-
1
-
-
85027121709
-
IP-Based protocols for mobile internetworking
-
Sept.
-
J. Ioannidis, D. Duchamp, and G. Q. Maguire Jr., "IP-Based Protocols for Mobile Internetworking," ACM SIGCOMM Comp. Commun. Rev. (SIGCOMM '91), vol. 21, no. 4, Sept. 1991, pp. 235-45.
-
(1991)
ACM SIGCOMM Comp. Commun. Rev. (SIGCOMM '91)
, vol.21
, Issue.4
, pp. 235-245
-
-
Ioannidis, J.1
Duchamp, D.2
Maguire G.Q., Jr.3
-
2
-
-
84964410786
-
A network architecture providing host migration transparency
-
Sept.
-
F. Teraoka, Y. Yokore, and M. Tokoro, "A Network Architecture Providing Host Migration Transparency," SIGCOMM '91, vol. 21, no. 4, Sept. 1991, pp. 209-20.
-
(1991)
SIGCOMM '91
, vol.21
, Issue.4
, pp. 209-220
-
-
Teraoka, F.1
Yokore, Y.2
Tokoro, M.3
-
4
-
-
0003626823
-
-
Computer Science Press, Rockville, MD
-
M. K. Simon et al., Spread Spectrum Communications, vol. I-II, Computer Science Press, Rockville, MD, 1985.
-
(1985)
Spread Spectrum Communications
, vol.1-2
-
-
Simon, M.K.1
-
5
-
-
0023092944
-
A design concept for reliable mobile radio networks with frequency hopping signaling
-
Jan.
-
A. Ephremides, J. E. Wieselthier, and D. J. Baker, "A Design Concept for Reliable Mobile Radio Networks with Frequency Hopping Signaling," Proc. IEEE, vol. 75, no. 1, Jan. 1987, pp. 56-73.
-
(1987)
Proc. IEEE
, vol.75
, Issue.1
, pp. 56-73
-
-
Ephremides, A.1
Wieselthier, J.E.2
Baker, D.J.3
-
6
-
-
0023123265
-
Future directions in packet radio architecture and protocols
-
Jan.
-
N. Shacham and J. Westcott, "Future Directions in Packet Radio Architecture and Protocols," Proc. IEEE, vol. 75, no. 1, Jan. 1987, pp. 83-99.
-
(1987)
Proc. IEEE
, vol.75
, Issue.1
, pp. 83-99
-
-
Shacham, N.1
Westcott, J.2
-
7
-
-
0027629410
-
Frequency-hopped spread spectrum in the presence of a flower partial-band jammer
-
July
-
A. A. Hassan, W. E. Stark, and J. E. Hershey, "Frequency-Hopped Spread Spectrum in the Presence of a Flower Partial-Band Jammer," IEEE Trans. Commun., vol. 41, no. 7, July 1993, pp. 1125-31.
-
(1993)
IEEE Trans. Commun.
, vol.41
, Issue.7
, pp. 1125-1131
-
-
Hassan, A.A.1
Stark, W.E.2
Hershey, J.E.3
-
8
-
-
0027635417
-
Routing in frequency-hop packet radio networks with partial-band jamming
-
July
-
M. B. Pursley and H. B. Russel, "Routing in Frequency-Hop Packet Radio Networks with Partial-Band Jamming," IEEE Trans. Commun., vol. 41, no. 7, July 1993, pp. 1117-24.
-
(1993)
IEEE Trans. Commun.
, vol.41
, Issue.7
, pp. 1117-1124
-
-
Pursley, M.B.1
Russel, H.B.2
-
9
-
-
0030264587
-
An efficient routing algorithm for mobile wireless networks
-
Oct.
-
S. Murphy and J. J. Garcia-Luna-Aceves, "An Efficient Routing Algorithm for Mobile Wireless Networks," MONET, Oct. 1996, vol. 1, no. 2, pp. 183-97.
-
(1996)
MONET
, vol.1
, Issue.2
, pp. 183-197
-
-
Murphy, S.1
Garcia-Luna-Aceves, J.J.2
-
10
-
-
0000629443
-
Dynamic source routing in ad-hoc wireless networks
-
D. B. Johnson and D. A. Maltz, "Dynamic Source Routing in Ad-Hoc Wireless Networks," Mobile Comp., 1996.
-
(1996)
Mobile Comp.
