Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- ArticleOctober 2003
Admission control in Peer-to-Peer: design and performance evaluation
SASN '03: Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networksOctober 2003, Pages 104–113https://doi.org/10.1145/986858.986873Peer-to-Peer (P2P) applications and services are very common in today's computing. The popularity of the P2P paradigm prompts the need for specialized security services which makes P2P security an important and challenging research topic. Most prior ...
- ArticleOctober 2003
SECTOR: secure tracking of node encounters in multi-hop wireless networks
SASN '03: Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networksOctober 2003, Pages 21–32https://doi.org/10.1145/986858.986862In this paper we present SECTOR, a set of mechanisms for the secure verification of the time of encounters between nodes in multi-hop wireless networks. This information can be used notably to prevent wormhole attacks (without requiring any clock ...
- ArticleOctober 2003
A security design for a general purpose, self-organizing, multihop ad hoc wireless network
SASN '03: Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networksOctober 2003, Pages 1–11https://doi.org/10.1145/986858.986860We present a security design for a general purpose, self-organizing, multihop ad hoc wireless network, based on the IEEE 802.15.4 low-rate wireless personal area network standard. The design employs elliptic-curve cryptography and the AES block cipher ...