-
1
-
-
0002431508
-
The ALOHA system-another alternative for computer communications
-
November
-
Norman Abramson. The ALOHA System-Another Alternative for Computer Communications. In Proceedings of the Fall 1970 AFIPS Computer Conference, pages 281-285, November 1970.
-
(1970)
Proceedings of the Fall 1970 AFIPS Computer Conference
, pp. 281-285
-
-
Abramson, N.1
-
2
-
-
0042034264
-
-
Allentown, PA. Available at
-
Agere Systems Inc. Specification sheet for ORiNOCO World PC Card. Allentown, PA. Available at ftp://ftp.orinocowireless.com/pub/docs/ORINOCO/ BROCHURES/US/World%20PC%20Card%20US.pdf.
-
Specification Sheet for ORiNOCO World PC Card
-
-
-
4
-
-
35048891868
-
Keying hash functions for message authentication
-
Advances in Cryptology - CRYPTO '96
-
Mihir Bellare, Ran Canetti, and Hugo Krawczyk. Keying Hash Functions for Message Authentication. In Advances in Cryptology - CRYPTO '96, edited by Neal Koblitz, volume 1109 of Lecture Notes in Computer Science, pages 1-15. Springer-Verlag, Berlin Germany, 1996. (Pubitemid 126106226)
-
(1996)
Lecture Notes in Computer Science
, Issue.1109
, pp. 1-15
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
7
-
-
85084161952
-
PGP in constrained wireless devices
-
August
-
Michael Brown, Donny Cheung, Darrel Hankerson, Julio Lopez Hernandez, Michael Kirkup, and Alfred Menezes. PGP in Constrained Wireless Devices. In Proceedings of the 9th USENIX Security Symposium, pages 247-262, August 2000.
-
(2000)
Proceedings of the 9th USENIX Security Symposium
, pp. 247-262
-
-
Brown, M.1
Cheung, D.2
Hankerson, D.3
Hernandez, J.L.4
Kirkup, M.5
Menezes, A.6
-
8
-
-
0032661699
-
Multicast security: A taxonomy and some efficient constructions
-
March
-
Ran Canetti, Juan Garay, Gene Itkis, Daniele Micciancio, Moni Naor, and Benny Pinkas. Multicast Security: A Taxonomy and Some Efficient Constructions. In Proceedings of the Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM'99), pages 708-716, March 1999.
-
(1999)
Proceedings of the Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM'99)
, pp. 708-716
-
-
Canetti, R.1
Garay, J.2
Itkis, G.3
Micciancio, D.4
Naor, M.5
Pinkas, B.6
-
9
-
-
0012609256
-
-
Tom Clark Green-belt, Maryland. Available at
-
Tom Clark. Tom Clark's Totally Accurate Clock FTP Site. Green-belt, Maryland. Available at ftp://aleph.gsfc.nasa.gov/GPS/totally.accurate.clock/.
-
Tom Clark's Totally Accurate Clock FTP Site
-
-
-
13
-
-
0022793132
-
How to construct random functions
-
October
-
Oded Goldreich, Shafi Goldwasser, and Silvio Micali. How to Construct Random Functions. Journal of the ACM, 33(4):792-807, October 1986.
-
(1986)
Journal of the ACM
, vol.33
, Issue.4
, pp. 792-807
-
-
Goldreich, O.1
Goldwasser, S.2
Micali, S.3
-
14
-
-
0004147444
-
-
Summer Course "Cryptography and Computer Security," at MIT, 1996-1999, August
-
Shafi Goldwasser and Mihir Bellare. Lecture Notes on Cryptography. Summer Course "Cryptography and Computer Security" at MIT, 1996-1999, August 1999.
-
(1999)
Lecture Notes on Cryptography
-
-
Goldwasser, S.1
Bellare, M.2
-
18
-
-
0003580691
-
-
IEEE Computer Society LAN MAN Standards Committee IEEE Std 802.11-1997. The Institute of Electrical and Electronics Engineers, New York, New York
-
IEEE Computer Society LAN MAN Standards Committee. Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, IEEE Std 802.11-1997. The Institute of Electrical and Electronics Engineers, New York, New York, 1997.
