Security association

Known as: Association, SA 
A Security Association (SA) is the establishment of shared security attributes between two network entities to support secure communication. An SA… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Wireless Body Area Networks (WBAN) support a variety of real-time health monitoring and consumer electronics applications. The… (More)
  • figure 1
  • figure 2
Is this relevant?
2012
2012
Wireless Mesh Networks (WMN) mainly consist of an infrastructure of mesh routers (MRs) that are wirelessly interconnected. In… (More)
  • figure 1
  • figure 2
  • table I
  • figure 3
  • figure 4
Is this relevant?
2011
2011
Security always comes with a price in terms of performance degradation, which should be carefully quantified. This is especially… (More)
  • figure 1
  • figure 2
  • figure 4
  • figure 3
  • figure 5
Is this relevant?
2010
2010
Key management in opportunistic networks is a challenging problem that cannot be solved with existing solutions. In this paper… (More)
Is this relevant?
Highly Cited
2007
Highly Cited
2007
Status of This Memo This document specifies an Internet standards track protocol for the Internet community, and requests… (More)
Is this relevant?
Highly Cited
2006
Highly Cited
2006
We propose a straightforward technique to provide peer-to-peer security in mobile networks. We show that far from being a hurdle… (More)
  • figure 1
  • figure 2
Is this relevant?
Highly Cited
2003
Highly Cited
2003
Contrary to the common belief that mobility makes security more difficult to achieve, we show that node mobility can, in fact, be… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2003
Highly Cited
2003
— To date, most solutions proposed for secure routing in mobile, ad-hoc networks (MANETs) assume that secure associations between… (More)
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • figure 7
Is this relevant?
2003
2003
We investigate secure routing in ad hoc networks in which security associations exist only between a subset of all pairs of nodes… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2000
Highly Cited
2000
Optimizing TCP (Transport Layer) for mobility has been researched extensively. We present a brief summary of existing results… (More)
Is this relevant?