-
1
-
-
0012517119
-
Cluster based routing protocol (CBRP) functional specification
-
MANET working group, August
-
M. Jiang, J. Li, and Y. C. Tay, "Cluster based routing protocol (CBRP) functional specification," IETF internet draft, MANET working group, August 1999, http://www.comp.nus.edu.sg/~tayyc/cbrp/draft-ietf-manet-cbrp-spec- 01.txt.
-
(1999)
IETF Internet Draft
-
-
Jiang, M.1
Li, J.2
Tay, Y.C.3
-
2
-
-
0042976442
-
Multi-level hierarchies for scalable Ad Hoc routing
-
E. M. Belding-Royer, "Multi-level hierarchies for scalable Ad Hoc routing," Wireless Networks, vol. 9, no. 5, pp. 461-478, 2003.
-
(2003)
Wireless Networks
, vol.9
, Issue.5
, pp. 461-478
-
-
Belding-Royer, E.M.1
-
3
-
-
0033366376
-
Distributed clustering for Ad Hoc networks
-
Fremantle, Australia, June
-
S. Basagni, "Distributed clustering for Ad Hoc networks," in Proc. International Symposium on Parallel Architectures, Algorithms, and Networks (ISPAN '99), pp. 310-315, Fremantle, Australia, June 1999.
-
(1999)
Proc. International Symposium on Parallel Architectures, Algorithms, and Networks (ISPAN '99)
, pp. 310-315
-
-
Basagni, S.1
-
4
-
-
8344229909
-
A cluster-based security architecture for Ad Hoc networks
-
Hong Kong, March
-
M. Bechler, H.-J. Hof, D. Kraft, R Rahlke, and L. Wolf, "A cluster-based security architecture for Ad Hoc networks," in Proc. 23rd Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '04), vol. 4, pp. 2393-2403, Hong Kong, March 2004.
-
(2004)
Proc. 23rd Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '04)
, vol.4
, pp. 2393-2403
-
-
Bechler, M.1
Hof, H.-J.2
Kraft, D.3
Rahlke, R.4
Wolf, L.5
-
5
-
-
84904904836
-
A secure routing protocol for Ad Hoc networks
-
Paris, France, November
-
K. Sanzgiri, B. Dahill, B. N. Levine, C. Shields, and E. M. Belding-Royer, "A secure routing protocol for Ad Hoc networks," in Proc. 10th IEEE International Conference on Network Protocols (ICNP '02), pp. 78-87, Paris, France, November 2002.
-
(2002)
Proc. 10th IEEE International Conference on Network Protocols (ICNP '02)
, pp. 78-87
-
-
Sanzgiri, K.1
Dahill, B.2
Levine, B.N.3
Shields, C.4
Belding-Royer, E.M.5
-
6
-
-
4143131440
-
Distributed symmetric key management for mobile Ad Hoc networks
-
Hong Kong, March
-
A. C.-F. Chan, "Distributed symmetric key management for mobile Ad Hoc networks," in Proc. 23rd Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '04), vol. 4, pp. 2414-2424, Hong Kong, March 2004.
-
(2004)
Proc. 23rd Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '04)
, vol.4
, pp. 2414-2424
-
-
Chan, A.C.-F.1
-
7
-
-
0033357103
-
Securing Ad Hoc networks
-
L. Zhou and Z. J. Haas, "Securing Ad Hoc networks," IEEE Network, vol. 13, no. 6, pp. 24-30, 1999.
-
(1999)
IEEE Network
, vol.13
, Issue.6
, pp. 24-30
-
-
Zhou, L.1
Haas, Z.J.2
-
8
-
-
0003208326
-
Cluster-based networks
-
C. E. Perkins, Ed., chapter 4, Addison-Wesley, Reading, Mass, USA
-
M. Steenstrup, "Cluster-based networks," in Ad Hoc Networking, C. E. Perkins, Ed., chapter 4, pp. 75-138, Addison-Wesley, Reading, Mass, USA, 2000.
-
(2000)
Ad Hoc Networking
, pp. 75-138
-
-
Steenstrup, M.1
-
9
-
-
0034590150
-
A novel authentication scheme for Ad Hoc networks
-
Chicago, Ill, USA, September
-
L. Venkatraman and D. P. Agrawal, "A novel authentication scheme for Ad Hoc networks," in Proc. IEEE Wireless Communications and Networking Conference (WCNC '00), vol. 3, pp. 1268-1273, Chicago, Ill, USA, September 2000.
-
(2000)
Proc. IEEE Wireless Communications and Networking Conference (WCNC '00)
, vol.3
, pp. 1268-1273
-
-
Venkatraman, L.1
Agrawal, D.P.2
-
10
-
-
0017416837
-
Hierarchical routing for large networks: Performance evaluation and optimization
-
L. Kleinrock and F. Kamoun, "Hierarchical routing for large networks: performance evaluation and optimization," Computer Networks, vol. 1, no. 3, pp. 155-174, 1977.
