-
2
-
-
84925368904
-
802.11 Denial-of-service attacks: Real vulnerabilities and practical solutions
-
August
-
John Bellardo and Stefan Savage. 802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions. In Proceedings of the USENIX Security Symposium, pages 15-27, August 2003.
-
(2003)
Proceedings of the USENIX Security Symposium
, pp. 15-27
-
-
Bellardo, J.1
Savage, S.2
-
4
-
-
0003209840
-
Integrated services in the internet architecture: An overview
-
June
-
Bob Braden, David Clark, and Scott Shenker. Integrated Services in the Internet Architecture: an Overview. RFC 1633, June 1994.
-
(1994)
RFC
, vol.1633
-
-
Braden, B.1
Clark, D.2
Shenker, S.3
-
5
-
-
0003597247
-
The dynamic source routing protocol for mobile ad hoc networks
-
draft-ietf-manet-dsr-03. txt, October Work in progress
-
Josh Broch, David B. Johnson, and David A. Maltz. The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks. Internet-Draft, draft-ietf-manet-dsr-03. txt, October 1999. Work in progress. Available from http://www.monarch.cs.rice.edu/internet-drafts/ draft-ietf-manet-dsr-03.txt.
-
(1999)
Internet-draft
-
-
Broch, J.1
Johnson, D.B.2
Maltz, D.A.3
-
6
-
-
85106319926
-
A performance comparison of multi-hop wireless ad hoc network routing protocols
-
October
-
Josh Broch, David A. Maltz, David B. Johnson, Yih-Chun Hu, and Jorjeta Jetcheva. A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. In Proceedings of the Fourth Annual International Conference on Mobile Computing and Networking (MobiCom 1998), pages 85-97, October 1998.
-
(1998)
Proceedings of the Fourth Annual International Conference on Mobile Computing and Networking (MobiCom 1998)
, pp. 85-97
-
-
Broch, J.1
Maltz, D.A.2
Johnson, D.B.3
Hu, Y.-C.4
Jetcheva, J.5
-
8
-
-
0032642289
-
Distributed quality-of-service routing in ad hoc networks
-
August
-
Shigang Chen and K. Nahrstedt. Distributed Quality-of-Service Routing in Ad Hoc Networks. IEEE Journal on Selected Areas in Communications, 17(8):1488-1505, August 1999.
-
(1999)
IEEE Journal on Selected Areas in Communications
, vol.17
, Issue.8
, pp. 1488-1505
-
-
Chen, S.1
Nahrstedt, K.2
-
10
-
-
1542359009
-
A high-throughput path metric for multi-hop wireless routing
-
September
-
Douglas S. J. De Couto, Daniel Aguayo, John Bicket, and Robert Morris. A High-Throughput Path Metric for Multi-Hop Wireless Routing. In Proceedings of the Ninth Annual International Conference on Mobile Computing and Networking (MobiCom 2003), pages 134-146, September 2003.
-
(2003)
Proceedings of the Ninth Annual International Conference on Mobile Computing and Networking (MobiCom 2003)
, pp. 134-146
-
-
De Couto, D.S.J.1
Aguayo, D.2
Bicket, J.3
Morris, R.4
-
12
-
-
85028913061
-
Online/off-line digital signatures
-
edited by Gilles Brassard. Springer-Verlag. Lecture Notes in Computer Science Volume 435
-
Shimon Even, Oded Goldreich, and Silvio Micali. Online/off-line digital signatures. In Advances in Cryptology - CRYPTO '89, edited by Gilles Brassard, pages 263-277. Springer-Verlag, 1989. Lecture Notes in Computer Science Volume 435.
-
(1989)
Advances in Cryptology - CRYPTO '89
, pp. 263-277
-
-
Even, S.1
Goldreich, O.2
Micali, S.3
-
19
-
-
84944414022
-
Scenario-based performance analysis of routing protocols for mobile ad-hoc networks
-
August
-
Per Johansson, Tony Larsson, Nicklas Hedman, Bartosz Mielczarek, and Mikael Degermark. Scenario-based Performance Analysis of Routing Protocols for Mobile Ad-hoc Networks. In Proceedings of the Fifth Annual International Conference on Mobile Computing and Networking (MobiCom 1999), pages 195-206, August 1999.
