-
1
-
-
0003247337
-
Mobile ad hoc networking (MANET): Routing protocol performance issues and evaluation considerations
-
January
-
S. Corson and J. Macker, "Mobile Ad Hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations," RFC 2501, January 1999.
-
(1999)
RFC
, vol.2501
-
-
Corson, S.1
Macker, J.2
-
2
-
-
0242678584
-
Self-organized public-key management for mobile ad hoc networks
-
January/March
-
S. Capkun, L. Buttyan, and J. P. Hubaux, "Self-Organized Public-Key Management for Mobile Ad Hoc Networks," IEEE Transactions on Mobile Computing, vol. 2, no. 1, January/March 2003, pp. 52-64.
-
(2003)
IEEE Transactions on Mobile Computing
, vol.2
, Issue.1
, pp. 52-64
-
-
Capkun, S.1
Buttyan, L.2
Hubaux, J.P.3
-
4
-
-
0029222929
-
Routing in ad hoc networks of mobile hosts
-
Santa Cruz, CA, December
-
D. B. Johnson, "Routing in Ad Hoc Networks of Mobile Hosts," Proceeding of the IEEE Workshop on Mobile Computing Systems and Applications, Santa Cruz, CA, December 1994, pp. 158-163.
-
(1994)
Proceeding of the IEEE Workshop on Mobile Computing Systems and Applications
, pp. 158-163
-
-
Johnson, D.B.1
-
5
-
-
0000629443
-
Dynamic source routing in ad-hoc wireless networks
-
Kluwer Academic Publishers, chapters
-
D. B. Johnson and D. A. Maltz, "Dynamic Source Routing in Ad-Hoc Wireless Networks," Mobile Computing, Kluwer Academic Publishers, chapters, 1996, pp. 153-181.
-
(1996)
Mobile Computing
, pp. 153-181
-
-
Johnson, D.B.1
Maltz, D.A.2
-
6
-
-
0035704362
-
Providing robust and ubiquitous security support for mobile ad hoc networks
-
Riverside, CA, November
-
th International Conference on Networks Protocols (ICNP), Riverside, CA, November 2001, pp. 251-260.
-
(2001)
th International Conference on Networks Protocols (ICNP)
, pp. 251-260
-
-
Kong, J.1
Zerfos, P.2
Luo, H.3
Lu, S.4
Zhang, L.5
-
7
-
-
0035751908
-
Distributed credential chain discovery in trust management (extended abstract)
-
Philadephia, Pennsylvanis, Nov. ACM Press
-
th ACM Conference on Computer and Communications Security (CCS-8), Philadephia, Pennsylvanis, Nov. 2001, ACM Press, pp. 156-165.
-
(2001)
th ACM Conference on Computer and Communications Security (CCS-8)
, pp. 156-165
-
-
Li, N.1
Winsborough, W.2
Mitchell, J.3
-
8
-
-
18144364041
-
-
CRC Press, Chapter 13
-
A. Memezes, P. van Oorschot and S. Vanstone, Handbook of Applied Cryptography (Fifth printing), CRC Press, Chapter 13, 2001, pp. 543-590.
-
(2001)
Handbook of Applied Cryptography (Fifth Printing)
, pp. 543-590
-
-
Memezes, A.1
Van Oorschot, P.2
Vanstone, S.3
-
9
-
-
85031307530
-
Highly dynamic Distance-Sequenced Distance-Vector routing (DSDV) for mobile computers
-
October
-
C. Perkins and P. Bhagwat, "Highly Dynamic Distance-Sequenced Distance-Vector Routing (DSDV) for Mobile Computers," ACM SIGCOMM'94: Computer Communications Review, vol. 24, no. 4, October 1994, pp. 234-244.
-
(1994)
ACM SIGCOMM'94: Computer Communications Review
, vol.24
, Issue.4
, pp. 234-244
-
-
Perkins, C.1
Bhagwat, P.2
-
11
-
-
0033357103
-
Securing ad hoc networks
-
November/December
-
L. Zhou and Z. J. Hass, "Securing Ad Hoc Networks," IEEE Network, vol. 13, no. 6, November/December 1999, pp. 24-30.
-
(1999)
IEEE Network
, vol.13
, Issue.6
, pp. 24-30
-
-
Zhou, L.1
Hass, Z.J.2
|