-
1
-
-
0242527340
-
A charging and rewarding scheme for packet forwarding in multi-hop cellular networks
-
June 2003, MD, USA
-
Ben Salem N, Buttyan L, Hubaux J-P, Jakobsson M. A charging and rewarding scheme for packet forwarding in multi-hop cellular networks, ACM/SIGMOBILE 4th International Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC), June 2003, MD, USA, 2003.
-
(2003)
ACM/SIGMOBILE 4th International Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC)
-
-
Ben Salem, N.1
Buttyan, L.2
Hubaux, J.-P.3
Jakobsson, M.4
-
2
-
-
0242696192
-
Performance analysis of the CONFIDANT protocol (cooperation of nodes: Fairness in dynamic ad-hoc networks)
-
June 2002, Lausanne, Switzerland
-
Buchegger S, Le Boudec J-Y. Performance analysis of the CONFIDANT protocol (Cooperation of Nodes: Fairness In Dynamic Ad-hoc Networks), ACM/SIGMOBILE Third International Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC), June 2002, Lausanne, Switzerland, 2002.
-
(2002)
ACM/SIGMOBILE Third International Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC)
-
-
Buchegger, S.1
Le Boudec, J.-Y.2
-
3
-
-
84957083549
-
Adaptive security for threshold cryptosystems
-
LNCS 1666, Springer-Verlag
-
Canetti R, Gennaro R, Jarecki S, Krawczyk H, Rabin T. Adaptive security for threshold cryptosystems. Advances in Cryptology - Crypto'99, LNCS 1666, Springer-Verlag, 1999, pp. 98-115.
-
(1999)
Advances in Cryptology - Crypto'99
, pp. 98-115
-
-
Canetti, R.1
Gennaro, R.2
Jarecki, S.3
Krawczyk, H.4
Rabin, T.5
-
4
-
-
0032661699
-
Multicast security: A taxonomie and some efficient constructions
-
New York, USA, March
-
Canetti R, Garay J, Itkis G, Miccianicio D, Naor M, Pinkas B. Multicast security: a taxonomie and some efficient constructions. In Proceedings of IEEE INFOCOM '99, New York, USA, March 1999.
-
(1999)
Proceedings of IEEE INFOCOM '99
-
-
Canetti, R.1
Garay, J.2
Itkis, G.3
Miccianicio, D.4
Naor, M.5
Pinkas, B.6
-
6
-
-
84888912224
-
-
secg - standards for efficient cryptography group
-
Certicom Webside http://www.secg.org/, secg - standards for efficient cryptography group.
-
Certicom Webside
-
-
-
9
-
-
0242510134
-
Voice over Internet Protocol (VoIP)
-
Goode B. Voice over Internet Protocol (VoIP). In Proceedings of the IEEE 2002; 90:1495-1517.
-
(2002)
Proceedings of the IEEE
, vol.90
, pp. 1495-1517
-
-
Goode, B.1
-
10
-
-
0036980311
-
Performance analysis of elliptic curve cryptography for SSL
-
Atlanta, Georgia, USA
-
Gupta V, Gupta S, Stebila D. Performance analysis of elliptic curve cryptography for SSL. In Proceedings of the 2002 ACM Workshop on Wireless Security, Atlanta, Georgia, USA, 2002.
-
(2002)
Proceedings of the 2002 ACM Workshop on Wireless Security
-
-
Gupta, V.1
Gupta, S.2
Stebila, D.3
-
11
-
-
84888906383
-
-
IEEE P1363 standard
-
I.P. Group. IEEE P1363 standard, available at http://grouper.ieee.org/ groups/1363/index.html.
-
-
-
-
12
-
-
0038670954
-
Software implementation of elliptic curve cryptography over binary fields
-
LNCS, Springer-Verlag
-
Hankerson D, Hernandez JL, Menezes A. Software implementation of elliptic curve cryptography over binary fields. In Proceedings of Workshop on Cryptographic Hardware and Embedded Systems, LNCS, Springer-Verlag, 2000, pp. 1-24.
-
(2000)
Proceedings of Workshop on Cryptographic Hardware and Embedded Systems
, pp. 1-24
-
-
Hankerson, D.1
Hernandez, J.L.2
Menezes, A.3
-
15
-
-
84954139143
-
MIPMANET-mobile IP for mobile ad hoc networks
-
Boston, Massachusetts, USA, August
-
Jonsson U, Alriksson F, Johnson P, Larsson T, Maguire GQ Jr. MIPMANET-mobile IP for mobile ad hoc networks. IEEE/ACM Workshop on Mobile Ad Hoc Networking and Computing (MobiHOC), Boston, Massachusetts, USA, August 2000.
-
(2000)
IEEE/ACM Workshop on Mobile Ad Hoc Networking and Computing (MobiHOC)
-
-
Jonsson, U.1
Alriksson, F.2
Johnson, P.3
Larsson, T.4
Maguire Jr., G.Q.5
-
17
-
-
10644276796
-
About the impact of cooperation approaches for ad hoc networks
-
Annapolis, Maryland, USA
-
Lamparter B, Plaggemeier M, Westhoff D. About the impact of cooperation approaches for ad hoc networks. ACM/SIGMOBILE Fourth International Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC), Annapolis, Maryland, USA, 2003.
