Key storage in secure networks
Discrete Applied Mathematics
A matrix key-distribution scheme
Journal of Cryptology
A key-management scheme for distributed sensor networks
Proceedings of the 9th ACM conference on Computer and communications security
On the Negotiation of Access Control Policies
Revised Papers from the 9th International Workshop on Security Protocols
Confidence Valuation in a Public-Key Infrastructure Based on Uncertain Evidence
PKC '00 Proceedings of the Third International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
A resilient packet-forwarding scheme against maliciously packet-dropping nodes in sensor networks
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
Secure neighbor discovery in wireless networks: formal investigation of possibility
Proceedings of the 2008 ACM symposium on Information, computer and communications security
Review: Detecting node replication attacks in wireless sensor networks: A survey
Journal of Network and Computer Applications
Hi-index | 0.00 |
I’d like to talk about emergent properties, something that you are somewhat familiar with from previous research in security, and I’d like to focus on the security aspects of these properties in ad-hoc networks. This work has benefited from discussions with my colleagues, Bill Arbaugh, John Baras and Jonathan Katz at the University of Maryland.