2 a perrig r canetti d song d tygar efficient and

Info icon This preview shows pages 76–78. Sign up to view the full content.

View Full Document Right Arrow Icon
2. A. Perrig, R. Canetti, D. Song, D. Tygar, “Efficient and Secure Source Au- thentication for Multicast,” Network and Distributed System Security Sym- posium, NDSS ’01, Feb. 2001. 3. R.C. Merkle, “A Digital Signature Based on a Conventional Encryption Func- tion,” Advances in Cryptology, Crypto 87. 4. D. Bleichenbacher, U. Maurer, “On the Efficiency of One-Time Digital Sig- natures,” ASIACRYPT: Advances in Cryptology : International Conference on the Theory and Application of Cryptology, 1996. 5. Y-C Hu, D.B. Johnson, “Securing Quality-of-Service Route Discovery in On-Demand Routing for Ad Hoc Networks,” SASN-2004, Washington, DC, October 2004. Copyright © 2010. World Scientific Publishing Company. All rights reserved. May not be reproduced in any form without permission from the publisher, except fair uses permitted under U.S. or applicable copyright law. EBSCO Publishing : eBook Collection (EBSCOhost) - printed on 2/16/2016 3:46 AM via CGC-GROUP OF COLLEGES (GHARUAN) AN: 340572 ; Beyah, Raheem, Corbett, Cherita, McNair, Janise.; Security in Ad Hoc and Sensor Networks Account: ns224671
Image of page 76

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
64 M. Ramkumar 6. Y-C Hu, A. Perrig, D.B. Johnson, “Efficient Security Mechanisms for Rout- ing Protocols,” Symposium on Networks and Distributed Systems Security (NDSS), 2003. 7. A. Perrig, “The BiBa One-Time Signature and Broadcast Authentication Protocol,” ACM Conference on Computer and Communications Security, pp. 28-37, 2001. 8. R.C. Merkle, “Protocols for Public Key Cryptosystems,” Proceedings of the IEEE Symposium on Security and Privacy, 1980. 9. Y-C Hu, A. Perrig, D.B. Johnson, “Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks,” Journal of Wireless Networks, 11 pp. 11-28, 2005. 10. R. Blom, “An Optimal Class of Symmetric Key Generation Systems,” Ad- vances in Cryptology: Proc. of Eurocrypt 84, Lecture Notes in Computer Science, 209 , Springer-Verlag, Berlin, pp. 335-338, 1984. 11. D. Davis, R. Swick, “Network Security via Private-Key Certificates,” Pro- ceedings of the 3rd USENIX Security Symposium, Baltimore, Sep. 1992. 12. M. Ramkumar, “An Efficient Key Distribution Scheme for Large Scale Mobile Computing Applications,” submitted to the IEEE Transactions on Mobile Computing. 13. M. Ramkumar, “On the Scalability of a “Nonscalable” Key Distribution Scheme,” Proceedings of IEEE SPAWN 2008, Newport Beach, CA, June 2008. 14. T. Leighton, S. Micali, “Secret-key Agreement without Public-Key Cryptog- raphy,” Advances in Cryptology - CRYPTO 1993, pp. 456-479, 1994. 15. B. Gaines, M. Ramkumar, “A Framework for Dual Agent MANET Rout- ing Protocols,” to be presented at IEEE Globecom 2008, New Orleans, LA, November 2008. 16. K.A. Sivakumar, M. Ramkumar, “Improving the Resilience of Ariadne,” Pro- ceedings of IEEE SPAWN 2008, Newport Beach, CA, June 2008. 17. C. Perkins, P. Bhagvat, “Highly Dynamic Destination-Sequenced Distance- Vector Routing (DSDV) for Mobile Computers,” ACM SIGCOMM Sympo- sium on Communication, Architectures and Applications, 1994.
Image of page 77
Image of page 78
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern