-
2
-
-
0013402235
-
Secure implementation of identification systems
-
S. Bengio, G. Brassard, Y. Desmedt, C. Goutier, and J.-J. Quisquater. Secure implementation of identification systems. Journal of Cryptology, 4(3):175-184, 1991.
-
(1991)
Journal of Cryptology
, vol.4
, Issue.3
, pp. 175-184
-
-
Bengio, S.1
Brassard, G.2
Desmedt, Y.3
Goutier, C.4
Quisquater, J.-J.5
-
3
-
-
84956862121
-
Secure communication in an unknown network using certificates
-
LNCS. Springer
-
M. Burmester and Y. Desmedt. Secure communication in an unknown network using certificates. In Advances in Cryptology-Asiacrypt '99, LNCS Vol. 1716, pages 274-287. Springer, 1999.
-
(1999)
Advances in Cryptology-Asiacrypt '99
, vol.1716
, pp. 274-287
-
-
Burmester, M.1
Desmedt, Y.2
-
8
-
-
0003119120
-
The performance of query control schemes for zone routing protocol
-
Z. Haas and M. Perlman. The performance of query control schemes for zone routing protocol. In Proceedings of SIGCOMM'98, 1998.
-
(1998)
Proceedings of SIGCOMM'98
-
-
Haas, Z.1
Perlman, M.2
-
9
-
-
1542317831
-
Rushing attacks and defense in wireless ad hoc routing protocols
-
Y.-C. Hu, A. Perrig, and D. Johnson. Rushing attacks and defense in wireless ad hoc routing protocols. In Proceedings of WiSe 2003, pages 30-40, 2003.
-
(2003)
Proceedings of WiSe 2003
, pp. 30-40
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.3
-
10
-
-
0012615650
-
The quest for security in mobile ad hoc networks
-
BA, Massachusetts, Aug
-
J. Hubaux, L. Buttyan, and S. Capkun. The quest for security in mobile ad hoc networks. In Proceedings of the 2nd MobiHoc Conference, BA, Massachusetts, Aug. 2001.
-
(2001)
Proceedings of the 2nd MobiHoc Conference
-
-
Hubaux, J.1
Buttyan, L.2
Capkun, S.3
-
11
-
-
0000629443
-
Dynamic source routing in ad-hoc wireless networks
-
Kluwer Academic Publishers
-
D. Johnson and D. Maltz. Dynamic source routing in ad-hoc wireless networks. In Mobile Computing, pages 152-181. Kluwer Academic Publishers, 1996.
-
(1996)
Mobile Computing
, pp. 152-181
-
-
Johnson, D.1
Maltz, D.2
-
12
-
-
0000112683
-
Elliptic curve cryptosystems
-
N. Koblitz. Elliptic curve cryptosystems. Mathematics of Computation, 48:203-209, 1997.
-
(1997)
Mathematics of Computation
, vol.48
, pp. 203-209
-
-
Koblitz, N.1
-
13
-
-
0034844688
-
Split multipath routing with maximally disjoint paths in ad hoc networks
-
Helsinki, Finland, June. IEEE
-
S.-J. Lee and M. Gerla. Split multipath routing with maximally disjoint paths in ad hoc networks. In Proceedings of ICC 2001, pages 3201-3205, Helsinki, Finland, June 2001. IEEE.
-
(2001)
Proceedings of ICC 2001
, pp. 3201-3205
-
-
Lee, S.-J.1
Gerla, M.2
-
15
-
-
84954458719
-
Identifying flaws in the secure routing protocol
-
Apr
-
J. Marshall, V. Thakur, and A. Yasinsac. Identifying flaws in the secure routing protocol. In Proceedings of the 22nd International Performance, Computing, and Communications Conference, pages 167-174, Apr. 2003.
-
(2003)
Proceedings of the 22nd International Performance, Computing, and Communications Conference
, pp. 167-174
-
-
Marshall, J.1
Thakur, V.2
Yasinsac, A.3
-
16
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
BA, Massachusetts, Aug. ACM
-
S. Marti, T. Giuli, K. Lai, and M. Baker. Mitigating routing misbehavior in mobile ad hoc networks. In Proceedings of the 6th MobiCom Conference, BA, Massachusetts, Aug. 2000. ACM.
-
(2000)
Proceedings of the 6th MobiCom Conference
-
-
Marti, S.1
Giuli, T.2
Lai, K.3
Baker, M.4
-
17
-
-
84944881532
-
On-demand multipath routing for mobile ad hoc networks
-
A. Nasipuri and S. Das. On-demand multipath routing for mobile ad hoc networks. In Proceedings of IEEE INFOCOM99, pages 64-70, 1999.
-
(1999)
Proceedings of IEEE INFOCOM99
, pp. 64-70
-
-
Nasipuri, A.1
Das, S.2
-
18
-
-
84890048774
-
Secure message transmission in mobile ad hoc networks
-
P. Papadimitratos and Z. Haas. Secure message transmission in mobile ad hoc networks. Elsevier Ad Hoc Networks, pages 199-209.
-
Elsevier Ad Hoc Networks
, pp. 199-209
-
-
Papadimitratos, P.1
Haas, Z.2
-
21
-
-
25144504623
-
Multipath power sensitive routing protocol for mobile ad hoc networks
-
Springer
-
A. P. Subramanian, A. J. Anto, J. Vasudevan, and P. Narayanasamy. Multipath power sensitive routing protocol for mobile ad hoc networks. LNCS Vol.2928, pages 171-183. Springer, 2003.
-
(2003)
LNCS
, vol.2928
, pp. 171-183
-
-
Subramanian, A.P.1
Anto, A.J.2
Vasudevan, J.3
Narayanasamy, P.4
-
22
-
-
0038365376
-
An extended dynamic source routing scheme in ad hoc wireless networks
-
J. Wu. An extended dynamic source routing scheme in ad hoc wireless networks. Telecommunication Systems, 22(1-4):61-75, 2003.
-
(2003)
Telecommunication Systems
, vol.22
, Issue.1-4
, pp. 61-75
-
-
Wu, J.1
-
23
-
-
0036980295
-
Self-organized network-layer security in mobile ad hoc networks
-
Atlanta, GA, USA, Sept. ACM
-
H. Yang, X. Meng, and S. Lu. Self-organized network-layer security in mobile ad hoc networks. In Proceedings of the ACM workshop on Wireless security, pages 11-20, Atlanta, GA, USA, Sept. 2002. ACM.
-
(2002)
Proceedings of the ACM Workshop on Wireless Security
, pp. 11-20
-
-
Yang, H.1
Meng, X.2
Lu, S.3
-
26
-
-
0033357103
-
Securing ad hoc networks
-
Nov
-
L. Zhou and Z. Haas. Securing ad hoc networks. IEEE Network, 13(6):24-30, Nov. 1999.
-
(1999)
IEEE Network
, vol.13
, Issue.6
, pp. 24-30
-
-
Zhou, L.1
Haas, Z.2
|