-
1
-
-
0033357103
-
Securing ad hoc networks
-
Nov./Dec.
-
L. Zhou and Z. J. Haas, "Securing Ad Hoc Networks," IEEE Network., vol. 13, pp. 24-30, Nov./Dec. 1999.
-
(1999)
IEEE Network.
, vol.13
, pp. 24-30
-
-
Zhou, L.1
Haas, Z.J.2
-
3
-
-
17144386087
-
Security considerations in ad hoc networks
-
to be appeared
-
F. Hu and N. K. Sharma, "Security Considerations in Ad Hoc Networks," to be appeared in Ad Hon Network, 2004.
-
(2004)
Ad Hon Network
-
-
Hu, F.1
Sharma, N.K.2
-
4
-
-
12444324513
-
Providing secrecy in key management protocols for large wireless sensors networks
-
R.D. Pietro, L.V. Mancini, and S. Jajodia, "Providing Secrecy in Key Management Protocols for Large Wireless Sensors Networks," Ad Hoc Networks, Vol. 1, 2003, pp. 455-468.
-
(2003)
Ad Hoc Networks
, vol.1
, pp. 455-468
-
-
Pietro, R.D.1
Mancini, L.V.2
Jajodia, S.3
-
6
-
-
85031307530
-
Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers
-
C. E. Perkins, and P. Bhagwat, "Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers, " Proc. of SIGCOMM, pp. 234-244, 1994.
-
(1994)
Proc. of SIGCOMM
, pp. 234-244
-
-
Perkins, C.E.1
Bhagwat, P.2
-
7
-
-
1542356467
-
Ad Hoc On-Demand Distance Vector (AODV) routing
-
IETF Mobile Ad Hoc Networks Working Group, work in progress, 17 Feb.
-
C. E. Perkins, E. M. Royer, and S. R. Das, "Ad Hoc On-Demand Distance Vector (AODV) Routing," IETF Mobile Ad Hoc Networks Working Group, Internet Draft, work in progress, 17 Feb. 2003.
-
(2003)
Internet Draft
-
-
Perkins, C.E.1
Royer, E.M.2
Das, S.R.3
-
8
-
-
1542356511
-
The dynamic source routing protocol for Mobile Ad Hoc Networks (DSR)
-
IETF Mobile Ad Hoc Networks Working Group, work in progress, 15 Apr.
-
D. B. Johnson, D. A. Maltz, and Y-C. Hu, "The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks (DSR)," IETF Mobile Ad Hoc Networks Working Group, Internet Draft, work in progress, 15 Apr. 2003.
-
(2003)
Internet Draft
-
-
Johnson, D.B.1
Maltz, D.A.2
Hu, Y.-C.3
-
11
-
-
0018545449
-
How to share a secret
-
A Shamir, "How to Share a Secret," Comm. ACM, Vol. 22, No. 11, 1979, pp. 612-613.
-
(1979)
Comm. ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
12
-
-
0020721991
-
A modular approach to key safeguarding
-
C. Asmuth and J. Bloom, "A Modular Approach to Key Safeguarding," IEEE Trans. Information Theory, vol. IT-29, no. 2, 1983, pp. 208-210.
-
(1983)
IEEE Trans. Information Theory
, vol.IT-29
, Issue.2
, pp. 208-210
-
-
Asmuth, C.1
Bloom, J.2
-
13
-
-
17144385354
-
On sharing secret systems
-
E.D. Kamin, J.W. Greens, and M.E. Hellman, "On Sharing Secret Systems," IEEE Tran. Information Theory, vol. IT-29, 1983, pp. 35-41.
-
(1983)
IEEE Tran. Information Theory
, vol.IT-29
, pp. 35-41
-
-
Kamin, E.D.1
Greens, J.W.2
Hellman, M.E.3
-
14
-
-
0003038453
-
An introduction to shared secret and/or shared control schemes and their application
-
G. Simmons, Editor, IEEE Press
-
G.J. Simmons, An Introduction to Shared Secret and/or Shared Control Schemes and Their Application, in G. Simmons, Editor, Contemporary Cryptology: The Science of Information Integrity, IEEE Press, 1992.
-
(1992)
Contemporary Cryptology: The Science of Information Integrity
-
-
Simmons, G.J.1
|