-
(1997)
Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications
-
-
-
19
-
-
0001341422
-
The dynamic source routing protocol for multihop wireless ad hoc networks
-
edited by Charles E. Perkins, chapter 5 Addison-Wesley
-
David B. Johnson, David A. Maltz, and Josh Broch. The Dynamic Source Routing Protocol for Multihop Wireless Ad Hoc Networks. In Ad Hoc Networking, edited by Charles E. Perkins, chapter 5, pages 139-172. Addison-Wesley, 2001.
-
(2001)
Ad Hoc Networking
, pp. 139-172
-
-
Johnson, D.B.1
Maltz, D.A.2
Broch, J.3
-
23
-
-
0035704362
-
Providing robust and ubiquitous security support for mobile ad-hoc networks
-
Jiejun Konh, Petros Zerfos, Haiyun Luo, Songwu Lu, and Lixia Zhang. Providing Robust and Ubiquitous Security Support for Mobile Ad-Hoc Networks. In Proceedings of the Ninth International Conference on Network Protocols (ICNP 2001), pages 251-260, November 2001. (Pubitemid 34099990)
-
(2001)
International Conference on Network Protocols
, pp. 251-260
-
-
Kong, J.1
Zerfos, P.2
Luo, H.3
Lu, S.4
Zhang, L.5
-
24
-
-
0019634370
-
Password authentication with insecure communication
-
November
-
Leslie Lamport. Password Authentication with Insecure Communication. Communications of the ACM, 24(11):770-772, November 1981.
-
(1981)
Communications of the ACM
, vol.24
, Issue.11
, pp. 770-772
-
-
Lamport, L.1
-
25
-
-
0000653210
-
Selecting cryptographic key sizes
-
DOI 10.1007/s00145-001-0009-4
-
Arjen K. Lenstra and Eric R. Verheul. Selecting Cryptographic Key Sizes. Journal of Cryptology: The Journal of the International Association for Cryptologic Research, 14(4):255-293, September 2001. Available at http://www.cryptosavvy.com/. (Pubitemid 33770276)
-
(2001)
Journal of Cryptology
, vol.14
, Issue.4
, pp. 255-293
-
-
Lenstra, A.K.1
Verheul, E.R.2
-
28
-
-
0042535004
-
A computer-controlled LORAN-C receiver for precision timekeeping
-
University of Delaware, Newark, DE, March
-
David L. Mills. A Computer-Controlled LORAN-C Receiver for Precision Timekeeping. Technical Report 92-3-1, Department of Electrical and Computer Engineering, University of Delaware, Newark, DE, March 1992.
-
(1992)
Technical Report 92-3-1, Department of Electrical and Computer Engineering
-
-
Mills, D.L.1
-
29
-
-
0042535003
-
A precision radio clock for WWV transmissions
-
University of Delaware, Newark, DE, August
-
David L. Mills. A Precision Radio Clock for WWV Transmissions. Technical Report 97-8-1, Department of Electrical and Computer Engineering, University of Delaware, Newark, DE, August 1997.
-
(1997)
Technical Report 97-8-1, Department of Electrical and Computer Engineering
-
-
Mills, D.L.1
-
32
-
-
0033690336
-
Efficient authentication and signature of multicast streams over lossy channels
-
May
-
Adrian Perrig, Ran Canetti, Doug Tygar, and Dawn Song. Efficient Authentication and Signature of Multicast Streams over Lossy Channels. In Proceedings of the IEEE Symposium on Research in Security and Privacy, pages 56-73, May 2000.
