Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- ArticleSeptember 2002
Performance analysis of elliptic curve cryptography for SSL
WiSE '02: Proceedings of the 1st ACM workshop on Wireless securitySeptember 2002, pp 87–94https://doi.org/10.1145/570681.570691Elliptic Curve Cryptography (ECC) is emerging as an attractive public-key cryptosystem for mobile/wireless environments. Compared to traditional cryptosystems like RSA, ECC offers equivalent security with smaller key sizes, which results in faster ...
- ArticleSeptember 2002
DoS and authentication in wireless public access networks
WiSE '02: Proceedings of the 1st ACM workshop on Wireless securitySeptember 2002, pp 47–56https://doi.org/10.1145/570681.570687As WEP has been shown to be vulnerable to multiple attacks, a huge effort has been placed on specifying an access control mechanism to be used in wireless installations. However, properties of the wireless environment have been exploited to perform ...
- ArticleSeptember 2002
Survivable mobile wireless networks: issues, challenges, and research directions
- James P. G. Sterbenz,
- Rajesh Krishnan,
- Regina Rosales Hain,
- Alden W. Jackson,
- David Levin,
- Ram Ramanathan,
- John Zao
WiSE '02: Proceedings of the 1st ACM workshop on Wireless securitySeptember 2002, pp 31–40https://doi.org/10.1145/570681.570685In this paper we survey issues and challenges in enhancing the survivability of mobile wireless networks, with particular emphasis on military requirements*. Research focus on three key aspects can significantly enhance network survivability: (i) ...
- ArticleSeptember 2002
An on-demand secure routing protocol resilient to byzantine failures
WiSE '02: Proceedings of the 1st ACM workshop on Wireless securitySeptember 2002, pp 21–30https://doi.org/10.1145/570681.570684An ad hoc wireless network is an autonomous self-organizing system ofmobile nodes connected by wireless links where nodes not in directrange can communicate via intermediate nodes. A common technique usedin routing protocols for ad hoc wireless networks ...
- ArticleSeptember 2002
Securing ad hoc routing protocols
WiSE '02: Proceedings of the 1st ACM workshop on Wireless securitySeptember 2002, pp 1–10https://doi.org/10.1145/570681.570682We consider the problem of incorporating security mechanisms into routing protocols for ad hoc networks. Canned security solutions like IPSec are not applicable. We look at AODV[21] in detail and develop a security mechanism to protect its routing ...