Steven Bellovin and Michael Merrit.
Augmented encrypted key exchange: a password-based protocol secure
against dictionary atttacks and password file compromise.
In First ACM Conference on Computer and Communications Security
CCS-1, pages 244-250, 1993.
David W. Carman, Peter S. Kruus, and Brian J. Matt.
Constraints and approaches for distributed sensor network security.
NAI Labs Technical Report #00-010, September 2000.
Steven E. Czerwinski, Ben Y. Zhao, Todd D. Hodes, Anthony D. Joseph, and
Randy H. Katz.
An architecture for a secure service discovery service.
In Fifth Annual ACM/IEEE International Conference on Mobile
Computing and Networking, pages 24 - 35, Seattle, WA USA, August 1999.
D. Johnson and D.A. Maltz and J. Broch.
The dynamic source routing protocol for mobile ad hoc networks
(internet-draft).
In Mobile Ad-hoc Network (MANET) Working Group, IETF, October
1999.
Whitfield Diffie and Martin E. Hellman.
Privacy and authentication: An introduction to cryptography.
Proceedings of the IEEE, 67(3):397-427, March 1979.
Armando Fox and Steven D. Gribble.
Security on the move: indirect authentication using Kerberos.
In Second Annual International Conference on Mobile Computing
and Networking (MOBICOM 1996), pages 155-164, White Plains, NY USA,
November 1996.
R. Gennaro and P. Rohatgi.
How to sign digital streams.
In Burt Kaliski, editor, Advances in Cryptology - Crypto '97,
pages 180-197, Berlin, 1997. Springer-Verlag.
Lecture Notes in Computer Science Volume 1294.
D. Harkins and D. Carrel.
The internet key exchange (IKE).
Request for Comments 2409, Information Sciences Institute, University
of Southern California, November 1998.
J. Hill, R. Szewczyk, A. Woo, S. Hollar, D. Culler, and K. Pister.
System architecture directions for networked sensors.
In Proceedings of the 9th International Conference on
Architectural Support for Programming Languages and Operating Systems,
November 2000.
Young-Bae Ko and Nitin Vaidya.
Location-aided routing (LAR) in mobile ad hoc networks.
In Proceedings of the Fourth International Conference on Mobile
Computing and Networking (MobiCom'98), October 1998.
S. P. Miller, C. Neuman, J. I. Schiller, and J. H. Saltzer.
Kerberos authentication and authorization system.
In Project Athena Technical Plan, page section E.2.1, 1987.
Bhrat Patel and Jon Crowcroft.
Ticket based service access for the mobile user.
In Third annual ACM/IEEE international conference on Mobile
computing and networking, pages 223-233, Budapest Hungary, September 1997.
C.E. Perkins and P. Bhagwat.
Highly dynamic destination-sequenced distance-vector routing (DSDV)
for mobile computers.
In ACM SIGCOMM Symposium on Communication, Architectures and
Applications, 1994.
Adrian Perrig, Ran Canetti, Dawn Song, and J. D. Tygar.
Efficient and secure source authentication for multicast.
In Network and Distributed System Security Symposium, NDSS '01,
February 2001.
Adrian Perrig, Ran Canetti, J.D. Tygar, and Dawn Song.
Efficient authentication and signing of multicast streams over lossy
channels.
In IEEE Symposium on Security and Privacy, May 2000.
Ronald L. Rivest, Adi Shamir, and Leonard M. Adleman.
A method for obtaining digital signatures and public-key
cryptosystems.
Communications of the ACM, 21(2):120-126, 1978.
Pankaj Rohatgi.
A compact and fast hybrid signature scheme for multicast packet
authentication.
In 6th ACM Conference on Computer and Communications Security,
November 1999.
Frank Stajano and Ross Anderson.
The resurrecting duckling: Security issues for ad-hoc wireless
networks.
In B. Christianson, B. Crispo, and M. Roe, editors, Security
Protocols, 7th International Workshop. Springer Verlag Berlin Heidelberg,
1999.
U. S. National Institute of Standards and Technology (NIST).
DES model of operation.
Federal Information Processing Standards Publication 81 (FIPS PUB
81).
U. S. National Institute of Standards and Technology (NIST).
Data Encryption Standard (DES).
Draft Federal Information Processing Standards Publication 46-3 (FIPS
PUB 46-3), January 1999.