-
1
-
-
0003582910
-
-
Addison Wesley Professional, Dec.
-
C.E. Perkins, "Ad Hoc Networking," Addison Wesley Professional,Dec. 2000.
-
(2000)
Ad Hoc Networking
-
-
Perkins, C.E.1
-
3
-
-
0242678584
-
Self-organized public-key management for mobile ad hoc networks
-
Jan-Mar
-
S. Capkun, L. Buttyan, and J. P. Hubaux, "Self-organized public-key management for mobile ad hoc networks," IEEE Transactions on Mobile Computing, Vol. 2, No. 1, Jan-Mar 2003, pp. 52-64.
-
(2003)
IEEE Transactions on Mobile Computing
, vol.2
, Issue.1
, pp. 52-64
-
-
Capkun, S.1
Buttyan, L.2
Hubaux, J.P.3
-
4
-
-
0033357103
-
Securing ad hoc networks
-
L.Zhou and Z.J.Haas," Securing Ad Hoc Networks,"In IEEE Networks, 1999,volume .13(6), pp.24-30.
-
(1999)
IEEE Networks
, vol.13
, Issue.6
, pp. 24-30
-
-
Zhou, L.1
Haas, Z.J.2
-
5
-
-
0018545449
-
How to share a secret
-
November
-
A. Shamir, "How to Share a Secret," Communications of the ACM, November 1979, Vol. 22, No. 11, pp. 612-613.
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
7
-
-
0035704362
-
Providing robust and ubiquitous security support for mobile ad hoc networks
-
J. Kong, P. Zerfos, H. Luo, S. Lu, and L. Zhang, "Providing Robust and Ubiquitous Security Support for Mobile Ad Hoc Networks, "In Ninth International Conference on Network Protocols (ICNP'01), 2001,pp. 251-260
-
(2001)
Ninth International Conference on Network Protocols (ICNP'01)
, pp. 251-260
-
-
Kong, J.1
Zerfos, P.2
Luo, H.3
Lu, S.4
Zhang, L.5
-
9
-
-
3042546547
-
Threshold and identity-based key management and authentication for wireless ad hoc networks
-
Hongmei Deng; Mukherjee, A.; Agrawal, D, "Threshold and identity-based key management and authentication for wireless ad hoc networks," ITCC.2004. Vol. 1. pp.107-111.
-
ITCC.2004
, vol.1
, pp. 107-111
-
-
Deng, H.1
Mukherjee, A.2
Agrawal, D.3
-
10
-
-
85030460443
-
A threshold cryptosystem without a trusted party
-
Eurocrpt'91, Berlin: Springer-Verlag
-
T.P. Pedersen, "A threshold cryptosystem without a trusted party," In Eurocrpt'91, LNCS 547, Berlin: Springer-Verlag, 1991,pp. 522-526.
-
(1991)
LNCS
, vol.547
, pp. 522-526
-
-
Pedersen, T.P.1
-
11
-
-
0035789229
-
The quest for security in mobile ad hoc networks
-
Oct
-
Hubaux, J.P., Buttyán, L., and Čapkun, S, "The Quest for Security in Mobile Ad Hoc Networks," In Proceedings of the Second Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 2001), Oct 2001, pp 146-155.
-
(2001)
Proceedings of the Second Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 2001)
, pp. 146-155
-
-
Hubaux, J.P.1
Buttyán, L.2
Čapkun, S.3
-
12
-
-
0035101078
-
Oct "Toward self-organized mobile ad hoc networks: The terminodes project"
-
Jan.
-
J. P. Hubaux, T. Gross, J. Y. Le Boudec, M. Vetterli, Oct "Toward self-organized mobile ad hoc networks: the terminodes project, " IEEE Comm. Magazine,Jan. 2001, Vol. 39 No. 1, pp 118-124.
-
(2001)
IEEE Comm. Magazine
, vol.39
, Issue.1
, pp. 118-124
-
-
Hubaux, J.P.1
Gross, T.2
Le Boudec, J.Y.3
Vetterli, M.4
-
14
-
-
0042473975
-
Route driven gossip: Probabilistic reliable multicast in ad hoc networks
-
J. Luo, P.T. Eugster, and J-P. Hubaux, "Route Driven Gossip: Probabilistic Reliable Multicast in Ad Hoc Networks", Proc. IEEE Infocom 2003, pp. 2229-2239.
-
Proc. IEEE Infocom 2003
, pp. 2229-2239
-
-
Luo, J.1
Eugster, P.T.2
Hubaux, J.-P.3
|