
Mobile Computing
, pp. 153-181
-
-
Johnson, D.B.1
Maltz, D.A.2
-
10
-
-
4243082091
-
Security in wireless sensor networks
-
A. Perrig, J. Stankovic, and D. Wagner, "Security in wireless sensor networks," Communications of the ACM, vol. 47, no. 6, pp. 53-57, 2004.
-
(2004)
Communications of the ACM
, vol.47
, Issue.6
, pp. 53-57
-
-
Perrig, A.1
Stankovic, J.2
Wagner, D.3
-
11
-
-
67650822699
-
Security and privacy challenges in the smart grid
-
P. MCDANIEL and S. MCLAUGHLIN, "Security and privacy challenges in the smart grid," IEEE Security &Privacy, vol. 7, no. 3, pp. 75-77, 2009.
-
(2009)
IEEE Security &Privacy
, vol.7
, Issue.3
, pp. 75-77
-
-
McDaniel, P.1
McLaughlin, S.2
-
12
-
-
3042594839
-
The security and privacy of smart vehicles
-
LCAARTICLE-2004-007
-
J.-P. Hubaux, S. Capkun, and J. Luo, "The security and privacy of smart vehicles," IEEE Security &Privacy Magazine, vol. 2, no. LCAARTICLE-2004-007, pp. 49-55, 2004.
-
(2004)
IEEE Security &Privacy Magazine
, vol.2
, pp. 49-55
-
-
Hubaux, J.-P.1
Capkun, S.2
Luo, J.3
-
13
-
-
0017018484
-
New directions in cryptography
-
W. Diffie and M. E. Hellman, "New Directions in Cryptography," IEEE Transactions on Information Theory, vol. 22, no. 6, pp. 644-654, 1976.
-
(1976)
IEEE Transactions on Information Theory
, vol.22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.E.2
-
14
-
-
16644374371
-
Establishing pairwise keys in distributed sensor networks
-
D. Liu, P. Ning, and R. Li, "Establishing Pairwise Keys in Distributed Sensor Networks," ACM Transactions on Information and System Security (TISSEC), vol. 8, no. 1, pp. 41-77, 2005.
-
(2005)
ACM Transactions on Information and System Security (TISSEC)
, vol.8
, Issue.1
, pp. 41-77
-
-
Liu, D.1
Ning, P.2
Li, R.3
-
15
-
-
0018545449
-
How to Share a Secret
-
A. Shamir, "How to Share a Secret," Communications of the ACM, vol. 22, no. 11, pp. 612-613, 1979.
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
17
-
-
0036738266
-
SPINS: Security protocols for sensor networks
-
A. Perrig, R. Szewczyk, J. Tygar, V. Wen, and D. E. Culler, "SPINS: Security protocols for sensor networks," Wireless networks, vol. 8, no. 5, pp. 521-534, 2002.
-
(2002)
Wireless Networks
, vol.8
, Issue.5
, pp. 521-534
-
-
Perrig, A.1
Szewczyk, R.2
Tygar, J.3
Wen, V.4
Culler, D.E.5
-
18
-
-
23244467182
-
A pairwise key predistribution scheme for wireless sensor networks
-
W. Du, J. Deng, Y. S. Han, P. K. Varshney, J. Katz, and A. Khalili, "A pairwise key predistribution scheme for wireless sensor networks," ACM Transactions on Information and System Security (TISSEC), vol. 8, no. 2, pp. 228-258, 2005.
-
(2005)
ACM Transactions on Information and System Security (TISSEC)
, vol.8
, Issue.2
, pp. 228-258
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Varshney, P.K.4
Katz, J.5
Khalili, A.6
-
19
-
-
33847120377
-
LEAP+: Efficient security mechanisms for large-scale distributed sensor networks
-
S. Zhu, S. Setia, and S. Jajodia, "LEAP+: Efficient security mechanisms for large-scale distributed sensor networks," ACM Transactions on Sensor Networks (TOSN), vol. 2, no. 4, pp. 500-528, 2006.