-
(2000)
Proceedings of the IEEE Symposium on Research in Security and Privacy
, pp. 56-73
-
-
Perrig, A.1
Canetti, R.2
Tygar, D.3
Song, D.4
-
33
-
-
0034771605
-
SPINS: Security protocols for sensor networks
-
Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, and J. D. Tygar. SPINS: Security Protocols for Sensor Networks. In Proceedings of the Seventh Annual Annual International Conference on Mobile Computing and Networks (MobiCom 2001), pages 189-199, July 2001. (Pubitemid 33006715)
-
(2001)
Proceedings of the Annual International Conference on Mobile Computing and Networking, MOBICOM
, pp. 189-199
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, J.D.5
-
34
-
-
0020128340
-
Theory of spread spectrum communications - A tutorial
-
May
-
Raymond L. Pickholtz, Donald L. Schilling, and Laurence B. Milstein. Theory of Spread Spectrum Communications - A Tutorial. IEEE Transactions on Communications, 30(5):855-884, May 1982.
-
(1982)
IEEE Transactions on Communications
, vol.30
, Issue.5
, pp. 855-884
-
-
Pickholtz, R.L.1
Schilling, D.L.2
Milstein, L.B.3
-
35
-
-
0041532995
-
-
Sunnyvale, CA. Available at
-
Proxim, Inc. Data sheet for Proxim Harmony 802.11a CardBus Card. Sunnyvale, CA. Available at http://www.proxim.com/products/all/harmony/docs/ds/ harmony-11a-cardbus.pdf.
-
Data Sheet for Proxim Harmony 802.11a CardBus Card
-
-
-
36
-
-
0003491910
-
Multipoint relaying: An efficient technique for flooding in mobile wireless networks
-
Project HIPERCOM, INRIA, February
-
Amir Qayyum, Laurent Viennot, and Anis Laouiti. Multipoint Relaying: An Efficient Technique for flooding in Mobile Wireless Networks. Technical Report Research Report RR-3898, Project HIPERCOM, INRIA, February 2000.
-
(2000)
Technical Report Research Report RR-3898
-
-
Qayyum, A.1
Viennot, L.2
Laouiti, A.3
-
37
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
DOI 10.1145/359340.359342
-
Ron L. Rivest, Adi Shamir, and Leonard M. Adleman. A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM, 21(2):120-126, February 1978. (Pubitemid 8591219)
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
38
-
-
12344258539
-
Efficient signature generation by smart cards
-
Claus P. Schnorr. Efficient Signature Generation by Smart Cards. Journal of Cryptology, 4(3):161-174, 1991.
-
(1991)
Journal of Cryptology
, vol.4
, Issue.3
, pp. 161-174
-
-
Schnorr, C.P.1
-
40
-
-
0001831930
-
The resurrecting duckling: Security issues for ad-hoc wireless networks
-
edited by B. Christianson, B. Crispo, and M. Roe. Springer-Verlag, Berlin Germany
-
Frank Stajano and Ross Anderson. The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks. In Security Protocols, 7th International Workshop, edited by B. Christianson, B. Crispo, and M. Roe. Springer-Verlag, Berlin Germany, 1999.
-
(1999)
Security Protocols, 7th International Workshop
-
-
Stajano, F.1
Anderson, R.2
-
41
-
-
1542313506
-
Performance analysis of MD5
-
August
-
Joseph D. Touch. Performance Analysis of MD5. In Proceedings of the ACM SIGCOMM '95 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, pages 77-86, August 1995.
-
(1995)
Proceedings of the ACM SIGCOMM '95 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication
, pp. 77-86
-
-
Touch, J.D.1
-
44
-
-
0033357103
-
Securing ad hoc networks
-
DOI 10.1109/65.806983
-
Lidong Zhou and Zygmunt J. Haas. Securing Ad Hoc Networks. IEEE Network Magazine, 13(6):24-30, November/December 1999. (Pubitemid 30526484)
-
(1999)
IEEE Network
, vol.13
, Issue.6
, pp. 24-30
-
-
Zhou, L.1
Haas, Z.J.2
|