1 |
K. Wrona, "Distributed Security: Ad-Hoc Netwroks and Beyond," Workshop on Requirements for Mobile Privacy and Security, 2002
|
2 |
Carl M.Ellison, "Interoperable Home Infrastructure Home Network Security," Intel Technology Journal, Vol.6, 2002
|
3 |
F. Stajano, R Anderson, "The Resurrecting Duckling: Security Issues for Ubiquitous Computing, Wiley, 2002
|
4 |
J. P. Hubaux, L. Buttyn, and S. Apkun, "The Quest for Security in Mobile Ad Hoc Networks," ACM Symposium on Mobile Ad Hoc Networking and Computing, 2001
DOI
|
5 |
A. Weimerskirch, and G Thonet, "A Distributed Light-Weight Authentication Model for Ad Hoc Networks," Lecture Notes in Computer Science, Vol.2288, 2001
DOI
ScienceOn
|
6 |
F. Stajano, "Security for Ubiquitous Computing," first Security & Privacy supplement to IEEE Computer, Apr. 2002
|