default search action
Peter C. Mason
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2015
- [c21]Ronggong Song, J. David Brown, Peter C. Mason, Mazda Salmanian, Helen Tang:
HMS: Holistic MPR selection and network connectivity for tactical edge networks. MILCOM 2015: 726-731 - 2014
- [j5]Zhexiong Wei, Helen Tang, F. Richard Yu, Maoyu Wang, Peter C. Mason:
Security Enhancements for Mobile Ad Hoc Networks With Trust Management Using Uncertain Reasoning. IEEE Trans. Veh. Technol. 63(9): 4647-4658 (2014) - [c20]N. Madtha, Miguel Vargas Martin, Ramiro Liscano, Brent Moore, Mazda Salmanian, Ming Li, Peter C. Mason:
Detection of side-channel communication in ad hoc networks using request to send (RTS) messages. CCECE 2014: 1-6 - [c19]Zhexiong Wei, Helen Tang, F. Richard Yu, Maoyu Wang, Peter C. Mason:
Trust establishment with data fusion for secure routing in MANETs. ICC 2014: 671-676 - [c18]Zhexiong Wei, Helen Tang, F. Richard Yu, Peter C. Mason:
Trust Establishment Based on Bayesian Networks for Threat Mitigation in Mobile Ad Hoc Networks. MILCOM 2014: 171-177 - [c17]Ming Li, Peter C. Mason, Mazda Salmanian, J. David Brown:
Simulation implementation and performance analysis for situational awareness data dissemination in a tactical manet. WSC 2014: 2343-2354 - 2013
- [c16]Ronggong Song, Helen Tang, Peter C. Mason, Zhexiong Wei:
Cross-Layer Security Management Framework for Mobile Tactical Networks. MILCOM 2013: 220-225 - 2012
- [j4]Ramya Ramamoorthy, F. Richard Yu, Helen Tang, Peter C. Mason, Azzedine Boukerche:
Joint authentication and quality of service provisioning in cooperative communication networks. Comput. Commun. 35(5): 597-607 (2012) - [j3]Paola Flocchini, Matthew Kellett, Peter C. Mason, Nicola Santoro:
Searching for Black Holes in Subways. Theory Comput. Syst. 50(1): 158-184 (2012) - [c15]Paola Flocchini, Matthew Kellett, Peter C. Mason, Nicola Santoro:
Finding Good Coffee in Paris. FUN 2012: 154-165 - [c14]Li Li, Philip J. Vigneron, Peter C. Mason, Thomas Kunz:
Joint replay detection in tactical networks. ICC 2012: 3372-3376 - [c13]Jonathan J. Edwards, J. David Brown, Peter C. Mason:
Using covert timing channels for attack detection in MANETs. MILCOM 2012: 1-7 - [c12]Paola Flocchini, Matthew Kellett, Peter C. Mason, Nicola Santoro:
Fault-Tolerant Exploration of an Unknown Dangerous Graph by Scattered Agents. SSS 2012: 299-313 - 2011
- [j2]Shengrong Bu, F. Richard Yu, Peter X. Liu, Peter C. Mason, Helen Tang:
Distributed Combined Authentication and Intrusion Detection With Data Fusion in High-Security Mobile Ad Hoc Networks. IEEE Trans. Veh. Technol. 60(3): 1025-1036 (2011) - [c11]Xianbin Wang, Fiona Jiazi Liu, Dian Fan, Helen Tang, Peter C. Mason:
Continuous Physical Layer Authentication Using a Novel Adaptive OFDM System. ICC 2011: 1-5 - [c10]Ronggong Song, Peter C. Mason, Ming Li:
Enhancement of frequency-based wormhole attack detection. MILCOM 2011: 1139-1145 - [c9]Ali Najafizadeh, Ramiro Liscano, Miguel Vargas Martin, Peter C. Mason, Mazda Salmanian:
Challenges in the Implementation and Simulation for Wireless Side-Channel based on Intentionally Corrupted FCS. ANT/MobiWIS 2011: 165-172 - [i1]F. Richard Yu, Helen Tang, Minyi Huang, Peter C. Mason, Zhiqiang Li:
Distributed Cooperative Spectrum Sensing in Mobile Ad Hoc Networks with Cognitive Radios. CoRR abs/1104.5539 (2011) - 2010
- [j1]F. Richard Yu, Helen Tang, Peter C. Mason, Fei Wang:
A Hierarchical Identity Based Key Management Scheme in Tactical Mobile Ad Hoc Networks. IEEE Trans. Netw. Serv. Manag. 7(4): 258-267 (2010) - [c8]Ramya Ramamoorthy, F. Richard Yu, Helen Tang, Peter C. Mason:
Combined Authentication and Quality of Service in Cooperative Communication Networks. EUC 2010: 566-571 - [c7]Paola Flocchini, Matthew Kellett, Peter C. Mason, Nicola Santoro:
Mapping an Unfriendly Subway System. FUN 2010: 190-201 - [c6]Mazda Salmanian, Peter C. Mason, Joanne Treurniet, Jiangxin Hu, Li Pan, Ming Li:
A modular security architecture for managing security associations in MANETs. MASS 2010: 525-530
2000 – 2009
- 2009
- [c5]Ronggong Song, Khalil El-Khatib, Peter C. Mason:
Analysis of Chinese Remainder Theorem Based Group Key Management Protocols. Security and Management 2009: 86-92 - [c4]Paola Flocchini, Matthew Kellett, Peter C. Mason, Nicola Santoro:
Map construction and exploration by mobile agents scattered in a dangerous network. IPDPS 2009: 1-10 - [c3]Marvin Odor, Babak Nasri, Mazda Salmanian, Peter C. Mason, Miguel Vargas Martin, Ramiro Liscano:
A frame handler module for a side-channel in mobile ad hoc networks. LCN 2009: 930-936 - [c2]Dang-Quan Nguyen, Louise Lamont, Peter C. Mason:
On Trust Evaluation in Mobile Ad Hoc Networks. MobiSec 2009: 1-13 - 2007
- [c1]Maria Gorlatova, Marc Kelly, Ramiro Liscano, Peter C. Mason:
Enhancing frequency-based wormhole attack detection with novel jitter waveforms. SecureComm 2007: 304-309
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 13:12 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint