Security-aware ad hoc routing for wireless networks S Yi, P Naldurg, R Kravets Proceedings of the 2nd ACM international symposium on Mobile ad hoc …, 2001 | 685 | 2001 |
MOCA: Mobile certificate authority for wireless ad hoc networks S Yi, R Kravets | 462 | 2004 |
Routing through the mist: Privacy preserving communication in ubiquitous computing environments J Al-Muhtadi, R Campbell, A Kapadia, MD Mickunas, S Yi Proceedings 22nd International Conference on Distributed Computing Systems …, 2002 | 263 | 2002 |
A security-aware routing protocol for wireless ad hoc networks S Yi, P Naldurg, R Kravets Proc. of ACM MobiHoc 1, 2001 | 187 | 2001 |
Key management for heterogeneous ad hoc wireless networks S Yi, R Kravets 10th IEEE International Conference on Network Protocols, 2002. Proceedings …, 2002 | 174 | 2002 |
Composite Key Management for Ad Hoc Networks. S Yi, R Kravets MobiQuitous 4, 52-61, 2004 | 155 | 2004 |
Manycast: Exploring the space between anycast and multicast in ad hoc networks C Carter, S Yi, P Ratanchandani, R Kravets Proceedings of the 9th annual international conference on Mobile computing …, 2003 | 120 | 2003 |
Seraphim: dynamic interoperable security architecture for active networks RH Campbell, Z Liu, MD Mickunas, P Naldurg, S Yi 2000 IEEE Third Conference on Open Architectures and Network Programming …, 2000 | 70 | 2000 |
A security-aware routing protocol for wireless ad hoc networks R Kravets, S Yi, P Naldurg ACM Symp. on Mobile Ad Hoc Networking and Computing 10, 501449.501464, 2001 | 52 | 2001 |
Practical PKI for ad hoc wireless networks S Yi, R Kravets Department of Computer Science, University of Illinois, USA, 2001 | 42 | 2001 |
ARP considered harmful: Manycast transactions in ad hoc networks C Carter, S Yi, R Kravets 2003 IEEE Wireless Communications and Networking, 2003. WCNC 2003. 3, 1801-1806, 2003 | 36 | 2003 |
An agent based architecture for supporting application level security Z Liu, P Naldurg, S Yi, T Qian, RH Campbell, MD Mickunas Proceedings DARPA Information Survivability Conference and Exposition …, 2000 | 28 | 2000 |
Routing through the mist: design and implementation J Al-Muhtadi, R Campbell, A Kapadia, D Mickunas, S Yi UIUCDCS, 2002 | 23 | 2002 |
Integrating quality of protection into ad hoc routing protocols S Yi, P Naldurg, R Kravets Proceedings of the 6th World Multi-conference on Systemics, Cybernetics and …, 2002 | 15 | 2002 |
Quality of authentication in ad hoc networks S Yi, AF Harris III, R Kravets | 10 | 2007 |
Flexible secure multicasting in active networks Z Liu, RH Campbell, SK Varadarajan, P Naldurg, S Yi, MD Mickunas BUILDING A DYNAMIC INTEROPERABLE SECURITY ARCHITECTURE FOR ACTIVE NETWORKS, 33, 2002 | 8 | 2002 |
Pluggable active security for active networks Z Liu, P Naldurg, S Yi, R Campbell, MD Mickunas Proceedings of the Twelfth IASTED International Conference on Parallel and …, 2000 | 7 | 2000 |
Seraphim: an active security architecture for active networks RH Campbell, Z Liu, MD Mickuans, P Naldurg, S Yi University of Illinois at Urbana-Champaign, 1999 | 7 | 1999 |
Network autoconfiguration for mobile ad hoc networks S Yi, J Meegan, JH Kim MILCOM 2007-IEEE Military Communications Conference, 1-7, 2007 | 5 | 2007 |
Situation-aware security for wireless ad hoc networks S Yi University of Illinois at Urbana-Champaign, 2005 | 3 | 2005 |