-
4
-
-
33846569378
-
-
Wireless IP Network Standard. P.S0001-A-1, 3GPP2, 2000.
-
Wireless IP Network Standard. P.S0001-A-1, 3GPP2, 2000.
-
-
-
-
5
-
-
1842815887
-
Security in mobile ad hoc networks: Challenges and solutions
-
Yang H, Luo H, Ye F, Lu S, Zhang L. Security in mobile ad hoc networks: challenges and solutions. IEEE Wireless Communication 2004; 11(1): 38-47.
-
(2004)
IEEE Wireless Communication
, vol.11
, Issue.1
, pp. 38-47
-
-
Yang, H.1
Luo, H.2
Ye, F.3
Lu, S.4
Zhang, L.5
-
7
-
-
13244276488
-
Secure routing in mobile wireless ad hoc networks
-
Gupte S, Singhal M. Secure routing in mobile wireless ad hoc networks. Ad Hoc Networks 2003; 1(1): 151-174.
-
(2003)
Ad Hoc Networks
, vol.1
, Issue.1
, pp. 151-174
-
-
Gupte, S.1
Singhal, M.2
-
8
-
-
11244269535
-
SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks
-
Hu YC, Johnson DB, Perrig A. SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks. Ad Hoc Networks 2003; 1(1): 175-192.
-
(2003)
Ad Hoc Networks
, vol.1
, Issue.1
, pp. 175-192
-
-
Hu, Y.C.1
Johnson, D.B.2
Perrig, A.3
-
14
-
-
7744232568
-
TIDS: Threshold and identity-based security scheme for wireless ad hoc networks
-
Deng H, Agrawal DP. TIDS: threshold and identity-based security scheme for wireless ad hoc networks. Ad Hoc Networks 2004; 2(3): 291-307.
-
(2004)
Ad Hoc Networks
, vol.2
, Issue.3
, pp. 291-307
-
-
Deng, H.1
Agrawal, D.P.2
-
15
-
-
0035704362
-
Providing robust and ubiquitous security support for mobile ad hoc networks
-
November
-
Kong J, Zerfos P, Luo H, Lu S, Zhang L. Providing robust and ubiquitous security support for mobile ad hoc networks. In IEEE Ninth International Conference on Network Protocols (ICNP'01), November 2001; 251-260.
-
(2001)
IEEE Ninth International Conference on Network Protocols (ICNP'01)
, pp. 251-260
-
-
Kong, J.1
Zerfos, P.2
Luo, H.3
Lu, S.4
Zhang, L.5
-
16
-
-
0033357103
-
Securing ad hoc networks
-
Zhou L, Haas Z. Securing ad hoc networks. IEEE Networks 1999; 13(6): 23-30.
-
(1999)
IEEE Networks
, vol.13
, Issue.6
, pp. 23-30
-
-
Zhou, L.1
Haas, Z.2
-
17
-
-
0024037372
-
VSAT networks: Architectures, protocol, and management
-
Chitre DM, Mccoskey JS. VSAT networks: architectures, protocol, and management. IEEE Communication Magazine 1988; 26(7): 28-38.
-
(1988)
IEEE Communication Magazine
, vol.26
, Issue.7
, pp. 28-38
-
-
Chitre, D.M.1
Mccoskey, J.S.2
-
18
-
-
0347309397
-
Cryptanalysis and improvement of key distribution system for VSAT satellite communication
-
Tseng YM. Cryptanalysis and improvement of key distribution system for VSAT satellite communication. Informatica 2002; 13(3): 369-376.
-
(2002)
Informatica
, vol.13
, Issue.3
, pp. 369-376
-
-
Tseng, Y.M.1
-
19
-
-
0032163788
-
Key distribution for secure VSAT satellite communications
-
Park JH, Lim SB. Key distribution for secure VSAT satellite communications. IEEE Transactions on Broadcasting 1998; 44(3): 274-277.
