-
1
-
-
0036986441
-
An on-demand secure routing protocol resilent to byzantine failures
-
Atlanta, Georgia, Sep.
-
Baruch Awerbuch, David Holmer, Cristina Nita-Rotaru, and Herbert Rubens, "An on-demand secure routing protocol resilent to byzantine failures," in Proceedings of the ACM workshop on Wireless security (WiSE '02), pp. 21-30, Atlanta, Georgia, Sep. 2002.
-
(2002)
Proceedings of the ACM Workshop on Wireless Security (WiSE '02)
, pp. 21-30
-
-
Awerbuch, B.1
Holmer, D.2
Nita-Rotaru, C.3
Rubens, H.4
-
2
-
-
0035249889
-
Performance comparison of two on-demaad routing protocols for ad hoc networks
-
Feb.
-
S. R. Das C. E. Perkins, E. M. Royer and M. K. Marina, "Performance comparison of two on-demaad routing protocols for ad hoc networks," Personal Communications, vol. 8, pp. 16-28, Feb. 2001.
-
(2001)
Personal Communications
, vol.8
, pp. 16-28
-
-
Das, S.R.1
Perkins, C.E.2
Royer, E.M.3
Marina, M.K.4
-
3
-
-
2942671527
-
Threshold untraceable signature for group communications
-
accepted (july 26) and to appear
-
Ting-yi Chang, Chou-chen Yang, and Min-shiang Hwang, "threshold untraceable signature for group communications," Iee Proceedings - Communications, accepted (july 26, 2003) and to appear.
-
(2003)
IEE Proceedings - Communications
-
-
Chang, T.-Y.1
Yang, C.-C.2
Hwang, M.-S.3
-
4
-
-
2942686446
-
Threshold signature for group communications without shared distribution center
-
accepted (june 20) and to appear
-
Ting-yi Chang, Chou-Chen Yang, and Min-Shiang Hwang, "Threshold signature for group communications without shared distribution center," Future Generation Computer Systems, accepted (June 20, 2003) and to appear.
-
(2003)
Future Generation Computer Systems
-
-
Chang, T.-Y.1
Yang, C.-C.2
Hwang, M.-S.3
-
5
-
-
84961572484
-
Sead: Secure efficient distance vector routing for mobile wireless ad hoc networks
-
June
-
Y. C. Hu, D. Johnson, and A. Perrig, "Sead: Secure efficient distance vector routing for mobile wireless ad hoc networks," in Fourth IEEE Workshop on Mobile Computing Systems and Applications (WMCSA '02), pp. 3-13, June 2002.
-
(2002)
Fourth IEEE Workshop on Mobile Computing Systems and Applications (WMCSA '02)
, pp. 3-13
-
-
Hu, Y.C.1
Johnson, D.2
Perrig, A.3
-
6
-
-
0036957315
-
Ariadne: A secure on-demand routing protocol for ad hoc networks
-
Atlanta, Georgia, USA, Sep.
-
Y. C. Hu, A. Perrig, and D. Johnson, "Ariadne: A secure on-demand routing protocol for ad hoc networks," in Proceedings of the Eighth Annual International Conference on Mobile Computing and Networking (MobiCom '02), pp. 23-28, Atlanta, Georgia, USA, Sep. 2002.
-
(2002)
Proceedings of the Eighth Annual International Conference on Mobile Computing and Networking (MobiCom '02)
, pp. 23-28
-
-
Hu, Y.C.1
Perrig, A.2
Johnson, D.3
-
7
-
-
0036302680
-
An efficient and practical solution to remote authentication: Smart card
-
Jinn-Ke jan Hung-Yu Chien and Yuh-Min Tseng, "An efficient and practical solution to remote authentication: Smart card," Computers & Security, vol. 21, no. 4, pp. 372-375, 2002.
-
(2002)
Computers & Security
, vol.21
, Issue.4
, pp. 372-375
-
-
Jan, J.-K.1
Chien, H.-Y.2
Tseng, Y.-M.3
-
8
-
-
85106319926
-
A performance comparison of multi-hop wireless ad hoc network routing protocols
-
Dallas, TX, USA, Oct.
-
D. A. Maltz J. Broch, D. B. Johnson, Y-C. Hu, and J. Jetcheva, "A performance comparison of multi-hop wireless ad hoc network routing protocols," in The Fourth Annual ACM/IEEE International Conference on Mobile Computing and Networking, pp. 85-97, Dallas, TX, USA, Oct. 1998.
-
(1998)
The Fourth Annual ACM/IEEE International Conference on Mobile Computing and Networking
, pp. 85-97
-
-
Maltz, D.A.1
Broch, J.2
Johnson, D.B.3
Hu, Y.-C.4
Jetcheva, J.5
-
10
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
Boston, MA, USA, Aug.
-
S. Marti, T. J. Giuli, K. Lai, and M. Baker, "Mitigating routing misbehavior in mobile ad hoc networks," in Proceedings of the Sixth Annual ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom '00), pp. 255-265, Boston, MA, USA, Aug. 2000.
-
(2000)
Proceedings of the Sixth Annual ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom '00)
, pp. 255-265
-
-
Marti, S.1
Giuli, T.J.2
Lai, K.3
Baker, M.4
-
11
-
-
0024867751
-
Universal one-way hash functions and their cryptographic applications
-
M. Naor and M. Yung, "Universal one-way hash functions and their cryptographic applications," in Proc. of the 21st STOC, pp. 33-43, 1989.
-
(1989)
Proc. of the 21st STOC
, pp. 33-43
-
-
Naor, M.1
Yung, M.2
-
13
-
-
0031556598
-
Improvement of chang-wu broadcasting cryptosystem using geometric properties of lines
-
T. S. Wu and T. C. Wu, "Improvement of chang-wu broadcasting cryptosystem using geometric properties of lines," Electronics Letters, vol. 33, pp. 1940-1941, 1997.
-
(1997)
Electronics Letters
, vol.33
, pp. 1940-1941
-
-
Wu, T.S.1
Wu, T.C.2
-
14
-
-
0036980294
-
Securing ad hoc routing protocols
-
Atlanta, Georgia, Sep.
-
Manel Guerrero Zapata and N. Asokan, "Securing ad hoc routing protocols," in Proceedings of the ACM workshop on Wireless security (WISE '02), pp. 1-10, Atlanta, Georgia, Sep. 2002.
-
(2002)
Proceedings of the ACM Workshop on Wireless Security (WISE '02)
, pp. 1-10
-
-
Zapata, M.G.1
Asokan, N.2
-
15
-
-
0033357103
-
Securing ad hoc networks
-
Lidong Zhou and Zygmunt J. Haas, "Securing ad hoc networks," IEEE Network Magazine, vol. 13, no. 6, pp. 24-30, 1999.
-
(1999)
IEEE Network Magazine
, vol.13
, Issue.6
, pp. 24-30
-
-
Zhou, L.1
Haas, Z.J.2
|