Abstract is missing.
- A security design for a general purpose, self-organizing, multihop ad hoc wireless networkThomas S. Messerges, Johnas Cukier, Tom A. M. Kevenaar, Larry Puhl, René Struik, Ed Callaway. 1-11 [doi]
- Modeling vulnerabilities of ad hoc routing protocolsShahan Yang, John S. Baras. 12-20 [doi]
- SECTOR: secure tracking of node encounters in multi-hop wireless networksSrdjan Capkun, Levente Buttyán, Jean-Pierre Hubaux. 21-32 [doi]
- Identity certified authentication for ad-hoc networksAndré Weimerskirch, Dirk Westhoff. 33-40 [doi]
- An approach to certificate path discovery in mobile Ad Hoc networksHe Huang, Shyhtsun Felix Wu. 41-52 [doi]
- A certificate revocation scheme for wireless ad hoc networksClaude Crépeau, Carlton R. Davis. 54-61 [doi]
- Random key-assignment for secure Wireless Sensor NetworksRoberto Di Pietro, Luigi V. Mancini, Alessandro Mei. 62-71 [doi]
- Location-based pairwise key establishments for static sensor networksDonggang Liu, Peng Ning. 72-82 [doi]
- Security support for in-network processing in Wireless Sensor NetworksJing Deng, Richard Han, Shivakant Mishra. 83-93 [doi]
- Secure multicast groups on ad hoc networksTansel Kaya, Guolong Lin, Guevara Noubir, A. Yilmaz. 94-102 [doi]
- Admission control in Peer-to-Peer: design and performance evaluationNitesh Saxena, Gene Tsudik, Jeong Hyun Yi. 104-113 [doi]
- Secure long term communities in ad hoc networksNicolas Prigent, Christophe Bidan, Jean-Pierre Andreaux, Olivier Heen. 115-124 [doi]
- A specification-based intrusion detection system for AODVChin-Yang Tseng, Poornima Balasubramanyam, Calvin Ko, Rattapon Limprasittiporn, Jeff Rowe, Karl N. Levitt. 125-134 [doi]
- A cooperative intrusion detection system for ad hoc networksYi-an Huang, Wenke Lee. 135-147 [doi]