-
-
Johnson, D.B.1
Maltz, D.A.2
-
11
-
-
0029723943
-
A mobile radio network architecture with dynamically changing topology using virtual subnets
-
Dallas, TX, June
-
J. Sharony, "A Mobile Radio Network Architecture with Dynamically Changing Topology using Virtual Subnets," Proc. ICC/SUPERCOMM '96, Dallas, TX, June 1996, pp. 807-12.
-
(1996)
Proc. ICC/SUPERCOMM '96
, pp. 807-812
-
-
Sharony, J.1
-
12
-
-
0031353437
-
A highly adaptable distributed routing algorithm for mobile wireless networks
-
Kobe, Japan
-
V. D. Park and M. S. Corson, "A Highly Adaptable Distributed Routing Algorithm for Mobile Wireless Networks," IEEE INFOCOM '97, Kobe, Japan, 1997.
-
(1997)
IEEE INFOCOM '97
-
-
Park, V.D.1
Corson, M.S.2
-
13
-
-
0031096869
-
Associativity-based routing for ad hoc mobile networks
-
Mar.
-
C.-K. Toh, "Associativity-Based Routing for Ad Hoc Mobile Networks," Wireless Pers. Commun. J., Special Issue on Mobile Networking and Computing Systems, vol. 4, no. 2, Mar. 1997, pp. 103-39.
-
(1997)
Wireless Pers. Commun. J., Special Issue on Mobile Networking and Computing Systems
, vol.4
, Issue.2
, pp. 103-139
-
-
Toh, C.-K.1
-
14
-
-
0003119120
-
The performance of query control schemes for zone routing protocol
-
June
-
Z. J. Haas and M. Perlman, "The Performance of Query Control Schemes for Zone Routing Protocol," SIGCOMM '98, June 1998.
-
(1998)
SIGCOMM '98
-
-
Haas, Z.J.1
Perlman, M.2
-
15
-
-
0003938947
-
-
IETF MANET, Internet draft, Nov.
-
P. Jacquet, P. Muhlethaler and A. Qayyum, "Optimized Link State Routing Protocol," IETF MANET, Internet draft, Nov. 1998.
-
(1998)
Optimized Link State Routing Protocol
-
-
Jacquet, P.1
Muhlethaler, P.2
Qayyum, A.3
-
16
-
-
34347349933
-
Ad hoc on-demand distance vector routing
-
New Orleans, LA, Feb.
-
C. E. Perkins and E. M Royer, "Ad Hoc On-Demand Distance Vector Routing," IEEE WMCSA '99, New Orleans, LA, Feb. 1999.
-
(1999)
IEEE WMCSA '99
-
-
Perkins, C.E.1
Royer, E.M.2
-
17
-
-
0027693935
-
Diversity coding for transparent self-healing and fault-tolerant communication networks
-
Nov.
-
E. Ayanoglu et al., "Diversity Coding for Transparent Self-Healing and Fault-Tolerant Communication Networks," IEEE Trans. Commun., vol. 41, no. 11, Nov. 1993, pp. 1677-86.
-
(1993)
IEEE Trans. Commun.
, vol.41
, Issue.11
, pp. 1677-1686
-
-
Ayanoglu, E.1
-
18
-
-
0003339136
-
The digital distributed systems security architecture
-
NIST
-
M. Gasser et al., "The Digital Distributed Systems Security Architecture," Proc. 12th Nat'l. Comp. Security Conf., NIST, 1989, pp. 305-19.
-
(1989)
Proc. 12th Nat'l. Comp. Security Conf.
, pp. 305-319
-
-
Gasser, M.1
-
19
-
-
0026154828
-
SPX: Global authentication using public key certificates
-
Oakland, CA, May
-
J. J. Tardo and K. Algappan, "SPX: Global Authentication Using Public Key Certificates," Proc. IEEE Symp. Security and Privacy, Oakland, CA, May 1991, pp. 232-44.
-
(1991)
Proc. IEEE Symp. Security and Privacy
, pp. 232-244
-
-
Tardo, J.J.1
Algappan, K.2
-
21
-
-
85023809951
-
Threshold cryptosystems
-
G. Brassard, Ed., Springer-Verlag, Aug.
-
Y. Desmedt and Y. Frankel, "Threshold Cryptosystems," Advances in Cryptology - Crypto '89 (Lecture Notes in Computer Science 435), G. Brassard, Ed., Springer-Verlag, Aug. 1990, pp. 307-15.