-
(1998)
IEEE Transactions on Broadcasting
, vol.44
, Issue.3
, pp. 274-277
-
-
Park, J.H.1
Lim, S.B.2
-
20
-
-
0034590134
-
UAV-aided intelligent routing for ad-hoc wireless network in single-area theater
-
Gu DL, Pei G, Ly H, Gerla M, Zhang B, Hong X. UAV-aided intelligent routing for ad-hoc wireless network in single-area theater. IEEE WCNC 2000; 1220-1225.
-
(2000)
IEEE WCNC
, pp. 1220-1225
-
-
Gu, D.L.1
Pei, G.2
Ly, H.3
Gerla, M.4
Zhang, B.5
Hong, X.6
-
21
-
-
14744269381
-
Civilian unmanned aerial vehicles: Overview of European effort and challenges for the future
-
Goraj Z. Civilian unmanned aerial vehicles: overview of European effort and challenges for the future. Aviation Journal 2003; 7(2): 1-18.
-
(2003)
Aviation Journal
, vol.7
, Issue.2
, pp. 1-18
-
-
Goraj, Z.1
-
22
-
-
9144267125
-
Authentication and billing protocols for the integration of WLAN and 3G Networks
-
Tseng YM, Yang CC, Su JH. Authentication and billing protocols for the integration of WLAN and 3G Networks. Wireless Personal Communications 2004; 29(3-4): 351-366.
-
(2004)
Wireless Personal Communications
, vol.29
, Issue.3-4
, pp. 351-366
-
-
Tseng, Y.M.1
Yang, C.C.2
Su, J.H.3
-
23
-
-
0345871182
-
Hiperlan/2 public access interworking with 3G cellular systems
-
Mccann S, Flygare H. Hiperlan/2 public access interworking with 3G cellular systems. Wireless Networks 2004; 10(1): 43-51.
-
(2004)
Wireless Networks
, vol.10
, Issue.1
, pp. 43-51
-
-
Mccann, S.1
Flygare, H.2
-
24
-
-
0018545449
-
How to share a secret
-
Shamir A. How to share a secret. Communications of the ACM 1979; 22(11): 612-613.
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
26
-
-
33846597047
-
-
ITU-T recommendation X.509. Information technology-open system interconnection-the directory: authentication framework, June 1997.
-
ITU-T recommendation X.509. Information technology-open system interconnection-the directory: authentication framework, June 1997.
-
-
-
-
27
-
-
0001849866
-
The status of MD5 after a recent attack
-
Dobbertin H. The status of MD5 after a recent attack. CryptoBytes 1996; 2(2): 1-6.
-
(1996)
CryptoBytes
, vol.2
, Issue.2
, pp. 1-6
-
-
Dobbertin, H.1
-
28
-
-
0001312077
-
Message recovery for signature schemes based on the discrete logarithm
-
Springer: Berlin, May
-
Nyberg K, Rueppel RA. Message recovery for signature schemes based on the discrete logarithm. In EUROCRYPT'94, Springer: Berlin, May 1994; 175-190.
-
(1994)
EUROCRYPT'94
, pp. 175-190
-
-
Nyberg, K.1
Rueppel, R.A.2
-
29
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystem
-
Rivest R, Shamir A, Adleman L. A method for obtaining digital signatures and public-key cryptosystem. Communications of ACM 1978; 21(2): 120-126.
-
(1978)
Communications of ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
-
32
-
-
0034865654
-
Virtual dynamic backbone for mobile ad hoc networks
-
Helsinki, Finland, June
-
Kozat UC, Kondylis G, Ryu B, Marina MK. Virtual dynamic backbone for mobile ad hoc networks. In IEEE International Conference on Communications (ICC), Helsinki, Finland, June 2001; 250-255.
-
(2001)
IEEE International Conference on Communications (ICC)
, pp. 250-255
-
-
Kozat, U.C.1
Kondylis, G.2
Ryu, B.3
Marina, M.K.4
-
33
-
-
0141518232
-
On the security methods for protecting password transmission
-
Tseng YM, Jan JK, Chien HY. On the security methods for protecting password transmission. Informatica 2001; 12(3): 469-476.
-
(2001)
Informatica
, vol.12
, Issue.3
, pp. 469-476
-
-
Tseng, Y.M.1
Jan, J.K.2
Chien, H.Y.3
|