-
3
-
-
0000629443
-
Dynamic source routing in ad hoc wireless networks
-
Imielinski T, Korth H (eds) Kluwer Academic Publishers: Norwell, MA
-
Johnson DB, Maltz DA. Dynamic source routing in ad hoc wireless networks. In Mobile Computing. Imielinski T, Korth H (eds). vol. 353, Kluwer Academic Publishers: Norwell, MA, 1996; pp. 153-181.
-
(1996)
Mobile Computing
, vol.353
, pp. 153-181
-
-
Johnson, D.B.1
Maltz, D.A.2
-
4
-
-
85031307530
-
Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers
-
Perkins CE, Bhagwat P. Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers. In SIGCOMM, 1994; pp. 234-244.
-
(1994)
SIGCOMM
, pp. 234-244
-
-
Perkins, C.E.1
Bhagwat, P.2
-
5
-
-
0033892676
-
Performance comparison of two on-demand routing protocols for ad hoc networks
-
Das SR, Perkins CE, Royer EE. Performance comparison of two on-demand routing protocols for ad hoc networks. In INFOCOM, 2000; pp. 3-12.
-
(2000)
INFOCOM
, pp. 3-12
-
-
Das, S.R.1
Perkins, C.E.2
Royer, E.E.3
-
7
-
-
0013398775
-
Internets in the sky: The capacity of three dimensional wireless networks
-
Gupta P, Kumar PR. Internets in the sky: the capacity of three dimensional wireless networks. Communications in Information Systems 2001; 1(1): 39-49.
-
(2001)
Communications in Information Systems
, vol.1
, Issue.1
, pp. 39-49
-
-
Gupta, P.1
Kumar, P.R.2
-
8
-
-
0034777647
-
Capacity of ad hoc wireless networks
-
Li J, Blake C, Couto DD, Lee HI, Morris R. Capacity of ad hoc wireless networks. In MOBICOM, 2001; pp. 61-69.
-
(2001)
MOBICOM
, pp. 61-69
-
-
Li, J.1
Blake, C.2
Couto, D.D.3
Lee, H.I.4
Morris, R.5
-
9
-
-
0034590134
-
UAV-aided intelligent routing for ad-hoc wireless network in single-area theater
-
Gu DL, Pei G, Ly H, Gerla M, Zhang B, Hong X. UAV-aided intelligent routing for ad-hoc wireless network in single-area theater. In IEEE WCNC, 2000; pp. 1220-1225.
-
(2000)
IEEE WCNC
, pp. 1220-1225
-
-
Gu, D.L.1
Pei, G.2
Ly, H.3
Gerla, M.4
Zhang, B.5
Hong, X.6
-
10
-
-
0013390634
-
Hierarchical routing for multi-layer ad-hoc wireless networks with UAVs
-
Gu DL, Pei G, Ly H, Gerla M, Hong X. Hierarchical routing for multi-layer ad-hoc wireless networks with UAVs. In IEEE MILCOM, 2000.
-
(2000)
IEEE MILCOM
-
-
Gu, D.L.1
Pei, G.2
Ly, H.3
Gerla, M.4
Hong, X.5
-
11
-
-
0036402438
-
C-ICAMA, A centralized intelligent channel assigned multiple access for multi-layer ad-hoc wireless networks with UAVs
-
Gu DL, Ly H, Hong X, Gerla M, Pei G, Lee Y. C-ICAMA, a centralized intelligent channel assigned multiple access for multi-layer ad-hoc wireless networks with UAVs. In IEEE WCNC, 2000; pp. 879-884.
-
(2000)
IEEE WCNC
, pp. 879-884
-
-
Gu, D.L.1
Ly, H.2
Hong, X.3
Gerla, M.4
Pei, G.5
Lee, Y.6
-
15
-
-
0034546898
-
Intrusion detection in wireless ad-hoc networks
-
Zhang Y, Lee W. Intrusion detection in wireless ad-hoc networks. In MOBICOM, 2000; pp. 275-283.
-
(2000)
MOBICOM
, pp. 275-283
-
-
Zhang, Y.1
Lee, W.2
-
16
-
-
0348096476
-
-
Netscape Communications Corporation. SSL 3.0 Specification
-
Netscape Communications Corporation. SSL 3.0 Specification.
