-
2
-
-
0000629443
-
Dynamic Source Routing in Ad Hoc Wireless Networks
-
edited by Tomasz Imielinski and Hank Korth, chapter 5, Kluwer Academic Publishers
-
David B.Johnson and David A. Maltz, "Dynamic Source Routing in Ad Hoc Wireless Networks", In Mobile Computing, edited by Tomasz Imielinski and Hank Korth, chapter 5, pp153-181, Kluwer Academic Publishers, 1996.
-
(1996)
Mobile Computing
, pp. 153-181
-
-
Johnson, D.B.1
Maltz, D.A.2
-
3
-
-
0033357103
-
Securing Ad Hoc Networks
-
11
-
Lidong Zhou and Zygmunt J. Haas. Securing Ad Hoc Networks. IEEE Network Magazine, 13(6):24-30, 1999.11.
-
(1999)
IEEE Network Magazine
, vol.13
, Issue.6
, pp. 24-30
-
-
Zhou, L.1
Haas, Z.J.2
-
4
-
-
15844404847
-
Secure Ad hoc On-Demand Distance Vector (SAODV) Routing
-
Message-ID:3BC17B40.BBF52E09@nokia.com
-
Manel Guerrero Zapata. Secure Ad hoc On-Demand Distance Vector (SAODV) Routing. IETF MANET Mailing List, Message-ID:3BC17B40.BBF52E09@nokia.com
-
IETF MANET Mailing List
-
-
Zapata, M.G.1
-
8
-
-
0036957315
-
Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks
-
Sep.
-
Yih-Chun Hu, Adrian Perrig and David B.Johnson. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks, MobiCom'02, Sep. 2002
-
(2002)
MobiCom'02
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
9
-
-
0004118143
-
A Secure Routing Protocol for Ad Hoc Networks
-
EECS. University of Michigan
-
Bridget Dahill, Brian Neil Levine, Elizabeth Royer, and Clay Shields, "A Secure Routing Protocol for Ad Hoc Networks.", Technical Report UM-CS-2001-037, EECS. University of Michigan, 2001.
-
(2001)
Technical Report
, vol.UM-CS-2001-037
-
-
Dahill, B.1
Levine, B.N.2
Royer, E.3
Shields, C.4
-
11
-
-
15744368857
-
Efficient and Secure Source Authentication for Multicast
-
2
-
Adrian Perrig, Ran Canetti, J.D.Tygar, and Dawn Song, "Efficient and Secure Source Authentication for Multicast", In Network and Distributed System Security Symposium, NDSS'01, pp35-46, 2001.2
-
(2001)
Network and Distributed System Security Symposium, NDSS'01
, pp. 35-46
-
-
Perrig, A.1
Canetti, R.2
Tygar, J.D.3
Song, D.4
-
12
-
-
0033690336
-
Efficient Authentication and Signing of Multicast Streams over Lossy Channels
-
5
-
Adrian Perrig, Ran Canetti, J.D.Tygar and Dawn Song, "Efficient Authentication and Signing of Multicast Streams over Lossy Channels", In IEEE Symposium on Security and Privacy, pp 56-73, 2000.5
-
(2000)
IEEE Symposium on Security and Privacy
, pp. 56-73
-
-
Perrig, A.1
Canetti, R.2
Tygar, J.D.3
Song, D.4
-
13
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
A. Shamir, "Identity-based cryptosystems and signature schemes", Proc. Crypto'84 pp47-53
-
Proc. Crypto'84
, pp. 47-53
-
-
Shamir, A.1
-
14
-
-
1642475378
-
ID-Based Encryption from the Weil-Pairing
-
12
-
Dan Boneh, Matthew Franklin, "ID-Based Encryption from the Weil-Pairing", Proc. Asiacrypt'02, 2002.12
-
(2002)
Proc. Asiacrypt'02
-
-
Boneh, D.1
Franklin, M.2
-
15
-
-
1642516007
-
ID-based Signatures from Pairings on Elliptic Curves
-
04
-
K.Peterson, "ID-based Signatures from Pairings on Elliptic Curves", Cryptology-eprint-archive", 2002-04
-
(2002)
Cryptology-eprint-archive
-
-
Peterson, K.1
|