-
4
-
-
0027693935
-
Diversity coding for transparent self-healing and fault-tolerant communication networks
-
E. Ayanoglu et al. Diversity coding for transparent self-healing and fault-tolerant communication networks. IEEE Transactions on Communications, 41(11), 1993.
-
(1993)
IEEE Transactions on Communications
, vol.41
, Issue.11
-
-
Ayanoglu, E.1
-
5
-
-
0035365149
-
Self-organization in mobile ad hoc networks: The approach of Terminodes
-
June
-
L. Blažević, L. Buttyán, S. Čapkun, S. Giordano, J.-P. Hubaux, and J.-Y. Le Boudec. Self-organization in mobile ad hoc networks: The approach of Terminodes. IEEE Communications Magazine, June 2001.
-
(2001)
IEEE Communications Magazine
-
-
Blažević, L.1
Buttyán, L.2
Čapkun, S.3
Giordano, S.4
Hubaux, J.-P.5
Le Boudec, J.-Y.6
-
6
-
-
0034158886
-
Key establishment protocols for secure mobile communications: A critical survey
-
C. Boyd and A. Mathuria. Key establishment protocols for secure mobile communications: a critical survey. Computer Communications, 23:575-587, 2000.
-
(2000)
Computer Communications
, vol.23
, pp. 575-587
-
-
Boyd, C.1
Mathuria, A.2
-
7
-
-
25844488399
-
Enforcing service availability in mobile ad hoc networks
-
L. Buttyáu and J.-P. Hubanx. Enforcing service availability in mobile ad hoc networks. In Proceedings of MobiHOC, 2000.
-
(2000)
Proceedings of MobiHOC
-
-
Buttyáu, L.1
Hubanx, J.-P.2
-
10
-
-
1542593353
-
Authentication and authenticated key exchanges
-
W. Diffie, P. van Oorschot, and M. Wiener. Authentication and authenticated key exchanges. Designs, Codes and Cryptography, pages 107-125, 1992.
-
(1992)
Designs, Codes and Cryptography
, pp. 107-125
-
-
Diffie, W.1
Van Oorschot, P.2
Wiener, M.3
-
11
-
-
0023092944
-
A design concept for reliable mobile radio networks with frequency hopping signaling
-
A. Ephremides, J. Wieselthier, and D. Baker. A design concept for reliable mobile radio networks with frequency hopping signaling. Proceedings of the IEEE, 1987.
-
(1987)
Proceedings of the IEEE
-
-
Ephremides, A.1
Wieselthier, J.2
Baker, D.3
-
16
-
-
0012992717
-
Routing in packet radio networks to prevent traffic analysis
-
West Point, NY, July
-
S. Jiang, N. Vaidya, and W. Zhao. Routing in packet radio networks to prevent traffic analysis. In Proceedings of the IEEE Information Assurance and Security Workshop, West Point, NY, July 2000.
-
(2000)
Proceedings of the IEEE Information Assurance and Security Workshop
-
-
Jiang, S.1
Vaidya, N.2
Zhao, W.3
-
21
-
-
0034771605
-
SPINS: Security protocols for sensor networks
-
A. Perrig, R. Szewczyk, V. Wen, D. Cullar, and J. D. Tygar. SPINS: Security protocols for sensor networks. In Proceedings of MOBICOM, 2001.
-
(2001)
Proceedings of MOBICOM
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Cullar, D.4
Tygar, J.D.5
-
24
-
-
0001827537
-
Identity-based cryptosystems and signature schemes
-
A. Shamir. Identity-based cryptosystems and signature schemes. In Proceedings of CRYPTO'84, 1984.
-
(1984)
Proceedings of CRYPTO'84
-
-
Shamir, A.1
-
26
-
-
0004081447
-
-
Princeton University Press
-
D. Watts. Small Worlds. Princeton University Press, 1999.
-
(1999)
Small Worlds
-
-
Watts, D.1
-
27
-
-
0034546898
-
Intrusion detection in wireless ad-hoc networks
-
Y. Zhang and W. Lee. Intrusion detection in wireless ad-hoc networks. In Proceedings of MOBICOM, 2000.
-
(2000)
Proceedings of MOBICOM
-
-
Zhang, Y.1
Lee, W.2
-
28
-
-
0033357103
-
Securing ad hoc networks
-
November/December
-
L. Zhou and Z. Haas. Securing ad hoc networks. IEEE Network, 13(6):24-30, November/December 1999.
-
(1999)
IEEE Network
, vol.13
, Issue.6
, pp. 24-30
-
-
Zhou, L.1
Haas, Z.2
|