-
(1977)
Computer Networks
, vol.1
, Issue.3
, pp. 155-174
-
-
Kleinrock, L.1
Kamoun, F.2
-
11
-
-
0036343662
-
Clustering overhead for hierarchical routing in mobile Ad Hoc networks
-
New York, NY, USA, June
-
J. Sucec and I. Marsic, "Clustering overhead for hierarchical routing in mobile Ad Hoc networks," in Proc. 21st Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '02), vol. 3, pp. 1698-1706, New York, NY, USA, June 2002.
-
(2002)
Proc. 21st Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '02)
, vol.3
, pp. 1698-1706
-
-
Sucec, J.1
Marsic, I.2
-
12
-
-
3042520226
-
Report on a working session on security in wireless Ad Hoc networks
-
L. Buttyán and J.-P. Hubaux, "Report on a working session on security in wireless Ad Hoc networks," ACM SIGMOBILE Mobile Computing and Communications Review, vol. 7, no. 1, pp. 74-94, 2003.
-
(2003)
ACM SIGMOBILE Mobile Computing and Communications Review
, vol.7
, Issue.1
, pp. 74-94
-
-
Buttyán, L.1
Hubaux, J.-P.2
-
13
-
-
0028462933
-
Threshold cryptography
-
Y. G. Desmedt, "Threshold cryptography," European Transactions on Telecommunications, vol. 5, no. 4, pp. 449-457, 1994.
-
(1994)
European Transactions on Telecommunications
, vol.5
, Issue.4
, pp. 449-457
-
-
Desmedt, Y.G.1
-
14
-
-
0018545449
-
How to share a secret
-
A. Shamir, "How to share a secret," Communications of the ACM, vol. 22, no. 11, pp. 612-613, 1979.
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
15
-
-
0033357103
-
Securing Ad Hoc network
-
L. Zhou and Z. J. Hass, "Securing Ad Hoc network," IEEE Network, vol. 13, no. 6, pp. 24-30, 1999.
-
(1999)
IEEE Network
, vol.13
, Issue.6
, pp. 24-30
-
-
Zhou, L.1
Hass, Z.J.2
-
16
-
-
85023809951
-
Threshold cryptosystems
-
Proc. 9th Annual International Cryptology Conference on Advances in Cryptology (CRYPTO '89), G. Brassard, Ed., Springer, Santa Barbara, Calif, USA, August
-
Y. G. Desmedt and Y. Frankel, "Threshold cryptosystems," in Proc. 9th Annual International Cryptology Conference on Advances in Cryptology (CRYPTO '89), G. Brassard, Ed., vol. 435 of Lecture Notes in Computer Science, pp. 307-315, Springer, Santa Barbara, Calif, USA, August 1990.
-
(1990)
Lecture Notes in Computer Science
, vol.435
, pp. 307-315
-
-
Desmedt, Y.G.1
Frankel, Y.2
-
17
-
-
0029720059
-
Diffie-Hellman key distribution extended to group communication
-
New Delhi, India, March
-
M. Steiner, G. Tsudik, and M. Waidner, "Diffie-Hellman key distribution extended to group communication," in Proc. 3rd ACM Conference on Computer and Communications Security (CCS '96), pp. 31-37, New Delhi, India, March 1996.
-
(1996)
Proc. 3rd ACM Conference on Computer and Communications Security (CCS '96)
, pp. 31-37
-
-
Steiner, M.1
Tsudik, G.2
Waidner, M.3
-
18
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
Proc. International Cryptology Conference on Advances in Cryptology (CRYPTO '84), Springer, Santa Barbara, Calif, USA, August
-
A. Shamir, "Identity-based cryptosystems and signature schemes," in Proc. International Cryptology Conference on Advances in Cryptology (CRYPTO '84), vol. 196 of Lecture Notes in Computer Science, pp. 47-53, Springer, Santa Barbara, Calif, USA, August 1985.
-
(1985)
Lecture Notes in Computer Science
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
19
-
-
84874324906
-
Identity-based encryption from the Weil pairing
-
Proc. 21st Annual International Cryptology Conference on Advances in Cryptology (CRYPTO '01), Springer, Santa Barbara, Calif, USA, August
-
D. Boneh and M. K. Franklin, "Identity-based encryption from the Weil pairing," in Proc. 21st Annual International Cryptology Conference on Advances in Cryptology (CRYPTO '01), vol. 2139 of Lecture Notes in Computer Science, pp. 213-229, Springer, Santa Barbara, Calif, USA, August 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.K.2
-
20
-
-
0242334164
-
Minimizing communication costs in hierarchically-clustered networks of wireless sensors
-
S. Bandyopadhyay and E. J. Coyle, "Minimizing communication costs in hierarchically-clustered networks of wireless sensors," Computer Networks, vol. 44, no. 1, pp. 1-16, 2004.
-
(2004)
Computer Networks
, vol.44
, Issue.1
, pp. 1-16
-
-
Bandyopadhyay, S.1
Coyle, E.J.2
|