-
3
-
-
85106319926
-
A performance comparison of multi-hop wireless ad-hoc network routing protocols
-
J. Broch, D. A. Maltz, D. B. Johnson, Y.-C. Hu, and J. Jetcheva, "A Performance Comparison of Multi-hop Wireless Ad-hoc Network Routing Protocols", Mobile Computing and Networking, pp. 85-97, 1998.
-
(1998)
Mobile Computing and Networking
, pp. 85-97
-
-
Broch, J.1
Maltz, D.A.2
Johnson, D.B.3
Hu, Y.-C.4
Jetcheva, J.5
-
5
-
-
35348896753
-
Experimental evaluation of a wireless ad hoc network
-
S. Desilva and S. R. Das, "Experimental Evaluation of a Wireless Ad Hoc Network", in Proceedings of IEEE ICCCN, 2000.
-
(2000)
Proceedings of IEEE ICCCN
-
-
Desilva, S.1
Das, S.R.2
-
6
-
-
0001341422
-
DSR the dynamic source routing protocol for multihop wireless ad hoc networks
-
D. B. Johnson, D. A. Maltz and J. Broch, "DSR The Dynamic Source Routing Protocol for Multihop Wireless Ad Hoc Networks", Ad Hoc Networking, 2001, pp. 139-172.
-
(2001)
Ad Hoc Networking
, pp. 139-172
-
-
Johnson, D.B.1
Maltz, D.A.2
Broch, J.3
-
10
-
-
84883869163
-
-
H. Luo, P. Zerfos, J. Kong, S. Lu and L. Zhang, "Self-securing ad hoc wireless networks", ISCC 2002, pp. 567.
-
Self-Securing Ad Hoc Wireless Networks
, pp. 567
-
-
Luo, H.1
Zerfos, P.2
Kong, J.3
Lu, S.4
Zhang, L.5
-
12
-
-
0018545449
-
How to share a secret
-
A. Shamir, "How to Share a Secret", Commun. ACM, 1979, vol 22, pp. 612-613.
-
(1979)
Commun. ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
-
13
-
-
84957626176
-
Proactive secret sharing Or: How to cope with perpetual leakage
-
A. Herzberg, S. Jarecki, H. Krawczyk and M. Yung, "Proactive Secret Sharing Or: How to Cope With Perpetual Leakage", Lecture Notes in Computer Science, 1995, vol 963, pp. 339.
-
(1995)
Lecture Notes in Computer Science
, vol.963
, pp. 339
-
-
Herzberg, A.1
Jarecki, S.2
KrawcZyk, H.3
Yung, M.4
-
14
-
-
32144441409
-
A novel key-embedded scheme for secure video multicast systems
-
Under submission
-
H. Yin, C. Lin, F. Qiu, G. Min and X. Chu, "A Novel Key-Embedded Scheme for Secure Video Multicast Systems, International Journal of Computers & Electrical Engineering", Under submission.
-
International Journal of Computers & Electrical Engineering
-
-
Yin, H.1
Lin, C.2
Qiu, F.3
Min, G.4
Chu, X.5
-
15
-
-
33646705247
-
A media-dependent secure multicast protocol for adaptive video applications
-
H. Yin, C. Lin, F. Qiu, B. Li and Z. Tan, "A Media-Dependent Secure Multicast Protocol for Adaptive Video Applications", in Proceedings of SIGCOMM Asia Workshop, 2005.
-
(2005)
Proceedings of SIGCOMM Asia Workshop
-
-
Yin, H.1
Lin, C.2
Qiu, F.3
Li, B.4
Tan, Z.5
-
16
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
S. Marti, T. J. Giuli, K. Lai and M. Baker, "Mitigating Routing Misbehavior in Mobile Ad Hoc Networks", in Proceedings of International Conference on Mobile Computing and Networking, pp. 255-265, 2000.
-
(2000)
Proceedings of International Conference on Mobile Computing and Networking
, pp. 255-265
-
-
Marti, S.1
Giuli, T.J.2
Lai, K.3
Baker, M.4
-
17
-
-
32144440716
-
New secure routing in ad hoc networks: Study and evaluation of proposed schemes
-
K. Inkinen, "New Secure Routing in Ad Hoc Networks: Study and Evaluation of Proposed Schemes", Telecommunications Software and Multimedia, 2004.
-
(2004)
Telecommunications Software and Multimedia
-
-
Inkinen, K.1
-
20
-
-
84944414022
-
Scenario-based performance analysis of routing protocols for mobile ad-hoc networks
-
Per Johansson, Tony Larsson, Nicklas Hedman, Bartosz Mielczarek, and Mikael Degermark. "Scenario-based performance analysis of routing protocols for mobile ad-hoc networks", in Proceedings of ACM Mobicom'99, pp. 195-206, 1999.
-
(1999)
Proceedings of ACM Mobicom'99
, pp. 195-206
-
-
Johansson, P.1
Larsson, T.2
Hedman, N.3
Mielczarek, B.4
Degermark, M.5
-
21
-
-
0033892676
-
Performance comparison of two on-demand routing protocols for ad hoc networks
-
Samir Ranjan Das, Charles E. Perkins, and Elizabeth E. Royer. "Performance comparison of two on-demand routing protocols for ad hoc networks", in Proceedings of IEEE INFOCOM, pp. 3-12, 2000.
-
(2000)
Proceedings of IEEE INFOCOM
, pp. 3-12
-
-
Das, S.R.1
Perkins, C.E.2
Royer, E.E.3
-
22
-
-
84964499250
-
Secure ad hoc on-demand distance vector (SAODV) routing, March 2005
-
INTERNET-DRAFT draft-guerrero-manet-saodv-03.txt.Bowman, B., Debray, S. K., and Peterson, L. L. Reasoning about naming systems Nov.
-
Manel Guerrero Zapata. Secure Ad Hoc On-demand Distance Vector (SAODV) Routing, March 2005. INTERNET-DRAFT draft-guerrero-manet-saodv-03.txt.Bowman, B., Debray, S. K., and Peterson, L. L. Reasoning about naming systems. ACM Trans. Program. Lang. Syst., 15, 5 (Nov. 1993), 795-825.
-
(1993)
ACM Trans. Program. Lang. Syst.
, vol.15
, Issue.5
, pp. 795-825
-
-
Zapata, M.G.1
|