-
1
-
-
84943807207
-
Toward secure key distribution in truly ad-hoc networs
-
A. Khalili, J. Katz, and W.A. Arbaugh, "Toward secure key distribution in truly ad-hoc networs," SAINT-w'03, 2003.
-
(2003)
SAINT-w'03
-
-
Khalili, A.1
Katz, J.2
Arbaugh, W.A.3
-
2
-
-
0004118143
-
ARAM: A secure routing protocol for ad hoc networks
-
B. Dahill, B.N. Levine, E. Royer, and C. Shields, "ARAM: A secure routing protocol for ad hoc networks," UMass Tech Report 02-21, 2002.
-
(2002)
UMass Tech Report
, vol.2
, Issue.21
-
-
Dahill, B.1
Levine, B.N.2
Royer, E.3
Shields, C.4
-
4
-
-
0027629456
-
Development of WaveLAN, and ISM band wireless LAN
-
July/Aug.
-
B. Tuch, "Development of WaveLAN, and ISM band wireless LAN," AT&T Tech. J., vol.72, no.4, pp.27-33, July/Aug. 1993.
-
(1993)
AT&T Tech. J.
, vol.72
, Issue.4
, pp. 27-33
-
-
Tuch, B.1
-
5
-
-
0003855464
-
-
Essential reference for cryptographic engineers by the foremost pundit in the field, Wiley
-
B. Schneier, Applied Cryptography, Second edition, Essential reference for cryptographic engineers by the foremost pundit in the field, Wiley, 1996.
-
(1996)
Applied Cryptography, Second Edition
-
-
Schneier, B.1
-
7
-
-
84874324906
-
Identity based encryption from the Weil pairing
-
Advances in Cryptology-Crypto'01, Springer
-
D. Boneh and M. Franklin, "Identity based encryption from the Weil pairing," Advances in Cryptology-Crypto'01, LNCS 2193, Springer, 2001.
-
(2001)
LNCS
, vol.2193
-
-
Boneh, D.1
Franklin, M.2
-
8
-
-
85106319926
-
A performance comparison of multihop wireless ad hoc network routing protocols
-
Oct.
-
J. Broch, D.A. Maltz, D.B. Johnson, Y.-C. Hu, and J. Jetcheva, "A performance comparison of multihop wireless ad hoc network routing protocols," Proc. IEEE/ACM MOBICOM'98, pp.85-97, Oct. 1998.
-
(1998)
Proc. IEEE/ACM MOBICOM'98
, pp. 85-97
-
-
Broch, J.1
Maltz, D.A.2
Johnson, D.B.3
Hu, Y.-C.4
Jetcheva, J.5
-
9
-
-
0012994607
-
Performance of elliptic curve cryptosystems
-
J. Lopez and R. Dahab, "Performance of elliptic curve cryptosystems," Technical Report IC-00-08, 2000., http://www.dcc.unicamp. br/ic-main/publications-e.html
-
(2000)
Technical Report
, vol.IC-00-08
-
-
Lopez, J.1
Dahab, R.2
-
11
-
-
0033357103
-
Securing ad hoc networks
-
Nov.
-
L. Zhou and Z.J. Hass, "Securing ad hoc networks," IEEE Network Magazine, vol.13, no.6, pp.24-30, Nov. 1999.
-
(1999)
IEEE Network Magazine
, vol.13
, Issue.6
, pp. 24-30
-
-
Zhou, L.1
Hass, Z.J.2
-
12
-
-
0037842963
-
Strategies for enhancing routing security in protocols for mobile ad hoc networks
-
Feb.
-
L. Venkatraman and D.P. Agrawal, "Strategies for enhancing routing security in protocols for mobile ad hoc networks," J. Parallel Distrib. Comput., vol.63, no.2, pp.214-227, Feb. 2003.
-
(2003)
J. Parallel Distrib. Comput.
, vol.63
, Issue.2
, pp. 214-227
-
-
Venkatraman, L.1
Agrawal, D.P.2
-
13
-
-
0004215976
-
A logic of authentication, digital system research center
-
Feb.
-
M. Burrows, M. Abadi, and R. Needham, A Logic of Authentication, Digital System Research Center, Technical Report 39, Feb. 1990.
-
(1990)
Technical Report
, vol.39
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
15
-
-
0013138682
-
Secure routing for mobile ad hoc networks
-
San Antonio, TX, Jan.
-
P. Papadimitratos and Z. Haas, "Secure routing for mobile ad hoc networks," Proc. CNDS 2002, San Antonio, TX, Jan. 2002.
-
(2002)
Proc. CNDS 2002
-
-
Papadimitratos, P.1
Haas, Z.2
-
16
-
-
0033892676
-
Performance comparison of two on-demand routing protocols for ad hoc networks
-
S.R. Das, C.E. Perkins, and E.M. Royer, "Performance comparison of two on-demand routing protocols for ad hoc networks," INFOCOM'2000, 2000.
-
(2000)
INFOCOM'2000
-
-
Das, S.R.1
Perkins, C.E.2
Royer, E.M.3
-
17
-
-
0036957315
-
Ariadne: A secure ondemand routing protocol for ad hoc networks
-
Y.C. Hu, A. Perrig, and D.B. Johnson, "Ariadne: A secure ondemand routing protocol for ad hoc networks," Proc. MOBICOM 2002, 2002.
-
(2002)
Proc. MOBICOM 2002
-
-
Hu, Y.C.1
Perrig, A.2
Johnson, D.B.3
-
18
-
-
63449122349
-
Digital signcryption or how to achieve cost (signature & encryption) ≪ cost (signature) + cost (encryption)
-
Advances in Cryptology-Crypto'97, , Springer
-
Y. Zheng, "Digital signcryption or how to achieve cost (signature & encryption) ≪ cost (signature) + cost (encryption)," Advances in Cryptology-Crypto'97, LNCS 1294, pp. 165-179, Springer, 1997.
-
(1997)
LNCS
, vol.1294
, pp. 165-179
-
-
Zheng, Y.1
|