OREN: Optimal revocations in ephemeral networks
暂无分享,去创建一个
[1] Muthucumaru Maheswaran,et al. A localized certificate revocation scheme for mobile ad hoc networks , 2008, Ad Hoc Networks.
[2] George Ghinea,et al. Trust model for certificate revocation in ad hoc networks , 2008, Ad Hoc Networks.
[3] Pierangela Samarati,et al. Location privacy in pervasive computing , 2008 .
[4] Songwu Lu,et al. Self-organized network-layer security in mobile ad hoc networks , 2002, WiSE '02.
[5] Haiyun Luo,et al. Self-securing ad hoc wireless networks , 2002, Proceedings ISCC 2002 Seventh International Symposium on Computers and Communications.
[6] Jonathan Katz,et al. Bridging Game Theory and Cryptography: Recent Results and Future Directions , 2008, TCC.
[7] John S. Baras,et al. A framework for MAC protocol misbehavior detection in wireless networks , 2005, WiSe '05.
[8] Songwu Lu,et al. SCAN: self-organized network-layer security in mobile ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.
[9] Levente Buttyán,et al. Security and Cooperation in Wireless Networks: Thwarting Malicious and Selfish Behavior in the Age of Ubiquitous Computing , 2007 .
[10] Mudhakar Srivatsa,et al. The fable of the bees: incentivizing robust revocation decision making in ad hoc networks , 2009, CCS.
[11] Refik Molva,et al. Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.
[12] Jolyon Clulow,et al. New Strategies for Revocation in Ad-Hoc Networks , 2007, ESAS.
[13] Marco Gruteser,et al. Enhancing Location Privacy in Wireless LAN Through Disposable Interface Identifiers: A Quantitative Analysis , 2003, WMASH '03.
[14] Paul W. Goldberg,et al. The complexity of computing a Nash equilibrium , 2006, STOC '06.
[15] Ifip Tc,et al. Advanced communications and multimedia security : IFIP TC6/TC11 sixth Joint Working Conference on Communications and Multimedia Security, September 26-27, 2002, Portorož, Slovenia , 2002 .
[16] P. Palazzari,et al. Parallel Dedicated Hardware Devices for Heterogeneous Computations , 2001, ACM/IEEE SC 2001 Conference (SC'01).
[17] Tim Roughgarden,et al. Selfish routing and the price of anarchy , 2005 .
[18] Peng Liu,et al. Localized public-key management for mobile ad hoc networks , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..
[19] Maxim Raya,et al. Revocation games in ephemeral networks , 2008, CCS.
[20] Haiyun Luo,et al. Security in mobile ad hoc networks: challenges and solutions , 2004, IEEE Wireless Communications.