-
(2003)
ACM/SIGMOBILE Fourth International Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC)
-
-
Lamparter, B.1
Plaggemeier, M.2
Westhoff, D.3
-
19
-
-
0033890503
-
Multihop cellular: A new architecture for wireless communication
-
Tel Aviv, Israel, March
-
Lin YD, Hsu Y. Multihop cellular: A new architecture for wireless communication. Proceedings of IEEE INFOCOM '00, Tel Aviv, Israel, March 2000.
-
(2000)
Proceedings of IEEE INFOCOM '00
-
-
Lin, Y.D.1
Hsu, Y.2
-
20
-
-
84955368946
-
More flexible exponentiation with precomputation
-
LNCS 839, Springer-Verlag
-
Lim CH, Lee PJ. More flexible exponentiation with precomputation. Advances in Cryptography-Crypto'94, LNCS 839, Springer-Verlag, 1994, pp. 95-107.
-
(1994)
Advances in Cryptography-crypto'94
, pp. 95-107
-
-
Lim, C.H.1
Lee, P.J.2
-
22
-
-
84968484435
-
Speeding up the pollard and elliptic curve methods of factorisation
-
Montgomery P. Speeding up the pollard and elliptic curve methods of factorisation. Mathematics of Computation 1987; 48: 243-264.
-
(1987)
Mathematics of Computation
, vol.48
, pp. 243-264
-
-
Montgomery, P.1
-
23
-
-
26644463857
-
-
The Network Simulator NS-2, Available: http://www.ietf.org/html.charters/ manet-charter.html.
-
The Network Simulator NS-2
-
-
-
24
-
-
84888914889
-
-
The openssl project, 1998-2000, Available: http://www.openssl.org.
-
(1998)
The Openssl Project
-
-
-
25
-
-
0036969459
-
Context aware detection of selfish node in DSR based ad-hoc networks
-
Taipei, Taiwan, November
-
Paul K, Westhoff D. Context Aware Detection of Selfish Node in DSR Based Ad-hoc Networks. Proceedings of IEEE GLOBECOM '02, Taipei, Taiwan, November 2002.
-
(2002)
Proceedings of IEEE GLOBECOM '02
-
-
Paul, K.1
Westhoff, D.2
-
27
-
-
15744368857
-
Efficient and secure source authentication for multicast
-
San Diego, California, February
-
Perrig A, Canetti R, Tygar JD, Song D. Efficient and Secure Source Authentication for Multicast. Network and Distributed System Security (NDSS) Symposium, San Diego, California, February 2001.
-
(2001)
Network and Distributed System Security (NDSS) Symposium
-
-
Perrig, A.1
Canetti, R.2
Tygar, J.D.3
Song, D.4
-
29
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
Rivest R, Shamir A, Adleman L. A method for obtaining digital signatures and public-key cryptosystems. Communications of ACM 1978; 21(2):120-126.
-
(1978)
Communications of ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
-
31
-
-
84888893522
-
-
RSA Laboratories, Factoring Challenge, Available: http://www.rsa- security.com/resources/ecc_chall/challenge.html.
-
Factoring Challenge
-
-
-
32
-
-
84888904701
-
-
Jan.
-
RSA Data Security. DES Challenge III, Jan. 1999, Available: http://www.rsasecurity.com/rsalabs/challenges/des3/.
-
(1999)
DES Challenge III
-
-
-
33
-
-
35048826202
-
Zero common knowledge authentication for pervasive networks
-
LNCS 3006, Springer-Verlag, Ottawa, Ontario, Canada, August
-
Weimerskirch A, Westhoff D. Zero Common Knowledge Authentication for Pervasive Networks. Selected Areas in Cryptography (SAC03), LNCS 3006, Springer-Verlag, Ottawa, Ontario, Canada, August 2003.
-
(2003)
Selected Areas in Cryptography (SAC03)
-
-
Weimerskirch, A.1
Westhoff, D.2
-
35
-
-
24144439871
-
Efficient pairwise authentication protocols for sensor networks: Theory and performance analysis
-
Carruth J, La Porta TF (eds). IEEE Press: USA, September
-
Weimerskirch A, Westhoff D, Lucks S, Zenner E. Efficient pairwise authentication protocols for sensor networks: theory and performance analysis. IEEE Press: Sensor Network Operations, Carruth J, La Porta TF (eds). IEEE Press: USA, September 2004.
-
(2004)
IEEE Press: Sensor Network Operations
-
-
Weimerskirch, A.1
Westhoff, D.2
Lucks, S.3
Zenner, E.4
-
37
-
-
0032313105
-
Digital signatures for flow and multicasts
-
Austin, TX, October
-
Wong CK, Lam S. Digital signatures for flow and multicasts. Proceedings of IEEE ICNP'98, Austin, TX, October 1998.
-
(1998)
Proceedings of IEEE ICNP'98
-
-
Wong, C.K.1
Lam, S.2
-
38
-
-
4544221255
-
Secure Ad hoc On-Demand Distance Vector (SAODV) routing
-
draft-guerrero-manet-saodv-00.txt, August
-
Zapata MG. Secure Ad hoc On-Demand Distance Vector (SAODV) Routing, Internet Draft, draft-guerrero-manet-saodv-00.txt, August 2001.
-
(2001)
Internet Draft
-
-
Zapata, M.G.1
-
39
-
-
0042933944
-
Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks
-
San Francisco, USA, March
-
Zhong S, Yang YR, Chen J. Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks. Proceedings of IEEE INFOCOM '03, San Francisco, USA, March 2003.
-
(2003)
Proceedings of IEEE INFOCOM '03
-
-
Zhong, S.1
Yang, Y.R.2
Chen, J.3
|