-
1
-
-
0033366376
-
Distributed clustering for ad hoc networks
-
A. Y. Zomaya, D. F. Hsu, O. Ibarra, S. Origuchi, D. Nassimi, and M. Palis, editors, Perth/Fremantle, Australia, June 23-25. IEEE Computer Society
-
S. Basagni. Distributed clustering for ad hoc networks. In A. Y. Zomaya, D. F. Hsu, O. Ibarra, S. Origuchi, D. Nassimi, and M. Palis, editors, Proceedings of the 1999 International Symposium on Parallel Architectures, Algorithms, and Networks (I-SPAN'99), pages 310-315, Perth/Fremantle, Australia, June 23-25 1999. IEEE Computer Society.
-
(1999)
Proceedings of the 1999 International Symposium on Parallel Architectures, Algorithms, and Networks (I-SPAN'99)
, pp. 310-315
-
-
Basagni, S.1
-
2
-
-
79952179081
-
Distributed and mobility-adaptive clustering for multimedia support in multi-hop wireless networks
-
Amsterdam, The Netherlands, September 19-22
-
S. Basagni. Distributed and mobility-adaptive clustering for multimedia support in multi-hop wireless networks. In Proceedings of the IEEE 50th International Vehicular Technology Conference, VTC 1999-Fall, volume 2, pages 889-893, Amsterdam, The Netherlands, September 19-22 1999.
-
(1999)
Proceedings of the IEEE 50th International Vehicular Technology Conference, VTC 1999-Fall
, vol.2
, pp. 889-893
-
-
Basagni, S.1
-
4
-
-
0034857486
-
Mobility-adaptive protocols for managing large ad hoc networks
-
Helsinki, Finland, June 11-14
-
S. Basagni, D. Turgut, and S. K. Das. Mobility-Adaptive Protocols for Managing Large Ad Hoc Networks. In Proceedings of the IEEE ICC 2001, Helsinki, Finland, June 11-14 2001.
-
(2001)
Proceedings of the IEEE ICC 2001
-
-
Basagni, S.1
Turgut, D.2
Das, S.K.3
-
5
-
-
0034475728
-
An on-demand weighted clustering algorithm (WCA) for ad hoc networks
-
San Francisco, CA, November 27-December 1
-
M. Chatterjee, S. K. Das, and D. Turgut. An on-demand weighted clustering algorithm (WCA) for ad hoc networks. In Proceedings of IEEE Globecom 2000, pages 1697-1701, San Francisco, CA, November 27-December 1 2000.
-
(2000)
Proceedings of IEEE Globecom 2000
, pp. 1697-1701
-
-
Chatterjee, M.1
Das, S.K.2
Turgut, D.3
-
6
-
-
0032664998
-
A new approach to the design and analysis of peer-to-peer mobile networks
-
May
-
I. Chlamtac and A. Faragó. A new approach to the design and analysis of peer-to-peer mobile networks. Wireless Networks, 5(3):149-156, May 1999.
-
(1999)
Wireless Networks
, vol.5
, Issue.3
, pp. 149-156
-
-
Chlamtac, I.1
Faragó, A.2
-
8
-
-
0442270540
-
Specifying the PLAN networking programming language
-
September
-
P. Kakkar, M. Hicks, J. T. Moore, and C. A. Gunter. Specifying the PLAN networking programming language. Higher Order Operational Techniques in Semantics, Electronic Notes in Theoretical Computer Science, vol. 26, September 1999.
-
(1999)
Higher Order Operational Techniques in Semantics, Electronic Notes in Theoretical Computer Science
, vol.26
-
-
Kakkar, P.1
Hicks, M.2
Moore, J.T.3
Gunter, C.A.4
-
10
-
-
0003584029
-
-
NIST. PIPS PUB 140-1, National Institute of Standards and Technology, January
-
NIST. PIPS PUB 140-1, Security Requirements for Cryptographic Modules. National Institute of Standards and Technology, January 1994.
-
(1994)
Security Requirements for Cryptographic Modules
-
-
-
11
-
-
0003851399
-
-
John Wiley & Sons, Inc., 2nd Edition
-
B. Schneier. Applied Cryptography: Protocols, Algorithms, and Source Code in C. John Wiley & Sons, Inc., 2nd Edition, 1996.
-
(1996)
Applied Cryptography: Protocols, Algorithms, and Source Code in C
-
-
Schneier, B.1
-
12
-
-
0033690786
-
Kronos: A scalable group re-keying approach for secure multicast
-
Oakland, CA, May
-
S. Setia, S. Koussih, S. Jajodia, E. Harder. Kronos: a scalable group re-keying approach for secure multicast. Proceedings of the 2000 IEEE Symposium on Security and Privacy, Oakland, CA, May 2000.
-
(2000)
Proceedings of the 2000 IEEE Symposium on Security and Privacy
-
-
Setia, S.1
Koussih, S.2
Jajodia, S.3
Harder, E.4
-
13
-
-
84947251443
-
The resurrecting duckling: Security issues for ad hoc networks
-
B. Christianson, B. Crispo, M. Roe eds. Proceedings of Security Protocols: 7th International Workshop
-
F. Stajano and R. Anderson. The resurrecting duckling: security issues for ad hoc networks. B. Christianson, B. Crispo, M. Roe eds., Proceedings of Security Protocols: 7th International Workshop, Lecture Notes in Computer Science n. 1796, pages 172-194, 1999.
-
(1999)
Lecture Notes in Computer Science
, vol.1796
, pp. 172-194
-
-
Stajano, F.1
Anderson, R.2
-
14
-
-
0000636954
-
The VersaKey framework: Versatile group key management
-
September
-
M. Waldvogel, G. Caronni, D. Sun. N. Weiler, B. Plattner, The VersaKey framework: versatile group key management. IEEE Journal on Selected Areas in Communications, 17(9):1614-1631, September 1999.
-
(1999)
IEEE Journal on Selected Areas in Communications
, vol.17
, Issue.9
, pp. 1614-1631
-
-
Waldvogel, M.1
Caronni, G.2
Sun, D.3
Weiler, N.4
Plattner, B.5
-
15
-
-
0033357103
-
Securing ad hoc networks
-
November/December
-
L. Zhou and Z. J. Haas. Securing ad hoc networks, in IEEE Network Magazine, 13(6), November/December 1999.
-
(1999)
IEEE Network Magazine
, vol.13
, Issue.6
-
-
Zhou, L.1
Haas, Z.J.2
|