-
1
-
-
0033357103
-
Securing Ad Hoc Networks
-
Nov/Dec
-
L. Zhou, Z. J. Haas, "Securing Ad Hoc Networks," IEEE Network, Nov/Dec 1999.
-
(1999)
IEEE Network
-
-
Zhou, L.1
Haas, Z.J.2
-
2
-
-
84957626176
-
Proactive Secret Sharing Or: How to Cope With Perpetual Leakage, Advances in Cryptography - Crypto' 95
-
A. Herzberg, S. Jarecki, H. Krawczyk, and M. Yung, "Proactive Secret Sharing Or: How to Cope With Perpetual Leakage," Advances in Cryptography - Crypto' 95, Lecture Notes in Computer Science 963, 1998.
-
(1998)
Lecture Notes in Computer Science
, vol.963
-
-
Herzberg, A.1
Jarecki, S.2
Krawczyk, H.3
Yung, M.4
-
3
-
-
0018545449
-
How to Share a Secret
-
Nov
-
A. Shamir, "How to Share a Secret," Communications of the ACM, 22(11): 612-613, Nov. 1979.
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
4
-
-
8344229909
-
A Cluster-Based Security Architecture for Ad Hoc Networks
-
Hong Kong, China, Mar
-
rd IEEE INFOCOM'04, Hong Kong, China, Mar. 2004.
-
(2004)
rd IEEE INFOCOM'04
-
-
Bechler, M.1
Hof, H.-J.2
Kraft, D.3
Pahlke, F.4
Wolf, L.5
-
5
-
-
0035704362
-
Providing Robust and Ubiquitous Security Support for Mobile Ad-Hoc Networks
-
J. Kong, P. Zerfos, H. Luo, S. Lu, and L. Zhang, "Providing Robust and Ubiquitous Security Support for Mobile Ad-Hoc Networks," Proceedings. Of the International Conference on Network Protocols (ICNP), pp. 251-260, 2001.
-
(2001)
Proceedings. Of the International Conference on Network Protocols (ICNP)
, pp. 251-260
-
-
Kong, J.1
Zerfos, P.2
Luo, H.3
Lu, S.4
Zhang, L.5
-
6
-
-
0031234161
-
Adaptive Clustering for Mobile Wireless Networks
-
Sep
-
C. R. Lin and M. Gerla, "Adaptive Clustering for Mobile Wireless Networks," IEEE JSAC, Vol. 15, No. 7, Sep. 1997.
-
(1997)
IEEE JSAC
, vol.15
, Issue.7
-
-
Lin, C.R.1
Gerla, M.2
-
9
-
-
0030646698
-
Proactive public-key and signature schemes
-
Zurich, Switzerland, Apr
-
A. Herzberg, M. Jakobsson, S. Jarecki, H. Krawczyk, and M. Yung, "Proactive public-key and signature schemes," Proceedings of the 4th Annual Conference on Computer Communications Security, pp. 100-110, Zurich, Switzerland, Apr. 1997.
-
(1997)
Proceedings of the 4th Annual Conference on Computer Communications Security
, pp. 100-110
-
-
Herzberg, A.1
Jakobsson, M.2
Jarecki, S.3
Krawczyk, H.4
Yung, M.5
-
10
-
-
84958676203
-
Proactive RSA
-
Advances in Cryptology, Crypto'97
-
Y. Frankel, P. Gemmell, P. MacKenzie, and M. Yung, "Proactive RSA," In Advances in Cryptology - Crypto'97, Lecture Notes in Computer Science 1294, pp. 440-454. 1997.
-
(1997)
Lecture Notes in Computer Science
, vol.1294
, pp. 440-454
-
-
Frankel, Y.1
Gemmell, P.2
MacKenzie, P.3
Yung, M.4
-
11
-
-
0031375570
-
Optimal resilience proactive public-key cryptosystems
-
Oct
-
Y. Frankel, P. Gemmel, P. MacKenzie, and M. Yung, "Optimal resilience proactive public-key cryptosystems," IEEE Proceedings of the 38th Symposium on Foundations of Computer Science, pp. 384-393, Oct. 1997.
-
(1997)
IEEE Proceedings of the 38th Symposium on Foundations of Computer Science
, pp. 384-393
-
-
Frankel, Y.1
Gemmel, P.2
MacKenzie, P.3
Yung, M.4
-
12
-
-
33751044073
-
Talking To Strangers: Authentication in Ad-Hoc Wireless Networks
-
San Diego, California, Feb
-
D. Balfanz, D. K. Smetters, P. Stewart and H. Chi Wong "Talking To Strangers: Authentication in Ad-Hoc Wireless Networks," In Symposium on Network and Distributed Systems Security (NDSS '02), San Diego, California, Feb. 2002
-
(2002)
Symposium on Network and Distributed Systems Security (NDSS '02)
-
-
Balfanz, D.1
Smetters, D.K.2
Stewart, P.3
Chi Wong, H.4
-
13
-
-
84941340163
-
Efficient, and scalable IEEE 802.11 ad-hoc-mode timing synchronization function
-
Mar
-
T. Lai, D. Zhou, "Efficient, and scalable IEEE 802.11 ad-hoc-mode timing synchronization function," Advanced Information Networking and Applications, pp. 318-323, Mar. 2003.
-
(2003)
Advanced Information Networking and Applications
, pp. 318-323
-
-
Lai, T.1
Zhou, D.2
|