-
(1990)
Advances in Cryptology - Crypto '89 (Lecture Notes in Computer Science 435)
, vol.435
, pp. 307-315
-
-
Desmedt, Y.1
Frankel, Y.2
-
22
-
-
0028462933
-
Threshold cryptography
-
July-Aug.
-
Y. Desmedt, "Threshold Cryptography," Euro. Trans. Telecommun., vol. 5, no. 4, July-Aug. 1994, pp. 449-57.
-
(1994)
Euro. Trans. Telecommun.
, vol.5
, Issue.4
, pp. 449-457
-
-
Desmedt, Y.1
-
26
-
-
0010316932
-
Proactive secret sharing and public key cryptosystems
-
Master's Thesis, MIT, Sept.
-
S. Jarecki, "Proactive Secret Sharing and Public Key Cryptosystems," Master's Thesis, Dept. Elec. Eng. and Comp. Sci., MIT, Sept. 1995.
-
(1995)
Dept. Elec. Eng. and Comp. Sci.
-
-
Jarecki, S.1
-
27
-
-
84957626176
-
Proactive secret sharing or: How to cope with perpetual leakage
-
D. Coppersmith, Ed., Aug. Springer-Verlag
-
A. Herzberg et al., "Proactive Secret Sharing or: How to Cope with Perpetual Leakage," Advances in Cryptology - Crypto '95 (Lecture Notes in Computer Science 963), D. Coppersmith, Ed., Aug. 1995, Springer-Verlag, pp. 457-69.
-
(1995)
Advances in Cryptology - Crypto '95 (Lecture Notes in Computer Science 963)
, vol.963
, pp. 457-469
-
-
Herzberg, A.1
-
29
-
-
84958676203
-
Proactive RSA
-
Springer-Verlag, U.S.A., Aug.
-
Y. Frankel et al., "Proactive RSA," Advances in Cryptology - Crypto '97 (Lecture Notes in Computer Science 1294), Springer-Verlag, U.S.A., Aug. 1997, pp. 440-54.
-
(1997)
Advances in Cryptology - Crypto '97 (Lecture Notes in Computer Science 1294)
, vol.1294
, pp. 440-454
-
-
Frankel, Y.1
-
31
-
-
0023538330
-
A practical scheme for noninteractive verifiable secret sharing
-
P. Feldman, "A Practical Scheme for Noninteractive Verifiable Secret Sharing," Proc. 28th IEEE Symp. Foundations of Comp. Sci., 1987, pp. 427-37.
-
(1987)
Proc. 28th IEEE Symp. Foundations of Comp. Sci.
, pp. 427-437
-
-
Feldman, P.1
-
32
-
-
84982943258
-
Noninteractive and information-theoretic secure verifiable secret sharing
-
Springer-Verlag, Aug.
-
T. P. Pedersen, "Noninteractive and Information-Theoretic Secure Verifiable Secret Sharing," Crypto '91 (Lecture Notes in Computer Science 576), Springer-Verlag, Aug. 1992, pp. 129-40.
-
(1992)
Crypto '91 (Lecture Notes in Computer Science 576)
, vol.576
, pp. 129-140
-
-
Pedersen, T.P.1
-
33
-
-
0038061165
-
Redistributing secret shares to new access structures and its applications
-
George Mason Univ., July
-
Y. Desmedt and S. Jajodia, "Redistributing Secret Shares to New Access Structures and Its Applications," Tech. rep. ISSE_TR-97-01, George Mason Univ., July 1997.
-
(1997)
Tech. Rep. ISSE_TR-97-01
-
-
Desmedt, Y.1
Jajodia, S.2
-
34
-
-
0022045868
-
Impossibility of distributed consensus with one faulty processor
-
Apr.
-
M. J. Fisher, N. A. Lynch, and M. S. Peterson, "Impossibility of Distributed Consensus with One Faulty Processor," J. ACM, vol. 32, no. 2, Apr. 1985, pp. 374-82.
-
(1985)
J. ACM
, vol.32
, Issue.2
, pp. 374-382
-
-
Fisher, M.J.1
Lynch, N.A.2
Peterson, M.S.3
-
35
-
-
0003828107
-
-
Ph.D. thesis, Department of Electrical Engineering and Computer Science, Massachusetts Institute of Technology
-
R. Perlman, "Network Layer Protocols with Byzantine Robustness," Ph.D. thesis, Department of Electrical Engineering and Computer Science, Massachusetts Institute of Technology, 1988.