-
(1999)
Proceedings of the Fifth Annual International Conference on Mobile Computing and Networking (MobiCom 1999)
, pp. 195-206
-
-
Johansson, P.1
Larsson, T.2
Hedman, N.3
Mielczarek, B.4
Degermark, M.5
-
21
-
-
0000629443
-
Dynamic source routing in ad hoc wireless networks
-
edited by Tomasz Imielinski and Hank Korth, chapter 5. Kluwer Academic Publishers
-
David B. Johnson and David A. Maltz. Dynamic Source Routing in Ad Hoc Wireless Networks. In Mobile Computing, edited by Tomasz Imielinski and Hank Korth, chapter 5, pages 153-181. Kluwer Academic Publishers, 1996.
-
(1996)
Mobile Computing
, pp. 153-181
-
-
Johnson, D.B.1
Maltz, D.A.2
-
22
-
-
0003597247
-
The dynamic source routing protocol for mobile ad hoc networks
-
draft-ietf-manet-dsr-09. txt, April. Work in progress
-
David B. Johnson, David A. Maltz, and Yih-Chun Hu. The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks. Internet-Draft, draft-ietf-manet-dsr-09. txt, April 2003. Work in progress.
-
(2003)
Internet-draft
-
-
Johnson, D.B.1
Maltz, D.A.2
Hu, Y.-C.3
-
23
-
-
0019634370
-
Password authentication with insecure communication
-
November
-
Leslie Lamport. Password authentication with insecure communication. Communications of the ACM, 24(11):770-772, November 1981.
-
(1981)
Communications of the ACM
, vol.24
, Issue.11
, pp. 770-772
-
-
Lamport, L.1
-
25
-
-
0012235865
-
Resource management in multi-hop ad hoc networks
-
School of Computer Science, Carnegie Mellon University
-
David A. Maltz. Resource Management in Multi-hop Ad Hoc Networks. Technical Report CMU-CS-00-150, School of Computer Science, Carnegie Mellon University, 1999.
-
(1999)
Technical Report
, vol.CMU-CS-00-150
-
-
Maltz, D.A.1
-
26
-
-
0022029028
-
Generating strong one-way functions with cryptographic algorithm
-
Stephen Matyas, Carl Meyer, and Jonathan Oseas. Generating Strong One-Way Functions with Cryptographic Algorithm. IBM Technical Disclosure Bulletin, 27:5658-5659, 1985.
-
(1985)
IBM Technical Disclosure Bulletin
, vol.27
, pp. 5658-5659
-
-
Matyas, S.1
Meyer, C.2
Oseas, J.3
-
27
-
-
84958802026
-
A digital signature based on a conventional encryption function
-
edited by Carl Pomerance, Berlin. Springer-Verlag. Lecture Notes in Computer Science Volume 293
-
Ralph C. Merkle. A digital signature based on a conventional encryption function. In Advances in Cryptology - CRYPTO '87, edited by Carl Pomerance, pages 369-378, Berlin, 1987. Springer-Verlag. Lecture Notes in Computer Science Volume 293.
-
(1987)
Advances in Cryptology - CRYPTO '87
, pp. 369-378
-
-
Merkle, R.C.1
-
28
-
-
84969346266
-
A certified digital signature
-
edited by Gilles Brassard, Berlin. Springer-Verlag. Lecture Notes in Computer Science Volume 435
-
Ralph C. Merkle. A certified digital signature. In Advances in Cryptology - CRYPTO '89, edited by Gilles Brassard, pages 218-238, Berlin, 1989. Springer-Verlag. Lecture Notes in Computer Science Volume 435.