-
-
-
-
20
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
Rivest RL, Shamir A, Adleman LM. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 1978; 21(2): 120-126.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.M.3
-
21
-
-
0000552770
-
Twenty years of attacks on the RSA cryptosystem
-
Boneh D. Twenty years of attacks on the RSA cryptosystem. Notices of the American Mathematical Society 1999; 46(2): 203-213.
-
(1999)
Notices of the American Mathematical Society
, vol.46
, Issue.2
, pp. 203-213
-
-
Boneh, D.1
-
23
-
-
4944253148
-
Maintaining authenticated communication in the presence of break-ins
-
Canetti R, Halevi S, Herzberg A. Maintaining authenticated communication in the presence of break-ins. Journal of Cryptology 2000; 13(1): 61-105.
-
(2000)
Journal of Cryptology
, vol.13
, Issue.1
, pp. 61-105
-
-
Canetti, R.1
Halevi, S.2
Herzberg, A.3
-
24
-
-
0034448545
-
Funkspiel schemes: An alternative to conventional tamper resistance
-
Hastad J, Jonsson J, Juels A, Yung M. Funkspiel schemes: an alternative to conventional tamper resistance. In ACM CCS, 2000; pp. 125-133.
-
(2000)
ACM CCS
, pp. 125-133
-
-
Hastad, J.1
Jonsson, J.2
Juels, A.3
Yung, M.4
-
25
-
-
0018545449
-
How to share a secret
-
Shamir A. How to share a secret. Communications of the ACM 1979; 22(11): 612-613.
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
26
-
-
0008095081
-
Parallel Reliable Threshold Multi-signature
-
Department of EECS, University of Wisconsin-Milwaukee, Milwaukee, WI
-
Frankel Y, Desmedt Y. Parallel Reliable Threshold Multi-signature. Technical Report TR-92-04-02, Department of EECS, University of Wisconsin-Milwaukee, Milwaukee, WI, 1992.
-
(1992)
Technical Report TR-92-04-02
-
-
Frankel, Y.1
Desmedt, Y.2
-
28
-
-
84957689308
-
A simplified approach to threshold and proactive RSA
-
Rabin T. A simplified approach to threshold and proactive RSA. In CRYPTO, 1998; pp. 89-104.
-
(1998)
CRYPTO
, pp. 89-104
-
-
Rabin, T.1
-
29
-
-
84948954277
-
Practical threshold signatures
-
Shoup V. Practical threshold signatures. In EUROCRYPT, 2000; pp. 207-220.
-
(2000)
EUROCRYPT
, pp. 207-220
-
-
Shoup, V.1
-
30
-
-
0035704362
-
Providing robust and ubiquitous security support for mobile ad-hoc networks
-
Kong J, Zerfos P, Luo H, Lu S, Zhang L. Providing robust and ubiquitous security support for mobile ad-hoc networks. In Ninth International Conference on Network Protocols (ICNP'01), 2001; pp. 251-260.
-
(2001)
Ninth International Conference on Network Protocols (ICNP'01)
, pp. 251-260
-
-
Kong, J.1
Zerfos, P.2
Luo, H.3
Lu, S.4
Zhang, L.5
-
32
-
-
0033357103
-
Securing ad hoc networks
-
Zhou L, Haas ZJ. Securing ad hoc networks. IEEE Networks 1999; 13(6): 24-30.
-
(1999)
IEEE Networks
, vol.13
, Issue.6
, pp. 24-30
-
-
Zhou, L.1
Haas, Z.J.2
-
33
-
-
0003515999
-
COCA: A Secure Distributed On-line Certification Authority
-
Computer Science Department, Cornell University, Ithaca, New York
-
Zhou L, Schneider FB, van Renesse R. COCA: A Secure Distributed On-line Certification Authority. Technical Report 2000-1828, Computer Science Department, Cornell University, Ithaca, New York, 2000.
-
(2000)
Technical Report 2000-1828
-
-
Zhou, L.1
Schneider, F.B.2
Van Renesse, R.3
-
34
-
-
0000299804
-
-
extended abstract, IBM T.J. Watson Research Center, November
-
Herzberg A, Jarecki S, Krawczyk H, Yung M. Proactive Secret Sharing or: How to Cope with Perpetual Leakage, extended abstract, IBM T.J. Watson Research Center, November 1995.