-
(1988)
Network Layer Protocols with Byzantine Robustness
-
-
Perlman, R.1
-
36
-
-
0012580890
-
Integration of security in network routing protocols
-
B. Kumar, "Integration of security in network routing protocols," SIGSAC Reviews, vol. 11, no. 2, 1993, pp. 18-25.
-
(1993)
SIGSAC Reviews
, vol.11
, Issue.2
, pp. 18-25
-
-
Kumar, B.1
-
37
-
-
0030714201
-
Securing the nimrod routing architecture
-
Los Alamitos, CA, Feb. The Internet Society, IEEE Computer Society Press
-
K. E. Sirois and S. T. Kent, "Securing the Nimrod Routing Architecture," Proc. Symposium on Network and Distributed System Security, Los Alamitos, CA, Feb. 1997, The Internet Society, IEEE Computer Society Press, pp. 74-84.
-
(1997)
Proc. Symposium on Network and Distributed System Security
, pp. 74-84
-
-
Sirois, K.E.1
Kent, S.T.2
-
38
-
-
0030695529
-
Securing distance-vector routing protocols
-
Los Alamitos, CA, Feb.
-
B. R. Smith, S. Murphy and J. J. Garcia-Luna-Aceves, "Securing Distance-Vector Routing Protocols," Proc. Symp. Network and Dist. Sys. Security, Los Alamitos, CA, Feb. 1997, pp. 85-92.
-
(1997)
Proc. Symp. Network and Dist. Sys. Security
, pp. 85-92
-
-
Smith, B.R.1
Murphy, S.2
Garcia-Luna-Aceves, J.J.3
-
39
-
-
0033296081
-
Lowering security overhead in link state routing
-
R. Hauser, T. Przygienda, and G. Tsudik, "Lowering Security Overhead in Link State Routing," Comp. Networks, Apr. 1999, vol. 31, no. 8, pp. 885-94.
-
(1999)
Comp. Networks, Apr.
, vol.31
, Issue.8
, pp. 885-894
-
-
Hauser, R.1
Przygienda, T.2
Tsudik, G.3
-
40
-
-
0030126124
-
Distributing trust with the rampart toolkit
-
M. K. Reiter, "Distributing Trust with the Rampart toolkit," Commun. ACM, vol. 39, no. 4, 1996, pp. 71-74.
-
(1996)
Commun. ACM
, vol.39
, Issue.4
, pp. 71-74
-
-
Reiter, M.K.1
-
42
-
-
0030376048
-
The Ω key management service
-
M. K. Reiteret al., "The Ω Key Management Service," J. Comp. Security, vol. 4, no. 4, 1996, pp. 267-97.
-
(1996)
J. Comp. Security
, vol.4
, Issue.4
, pp. 267-297
-
-
Reiter, M.K.1
-
43
-
-
0027617271
-
Increasing availability and security of an authentication service
-
June
-
L. Gong, "Increasing Availability and Security of an Authentication Service," IEEE JSAC, vol. 11, no. 5, June 1993, pp. 657-62.
-
(1993)
IEEE JSAC
, vol.11
, Issue.5
, pp. 657-662
-
-
Gong, L.1
-
45
-
-
0032306029
-
Byzantine quorum systems
-
D. Malkhi and M. Reiter, "Byzantine Quorum Systems," J. Dist. Comp., vol. 11, no. 4, 1998.
-
(1998)
J. Dist. Comp.
, vol.11
, Issue.4
-
-
Malkhi, D.1
Reiter, M.2
-
47
-
-
0025564050
-
Implementing fault-tolerant services using the state machine approach: A tutorial
-
Dec.
-
F. B. Schneider, "Implementing Fault-Tolerant Services Using the State Machine Approach: A Tutorial," ACM Comp. Surveys, vol. 22, no. 4, Dec. 1990, pp. 299-319.
-
(1990)
ACM Comp. Surveys
, vol.22
, Issue.4
, pp. 299-319
-
-
Schneider, F.B.1
-
48
-
-
0032687836
-
Ad hoc mobility management using quorum systems
-
Z. J. Haas and B. Liang, "Ad Hoc Mobility Management using Quorum Systems," IEEE/ACM Trans. Net., 1999.
-
(1999)
IEEE/ACM Trans. Net.
-
-
Haas, Z.J.1
Liang, B.2
|