-
(1989)
Advances in Cryptology - CRYPTO '89
, pp. 218-238
-
-
Merkle, R.C.1
-
30
-
-
0003256793
-
Definition of the Differentiated Services Field (DS Field) in the IPv4 and IPv6 headers
-
December
-
Kathleen Nichols, Steven Blake, Fred Baker, and David L. Black. Definition of the Differentiated Services Field (DS Field) in the IPv4 and IPv6 Headers. RFC 2474, December 1998.
-
(1998)
RFC
, vol.2474
-
-
Nichols, K.1
Blake, S.2
Baker, F.3
Black, D.L.4
-
32
-
-
0003284957
-
Quality of service for ad hoc on-demand distance vector routing
-
draft- ietf-manet- aodvqos- 00. txt, July. Work in progress
-
Charles E. Perkins, Elizabeth M. Royer, and Samir R. Das. Quality of Service for Ad hoc On-Demand Distance Vector Routing. Internet-Draft, draft- ietf-manet- aodvqos- 00. txt, July 2000. Work in progress.
-
(2000)
Internet-draft
-
-
Perkins, C.E.1
Royer, E.M.2
Das, S.R.3
-
33
-
-
0003491910
-
Multipoint relaying: An efficient technique for flooding in mobile wireless networks
-
INRIA, February
-
Amir Qayyum, Laurent Viennot, and Anis Laouiti. Multipoint Relaying: An Efficient Technique for flooding in Mobile Wireless Networks. Technical Report Research Report RR-3898, INRIA, February 2000.
-
(2000)
Technical Report Research Report
, vol.RR-3898
-
-
Qayyum, A.1
Viennot, L.2
Laouiti, A.3
-
34
-
-
15844391060
-
Better than biba: Short one-time signatures with fast signing and verifying
-
edited by Jennifer Seberry, number 2384 in Lecture Notes in Computer Science. Springer-Verlag, July
-
Leonid Reyzin and Natan Reyzin. Better than Biba: Short One-Time Signatures with Fast Signing and Verifying. In Information Security and Privacy -7th Australasian Conference (ACSIP 2002), edited by Jennifer Seberry, number 2384 in Lecture Notes in Computer Science. Springer-Verlag, July 2002.
-
(2002)
Information Security and Privacy -7th Australasian Conference (ACSIP 2002)
-
-
Reyzin, L.1
Reyzin, N.2
-
36
-
-
84904904836
-
A secure routing protocol for ad hoc networks
-
November
-
Kimaya Sanzgiri, Bridget Dahill, Brian Neil Levine, Elizabeth Royer, and Clay Shields. A Secure Routing Protocol for Ad hoc Networks. In Proceedings of the 10th IEEE International Conference on Network Protocols (ICNP '02), November 2002.
-
(2002)
Proceedings of the 10th IEEE International Conference on Network Protocols (ICNP '02)
-
-
Sanzgiri, K.1
Dahill, B.2
Levine, B.N.3
Royer, E.4
Shields, C.5
-
37
-
-
0001982732
-
A survey of active network research
-
January
-
David L. Tennenhouse, Jonathan M. Smith, W. David Sincoskie, David J. Wetherall, and Gary J. Minden. A Survey of Active Network Research. IEEE Communications Magazine, 35(1):80-86, January 1997.
-
(1997)
IEEE Communications Magazine
, vol.35
, Issue.1
, pp. 80-86
-
-
Tennenhouse, D.L.1
Smith, J.M.2
Sincoskie, W.D.3
Wetherall, D.J.4
Minden, G.J.5
-
38
-
-
0033725272
-
A flexible quality of service model for mobile ad-hoc networks
-
May
-
Hannan Xiao, W.K.G. Seah, A. Lo, and K.C. Chua. A Flexible Quality of Service Model for Mobile Ad-Hoc Networks. In Proceedings of the IEEE 51st Vehicular Technology Conference (VTC Spring 2000), volume 1, pages 445-449, May 2000.
-
(2000)
Proceedings of the IEEE 51st Vehicular Technology Conference (VTC Spring 2000)
, vol.1
, pp. 445-449
-
-
Xiao, H.1
Seah, W.K.G.2
Lo, A.3
Chua, K.C.4
|