Neighborhood prediction based decentralized key management for mobile wireless networks
暂无分享,去创建一个
Wendy Hui Wang | Hongbo Liu | Ruilin Liu | Xiuyuan Zheng | Yingying Chen | Wendy Hui Wang | Yingying Chen | Hongbo Liu | Ruilin Liu | Xiuyuan Zheng
[1] Moses D. Liskov,et al. MPSS: Mobile Proactive Secret Sharing , 2010, TSEC.
[2] Thomas Brinkhoff,et al. Generating network-based moving objects , 2000, Proceedings. 12th International Conference on Scientific and Statistica Database Management.
[3] Srdjan Capkun,et al. Mobility helps security in ad hoc networks , 2003, MobiHoc '03.
[4] John A. Silvester,et al. Optimum transmission radii for packet radio networks or why six is a magic number , 1978 .
[5] Mirco Musolesi,et al. Sensing meets mobile social networks: the design, implementation and evaluation of the CenceMe application , 2008, SenSys '08.
[6] Adi Shamir,et al. How to share a secret , 1979, CACM.
[7] Eitan Altman,et al. Coverage and connectivity of ad hoc networks presence of channel randomness , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[8] Ramakrishnan Srikant,et al. Fast algorithms for mining association rules , 1998, VLDB 1998.
[9] Koen Langendoen,et al. Distributed localization in wireless sensor networks: a quantitative compariso , 2003, Comput. Networks.
[10] Hugo Krawczyk,et al. Proactive Secret Sharing Or: How to Cope With Perpetual Leakage , 1995, CRYPTO.
[11] Moti Yung,et al. Optimal-resilience proactive public-key cryptosystems , 1997, Proceedings 38th Annual Symposium on Foundations of Computer Science.
[12] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[13] Haiyun Luo,et al. Ubiquitous and Robust Authentication Services for Ad Hoc Wireless Networks , 2000 .
[14] Liam McNamara,et al. Media sharing based on colocation prediction in urban transport , 2008, MobiCom '08.
[15] Alice Bob,et al. The PGP Trust Model , 2005 .
[16] Claudio Soriente,et al. Catch Me (If You Can): Data Survival in Unattended Sensor Networks , 2008, 2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom).
[17] Elaine Shi,et al. TACKing Together Efficient Authentication, Revocation, and Privacy in VANETs , 2009, 2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.
[18] BettstetterChristian,et al. Connectivity of wireless multihop networks in a shadow fading environment , 2005 .
[19] Romit Roy Choudhury,et al. SurroundSense: mobile phone localization via ambience fingerprinting , 2009, MobiCom '09.
[20] Dirk Westhoff,et al. Tinypeds: Tiny Persistent Encrypted Data Storage 3 in Asynchronous Wireless Sensor Networks 4 , 2006 .
[21] Hugo Krawczyk,et al. Robust and Efficient Sharing of RSA Functions , 1996, CRYPTO.
[22] Sencun Zhu,et al. pDCS: Security and Privacy Support for Data-Centric Sensor Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[23] Aravind Srinivasan,et al. Mobile Data Offloading through Opportunistic Communications and Social Participation , 2012, IEEE Transactions on Mobile Computing.
[24] Yvo Desmedt,et al. Parallel reliable threshold multisignature , 1992 .
[25] Kamesh Namuduri,et al. Secure, Redundant, and Fully Distributed Key Management Scheme for Mobile Ad Hoc Networks: An Analysis , 2005, EURASIP J. Wirel. Commun. Netw..
[26] Diana K. Smetters,et al. Talking to Strangers: Authentication in Ad-Hoc Wireless Networks , 2002, NDSS.
[27] Vaibhav Kumar,et al. Mobile Proactive Secret Sharing in Cloud Computing , 2012 .
[28] Robbert van Renesse,et al. APSS: proactive secret sharing in asynchronous systems , 2005, TSEC.
[29] Christian Bettstetter,et al. How to achieve a connected ad hoc network with homogeneous range assignment: an analytical study with consideration of border effects , 2002, 4th International Workshop on Mobile and Wireless Communications Network.
[30] Christian Bettstetter,et al. Connectivity of Wireless Multihop Networks in a Shadow Fading Environment , 2005, Wirel. Networks.
[31] Xiaoyan Hong,et al. A group mobility model for ad hoc wireless networks , 1999, MSWiM '99.
[32] Yoji Kishi,et al. Secure Data Sharing in Mobile Environments , 2008, The Ninth International Conference on Mobile Data Management (mdm 2008).
[33] Deborah Estrin,et al. Data-centric storage in sensornets , 2003, CCRV.
[34] Yvo Desmedt,et al. Shared Generation of Authenticators and Signatures (Extended Abstract) , 1991, CRYPTO.
[35] Jens Grossklags,et al. Resilient Data-Centric Storage in Wireless Ad-Hoc Sensor Networks , 2003, Mobile Data Management.
[36] Ramakrishnan Srikant,et al. Fast Algorithms for Mining Association Rules in Large Databases , 1994, VLDB.
[37] Wendy Hui Wang,et al. A decentralized key management scheme via neighborhood prediction in mobile wireless networks , 2010, The 7th IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE MASS 2010).
[38] Takashi Matsunaka,et al. A Lightweight Approach to Protect Mobile Data , 2007, 2007 12th IEEE Symposium on Computers and Communications.
[39] Li Gong,et al. Increasing Availability and Security of an Authentication Service , 1993, IEEE J. Sel. Areas Commun..
[40] Ran Canetti,et al. Maintaining Authenticated Communication in the Presence of Break-Ins , 2000, Journal of Cryptology.
[41] Mahbub Hassan,et al. Analysis of per-node traffic load in multi-hop wireless sensor networks , 2009, IEEE Transactions on Wireless Communications.
[42] Ahmed Helmy,et al. Modeling Time-Variant User Mobility in Wireless Mobile Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.