-
2
-
-
0016081585
-
Capability-based addressing
-
R. S. Fabry. Capability-based addressing. Commun. ACM, 17(7):403-412, 1974.
-
(1974)
Commun. ACM
, vol.17
, Issue.7
, pp. 403-412
-
-
Fabry, R.S.1
-
3
-
-
0005755840
-
Password-capabilities: Their evolution from the password-capability system into Walnut and beyond
-
G Heiser, editor. IEEE Computer Society Press, Jan
-
R D Pose. Password-capabilities: their evolution from the password-capability system into Walnut and Beyond. In G Heiser, editor, ACSAC, volume 23, pages 105-113. IEEE Computer Society Press, Jan 2001.
-
(2001)
ACSAC
, vol.23
, pp. 105-113
-
-
Pose, R.D.1
-
4
-
-
7744241279
-
IEEE 802.11 over multi-hop wireless networks: Problems and new perspectives
-
Karthikeyan Sundaresan, Hung-Yun Hsieh, Raghupathy Sivakumar. IEEE 802.11 over multi-hop wireless networks: problems and new perspectives. Elsevier, pages 109-132, 2004.
-
(2004)
Elsevier
, pp. 109-132
-
-
Sundaresan, K.1
Hsieh, H.-Y.2
Sivakumar, R.3
-
5
-
-
1942455360
-
Design and implementation of a private and public key crypto processor and its application to a security system
-
Feb
-
Ho Won Kim and Sunggu Lee. Design and implementation of a private and public key crypto processor and its application to a security system. IEEE Transactions on Consumer Electronics, 50(1):214-224, Feb 2004.
-
(2004)
IEEE Transactions on Consumer Electronics
, vol.50
, Issue.1
, pp. 214-224
-
-
Ho Won Kim1
Lee, S.2
-
6
-
-
33646813770
-
-
Infineon Technologies. http://www.infineon.com.
-
-
-
-
7
-
-
3142699811
-
A 10-Gbps full-AES crypto design with a twisted BDD S-Box architecture
-
July
-
S. Morioka and A. Satoh. A 10-Gbps full-AES crypto design with a twisted BDD S-Box architecture. IEEE Transactions on VLSI systems, 12(7):686-691, July 2004.
-
(2004)
IEEE Transactions on VLSI Systems
, vol.12
, Issue.7
, pp. 686-691
-
-
Morioka, S.1
Satoh, A.2
-
8
-
-
0035271246
-
Authenticated ad hoc routing at the link layer for mobile systems
-
Jim Binkley and William Trost. Authenticated ad hoc routing at the link layer for mobile systems. Wireless Network, 7(2): 139-145, 2001.
-
(2001)
Wireless Network
, vol.7
, Issue.2
, pp. 139-145
-
-
Binkley, J.1
Trost, W.2
-
9
-
-
0035789243
-
Security-aware ad hoc routing for wireless networks
-
Seung Yi, Prasad Naldurg, Robin Kravets. Security-Aware Ad hoc Routing for Wireless Networks. In MobiHoc, 2001.
-
(2001)
MobiHoc
-
-
Yi, S.1
Naldurg, P.2
Kravets, R.3
-
10
-
-
84904904836
-
A secure routing protocol for ad hoc networks
-
IEEE Computer Society
-
Kimaya Sanzgiri and Bridget Dahill and Brian Neil Levine and Clay Shields and Elizabeth M. Belding-Royer. A Secure Routing Protocol for Ad Hoc Networks. In ICNP, pages 78-89. IEEE Computer Society, 2002.
-
(2002)
ICNP
, pp. 78-89
-
-
Sanzgiri, K.1
Dahill, B.2
Levine, B.N.3
Shields, C.4
Belding-Royer, E.M.5
-
11
-
-
84943745348
-
Secure link state routing for mobile ad hoc networks
-
Jan
-
Zygmunt J. Haas Panagiotis Papadimitratos. Secure link state routing for mobile ad hoc networks. In SAINT, pages 27-31, Jan 2003.
-
(2003)
SAINT
, pp. 27-31
-
-
Papadimitratos, Z.J.H.P.1
-
12
-
-
0035704362
-
Providing robust and ubiquitous security support for mobile ad hoc networks
-
IEEE Computer Society, Nov
-
Jiejun Kong, Petros Zerfos, Haiyun Luo, Songwu Lu, Lixia Zhang. Providing Robust and Ubiquitous Security Support for Mobile Ad Hoc Networks. In ICNP, pages 251-260. IEEE Computer Society, Nov 2001.
-
(2001)
ICNP
, pp. 251-260
-
-
Kong, J.1
Zerfos, P.2
Luo, H.3
Lu, S.4
Zhang, L.5
-
13
-
-
0034590150
-
A novel authentication scheme for ad hoc networks wireless
-
Lakshmi Venkatraman and Dharma P. Agrawal. A novel authentication scheme for ad hoc networks wireless. In WCNC, volume 3. pages 1268-1273, 2000.
-
(2000)
WCNC
, vol.3
, pp. 1268-1273
-
-
Venkatraman, L.1
Agrawal, D.P.2
|