-
1
-
-
0034431670
-
Self-organizing, self-healing wireless networks
-
C. Elliott and B. Heile,"Self-Organizing, Self-Healing Wireless Networks," Proceedings 2000 IEEE Aerospace Conference, vol. 1, pp. 149-156, 2000.
-
(2000)
Proceedings 2000 IEEE Aerospace Conference
, vol.1
, pp. 149-156
-
-
-
2
-
-
4143079666
-
Security in Ad Hoc networks
-
Helsinki University of Technology, Telecommunications Software and Multimedia Laboratory
-
V. Karpijoki, "Security in Ad Hoc Networks," Helsinki University of Technology, Tik-110.501 Seminar on Network Security, Telecommunications Software and Multimedia Laboratory, 2000.
-
(2000)
Tik-110.501 Seminar on Network Security
-
-
Karpijoki, V.1
-
5
-
-
0035789229
-
The quest for security in mobile Ad Hoc networks
-
Long Beach, CA, USA, October 4-5
-
J-P. Hubaux, L. Buttyan, and S. Capkun, "The Quest for Security in Mobile Ad Hoc Networks," Proceedings of the 2001 ACM International Symposium on Mobile ad hoc networking & computing, Long Beach, CA, USA, pp. 146-155, October 4-5 2001.
-
(2001)
Proceedings of the 2001 ACM International Symposium on Mobile Ad Hoc Networking & Computing
, pp. 146-155
-
-
Hubaux, J.-P.1
Buttyan, L.2
Capkun, S.3
-
7
-
-
0031630935
-
Evaluating certification authority security
-
S. Kent, "Evaluating Certification Authority Security," Proceedings 1998 IEEE Aerospace Conference, vol. 4, pp. 319-327, 1998.
-
(1998)
Proceedings 1998 IEEE Aerospace Conference
, vol.4
, pp. 319-327
-
-
Kent, S.1
-
10
-
-
0031627885
-
Public-key infrastructure interoperation
-
W. Ford, "Public-Key Infrastructure Interoperation," Proceedings 1998 IEEE Aerospace Conference, vol. 4, pp. 329-333, 1998.
-
(1998)
Proceedings 1998 IEEE Aerospace Conference
, vol.4
, pp. 329-333
-
-
Ford, W.1
-
11
-
-
0027617271
-
Increasing availability and security of an authentication service
-
June
-
L. Gong, "Increasing Availability and Security of an Authentication Service," IEEE Journal on Selected Areas in Communications, vol. 11, no. 5, June 1993.
-
(1993)
IEEE Journal on Selected Areas in Communications
, vol.11
, Issue.5
-
-
Gong, L.1
-
12
-
-
85084160265
-
Building intrusion tolerant applications
-
Washington, D.C., August 23-26
-
T. Wu, M. Malkin, and D. Boneh, "Building Intrusion Tolerant Applications," Eighth USENIX Security Symposium, pp. 79-92, Washington, D.C., August 23-26 1999.
-
(1999)
Eighth USENIX Security Symposium
, pp. 79-92
-
-
Wu, T.1
Malkin, M.2
Boneh, D.3
-
14
-
-
0035704362
-
Providing robust and ubiquitous security support for mobile Ad-Hoc networks
-
Riverside, California, USA, November 11-14
-
J. Kong, P. Zerfos, H. Luo, S. Lu, and L. Zhang, "Providing Robust and Ubiquitous Security Support for Mobile Ad-Hoc Networks," Proceedings of the 9th International Conference on Network Protocols (ICNP), Riverside, California, USA, pp. 251-260, November 11-14 2001.
-
(2001)
Proceedings of the 9th International Conference on Network Protocols (ICNP)
, pp. 251-260
-
-
Kong, J.1
Zerfos, P.2
Luo, H.3
Lu, S.4
Zhang, L.5
-
15
-
-
3142719292
-
Multicluster, mobile, multimedia radio network
-
M. Gerla and J. T. C. Tsai, "Multicluster, Mobile, Multimedia Radio Network," ACM-Baltzer Journal of Wireless Networks, vol. 1, no. 3, pp. 255-256, 1995.
-
(1995)
ACM-Baltzer Journal of Wireless Networks
, vol.1
, Issue.3
, pp. 255-256
-
-
Gerla, M.1
Tsai, J.T.C.2
-
16
-
-
0033366376
-
Distributed clustering for Ad Hoc networks
-
S. Basagni, "Distributed Clustering for Ad Hoc Networks," Proceedings of ISPAN'99 International Symposium On Parallel Architectures, Algorithms, and Networks, pp. 310-315, 1999.
-
(1999)
Proceedings of ISPAN'99 International Symposium on Parallel Architectures, Algorithms, and Networks
, pp. 310-315
-
-
Basagni, S.1
-
17
-
-
0033906585
-
Max-min D-cluster formation in wireless Ad Hoc network
-
March
-
A. D. Amis, R. Prakash, T. H. P. Vuong, and D. T. Huynh, "Max-min D-cluster Formation in Wireless Ad Hoc Network," Proceedings of IEEE INFOCOM, March 2000.
-
(2000)
Proceedings of IEEE INFOCOM
-
-
Amis, A.D.1
Prakash, R.2
Vuong, T.H.P.3
Huynh, D.T.4
-
19
-
-
11244300143
-
-
Chapter 1 of the document Introduction to Cryptography in the POP 6.5.1 documentation, Copyright ©1990-1999 Network Associates, Inc. and its Affiliated Companies
-
"How POP Works," Chapter 1 of the document Introduction to Cryptography in the POP 6.5.1 documentation, Copyright ©1990-1999 Network Associates, Inc. and its Affiliated Companies.
-
How POP Works
-
-
-
20
-
-
0002863367
-
Valuation of trust in open networks
-
Sprintger-Verlag, New York
-
T. Beth, B. Malte, and K. Birgit, "Valuation of Trust in Open Networks," Proceedings of the Conference on Computer Security, Sprintger-Verlag, New York, pp. 3-18, 1994.
-
(1994)
Proceedings of the Conference on Computer Security
, pp. 3-18
-
-
Beth, T.1
Malte, B.2
Birgit, K.3
-
22
-
-
5244354547
-
-
Prentice-Gall, Inc., Uppder Saddle River, NJ
-
W. Stallings, "Protect Your Privacy: A Guide for POP Users," Prentice-Gall, Inc., Uppder Saddle River, NJ, 1995.
-
(1995)
Protect Your Privacy: A Guide for POP Users
-
-
Stallings, W.1
-
23
-
-
0032290722
-
Resilient authentication using path independence
-
December
-
M. K. Reiter and S. G. Stubblebine, "Resilient Authentication using Path Independence," IEEE Transactions on Computers vol. 47, no. 12, pp. 1351-1362, December 1998.
-
(1998)
IEEE Transactions on Computers
, vol.47
, Issue.12
, pp. 1351-1362
-
-
Reiter, M.K.1
Stubblebine, S.G.2
-
25
-
-
0031652485
-
GloMoSim: A library for parallel simulation of large-scale wireless networks
-
Banff, Alberta, Canada, May 26-29
-
X. Zeng, R. Bagrodia, and M. Gerla, "GloMoSim: a Library for Parallel Simulation of Large-scale Wireless Networks," Proceedings of the 12th Workshop on Parallel and Distributed Simulations (PADS '98), Banff, Alberta, Canada, May 26-29 1998.
-
(1998)
Proceedings of the 12th Workshop on Parallel and Distributed Simulations (PADS '98)
-
-
Zeng, X.1
Bagrodia, R.2
Gerla, M.3
|