-
(1995)
Proactive Secret Sharing or: How to Cope with Perpetual Leakage
-
-
Herzberg, A.1
Jarecki, S.2
Krawczyk, H.3
Yung, M.4
-
38
-
-
84947917119
-
Publicly verifiable secret sharing
-
Stadler M. Publicly verifiable secret sharing. In EUROCRYPT, 1996; pp. 190-199.
-
(1996)
EUROCRYPT
, pp. 190-199
-
-
Stadler, M.1
-
39
-
-
84957080948
-
A simple publicly verifiable secret sharing scheme and its application to electronic voting
-
Schoenmakers B. A simple publicly verifiable secret sharing scheme and its application to electronic voting. In CRYPTO, 1999; pp. 148-164.
-
(1999)
CRYPTO
, pp. 148-164
-
-
Schoenmakers, B.1
-
40
-
-
0030415891
-
Security on the move: Indirect authentication using kerberos
-
Fox A, Gribble SD. Security on the move: indirect authentication using kerberos. In MOBICOM, 1996; pp. 155-164.
-
(1996)
MOBICOM
, pp. 155-164
-
-
Fox, A.1
Gribble, S.D.2
-
41
-
-
0001636850
-
Kerberos: An authentication service for open network systems
-
Steiner G, Neuman BC, Schiller JI. Kerberos: an authentication service for open network systems. In USENIX Winter, 1988; pp. 191-202.
-
(1988)
USENIX Winter
, pp. 191-202
-
-
Steiner, G.1
Neuman, B.C.2
Schiller, J.I.3
-
42
-
-
84958639277
-
Efficient generation of shared RSA keys
-
Boneh D, Franklin MK. Efficient generation of shared RSA keys. In CRYPTO, 1997; pp. 425-439.
-
(1997)
CRYPTO
, pp. 425-439
-
-
Boneh, D.1
Franklin, M.K.2
-
45
-
-
84954111940
-
LANMAR: Landmark routing for large scale wireless ad hoc networks with group mobility
-
Pei G, Hong X, Gerla M. LANMAR: landmark routing for large scale wireless ad hoc networks with group mobility. In IEEE/ACM MobiHOC, 2000.
-
(2000)
IEEE/ACM MobiHOC
-
-
Pei, G.1
Hong, X.2
Gerla, M.3
-
46
-
-
84907551158
-
A wireless hierarchical routing protocol with group mobility
-
Pei G, Gerla M, Hong X, Chiang CC. A wireless hierarchical routing protocol with group mobility. In IEEE WCNC, 1999.
-
(1999)
IEEE WCNC
-
-
Pei, G.1
Gerla, M.2
Hong, X.3
Chiang, C.C.4
-
48
-
-
0348096477
-
-
Standard Performance Evaluation Corporation
-
Standard Performance Evaluation Corporation. http://www. specbench.org.
-
-
-
-
49
-
-
0348096480
-
-
RSA Security Inc. PKCS #1 - RSA Cryptography Standard
-
RSA Security Inc. PKCS #1 - RSA Cryptography Standard. http://www.rsasecurity.com/rsalabs/pkcs/pkcs-1/.
-
-
-
-
50
-
-
0346205281
-
Landmark routing in large wireless battlefield networks using UAVs
-
Xu K, Hong X, Ly H, Gerla M, Gu DL. Landmark routing in large wireless battlefield networks using UAVs. In IEEE MILCOM 2001.
-
(2001)
IEEE MILCOM
-
-
Xu, K.1
Hong, X.2
Ly, H.3
Gerla, M.4
Gu, D.L.5
-
51
-
-
0347466578
-
-
PGPi Project
-
PGPi Project. http://www.pgpi.org/.
-
-
-
-
53
-
-
0002474948
-
Performance comparison of public-key cryptosystems
-
Wiener MJ. Performance comparison of public-key cryptosystems. RSA CryptoBytes 1998; 4(1): 1-5.
-
(1998)
RSA CryptoBytes
, vol.4
, Issue.1
, pp. 1-5
-
-
Wiener, M.J.1
|