1 |
Lidong Zhou and Zygmunt J. Haas, 'Securing Adhoc network,' IEEE Network Magazine, Nov/Dec 1999. pp. 24 - 30
DOI
ScienceOn
|
2 |
Jiejun Kong, Petros Zerfos, Haiyun Luo, Songwu Lu and Lixia Zhang. 'Providing Robust and Ubiquitous Security Support for Mobile Ad-Hoc Networks,' IEEE 9th International Conference on Network Protocols (ICNP'01), 2001
|
3 |
Seung Yi and Robin Kravets, 'MOCA : Mobile Certificate Authority for Wireless Ad Hoc Networks,' 2nd Annual PKI Research Workshop Program (PKI 03}, Gaithersburg, Maryland, April, 2003
|
4 |
Li, Z. J. Haas and B. Liang, 'Performance Analysis of Random Database Group for Mobility Management in Ad hoc Network,' IEEE International Conference on Communications(ICC) 2003, Anchorage, May 2003
DOI
|
5 |
Zygmunt J. Haas and Ben Liang,'Ad Hoc Location Management Using Quorum Systems,' ACM/IEEE Transactions on Networking, April 1999
DOI
ScienceOn
|
6 |
N. Milanovic, M. Malek, A. Davidson and V. Milutinovic, 'Routing and Security in Mobile Ad Hoc Networks,' IEEE Computer Magazine, February 2004. pp. 69 - 73
DOI
ScienceOn
|
7 |
D. Balfanz, D.K Smetters, P. Stewart and H. C. Wong, 'Talking to Strangers : Authentication in Ad-Hoc Wireless Networks,' In Sysmposium on Network and Distributed System Security(NDSS '02), San Diego, USA, Feb. 2002
|
8 |
Haiyun Luo, Jiejun Kong, Petros Zerfos, Songwu Lu and Lixia Zhang, 'Self -securing Ad Hoc Wireless Networks,' the Seventh IEEE Symposium on Computers and Communications (ISCC'02), pp 567-574, 2002
DOI
|
9 |
Srdjan Capkun, Levente Buttyan and Jean-Pierre Hubaus, 'Mobility Helps Security in Ad Hoc Networks,' MobiHoc'03, Annapolis, USA. June 2003
|
10 |
Carlton R. Davis and Claude Crepeau, 'A Certificate Revocation Scheme for Wireless Ad hoc Networks,' 2003 ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN '03), October 2003. Fairfax, VA, USA
|
11 |
Douceur, 'The Sibil Attack,' Proc. First International Workshop Peer-to-peer Systems(IPTPS), 2002
|
12 |
Seung Yi andRobin Kravets, 'Practical PKI for Ad Hoc Wireless Networks,' Technical Report UIUCDCS-R-2002-2273/UILU-ENG-2002-1717 University of Illinois at Urbana-Champaign, May 2002
|
13 |
Srdjan Capkun, Levente Buttyan and Jean-Pierre Hubaus, 'Self-Orgainized Public-Key Management for Mobile Ad Hoc Networks,' IEEE Transactions on Mobile Computings, Vol. 2, No. 1, January-March 2003. pp. 52 - 64
DOI
ScienceOn
|
14 |
Matei C. Morogan and Sead Muftic, 'Certificate Management in Ad Hoc Networks,' IEEE Workshop on Security and Assurance in Ad hoc Networks, in conjunction with the 2003 International Symposium on Applications and the Internet, Orlando, USA. January 2003
|
15 |
Sonali Bhargava, D. P. Agarawal, 'Scalable Security Schemes for Ad Hoc Networks,' IEEE Milcom 2002, Anaheim, USA, Oct. 2002
|
16 |
Zygmunt J. Haas and Ben Liang, 'Ad Hoc Mobility Management with Randomized Database Groups,' IEEE ICC'99, Vancouver, Canada, June, 1999
DOI
|
17 |
Y. Lee and Z. Haas, 'Authentication in Very Large Ad Hoc Networks using Randomized Groups,' 16th Annual IEEE PIMRC 2005, Berlin, Germany, Sep. 2005
DOI
|