-
(2006)
ACM Transactions on Sensor Networks (TOSN)
, vol.2
, Issue.4
, pp. 500-528
-
-
Zhu, S.1
Setia, S.2
Jajodia, S.3
-
21
-
-
0033357103
-
Securing ad hoc networks
-
L. Zhou and Z. J. Haas, "Securing ad hoc networks," Network, IEEE, vol. 13, no. 6, pp. 24-30, 1999.
-
(1999)
Network, IEEE
, vol.13
, Issue.6
, pp. 24-30
-
-
Zhou, L.1
Haas, Z.J.2
-
22
-
-
20444502239
-
An ID-based broadcast encryption scheme for key distribution
-
X. Du, Y.Wang, J. Ge, and Y.Wang, "An ID-based broadcast encryption scheme for key distribution," IEEE Transactions on Broadcasting, vol. 51, no. 2, pp. 264-266, 2005.
-
(2005)
IEEE Transactions on Broadcasting
, vol.51
, Issue.2
, pp. 264-266
-
-
Du, X.1
Wang, Y.2
Ge, J.3
Wang, Y.4
-
23
-
-
0024715386
-
Secure broadcasting using the secure lock
-
G.-h. Chiou and W.-T. Chen, "Secure broadcasting using the secure lock," Software Engineering, IEEE Transactions on, vol. 15, no. 8, pp. 929-934, 1989.
-
(1989)
Software Engineering, IEEE Transactions on
, vol.15
, Issue.8
, pp. 929-934
-
-
Chiou, G.-H.1
Chen, W.-T.2
-
24
-
-
84947929289
-
The interpolation attack on block ciphers
-
Springer
-
T. Jakobsen and L. R. Knudsen, "The interpolation attack on block ciphers," in Fast Software Encryption, pp. 28-40, Springer, 1997.
-
(1997)
Fast Software Encryption
, pp. 28-40
-
-
Jakobsen, T.1
Knudsen, L.R.2
-
25
-
-
0019608784
-
On sharing secrets and reed-solomon codes
-
R. J. McEliece and D. V. Sarwate, "On Sharing Secrets and Reed-Solomon Codes," Communications of the ACM, vol. 24, no. 9, pp. 583-584, 1981.
-
(1981)
Communications of the ACM
, vol.24
, Issue.9
, pp. 583-584
-
-
McEliece, R.J.1
Sarwate, D.V.2
-
27
-
-
33144479559
-
Secret sharing schemes from three classes of linear codes
-
J. Yuan and C. Ding, "Secret sharing schemes from three classes of linear codes," Information Theory, IEEE Transactions on, vol. 52, no. 1, pp. 206-212, 2006.
-
(2006)
Information Theory, IEEE Transactions on
, vol.52
, Issue.1
, pp. 206-212
-
-
Yuan, J.1
Ding, C.2
-
29
-
-
0016949746
-
A lattice model of secure information flow
-
D. E. Denning, "A Lattice Model of Secure Information Flow," Communications of the ACM, vol. 19, no. 5, pp. 236-243, 1976.
-
(1976)
Communications of the ACM
, vol.19
, Issue.5
, pp. 236-243
-
-
Denning, D.E.1
-
30
-
-
0002448405
-
A public-key cryptosystem based on algebraic coding theory
-
January-February
-
R. McEliece, "A Public-Key Cryptosystem Based on Algebraic Coding Theory," DSN Progress Report, pp. 42-44, January-February 1978.
-
(1978)
DSN Progress Report
, pp. 42-44
-
-
McEliece, R.1
-
32
-
-
84943517115
-
On the utility of distributed cryptography in P2P and MANETs: The case of membership control
-
IEEE
-
M. Narasimha, G. Tsudik, and J. H. Yi, "On the utility of distributed cryptography in P2P and MANETs: the case of membership control," in Proc. of 11th IEEE International Conference on Network Protocols., pp. 336-345, IEEE, 2003.
-
(2003)
Proc. of 11th IEEE International Conference on Network Protocols
, pp. 336-345
-
-
Narasimha, M.1
Tsudik, G.2
Yi, J.H.3
|