-
1
-
-
11244335412
-
Routing in multi-radio, multi-hop wireless mesh networks
-
R. Draves, J. Padhye, and B. Zill, Routing in multi-radio, multi-hop wireless mesh networks, in Proceedings of the 10th annual international conference on Mobile computing and networking, 2004.
-
(2004)
Proceedings of the 10th annual international conference on Mobile computing and networking
-
-
Draves, R.1
Padhye, J.2
Zill, B.3
-
2
-
-
0242440348
-
-
J. Jangeun and M.L. Sichitiu, The nominal capacity of wireless mesh networks, In IEEE Wireless Communications, 10 of 5, pages 8-14, Oct. 2003.
-
J. Jangeun and M.L. Sichitiu, The nominal capacity of wireless mesh networks, In IEEE Wireless Communications, volume 10 of 5, pages 8-14, Oct. 2003.
-
-
-
-
3
-
-
24144489900
-
Centralized channel assignment and routing algorithms for multi-channel wireless mesh networks
-
A. Raniwala, K. Gopalan, and T. Chiueh, Centralized channel assignment and routing algorithms for multi-channel wireless mesh networks, SIGMOBILE Mobile Comput. Commun. Rev., 8(2), 2004.
-
(2004)
SIGMOBILE Mobile Comput. Commun. Rev
, vol.8
, Issue.2
-
-
Raniwala, A.1
Gopalan, K.2
Chiueh, T.3
-
4
-
-
1642289265
-
Mesh wireless networking
-
Oct.-Nov
-
K. Rayner, Mesh wireless networking, Communications Engineer, 1(5):44-47, Oct.-Nov. 2003.
-
(2003)
Communications Engineer
, vol.1
, Issue.5
, pp. 44-47
-
-
Rayner, K.1
-
5
-
-
26444442131
-
Link-level Measurements from an 802.11b Mesh Network
-
Daniel Aguayo, John Bicket, Sanjit Biswas, Glenn Judd, and Robert Morris Link-level Measurements from an 802.11b Mesh Network, in SIGCOMM 2004.
-
(2004)
SIGCOMM
-
-
Aguayo, D.1
Bicket, J.2
Biswas, S.3
Judd, G.4
Morris, R.5
-
6
-
-
14244254122
-
-
url
-
IEEE Std 802.11b-1999, url = http://standards.ieee.org/getieee802/ 802.11.html.
-
IEEE Std 802.11b-1999
-
-
-
7
-
-
0019532104
-
Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms
-
D. L. Chaum, Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms, Communications of the ACM, 24(2):84-88, 1981.
-
(1981)
Communications of the ACM
, vol.24
, Issue.2
, pp. 84-88
-
-
Chaum, D.L.1
-
12
-
-
0035701330
-
Responder Anonymity and Anonymous Peer-to-Peer File Sharing
-
Riverside, CA
-
V. Scarlata, B. Levine, and C. Shields, Responder Anonymity and Anonymous Peer-to-Peer File Sharing, IEEE International Conference on Network Protocols (ICNP), Riverside, CA, 2001.
-
(2001)
IEEE International Conference on Network Protocols (ICNP)
-
-
Scarlata, V.1
Levine, B.2
Shields, C.3
-
13
-
-
0036088867
-
p5: A Protocol for Scalable Anonymous Communication
-
Oakland, CA, May
-
R. Sherwood, B. Bhattacharjee, and A. Srinivasan, p5: A Protocol for Scalable Anonymous Communication, IEEE Symposium on Security and Privacy, pages 53-65, Oakland, CA, May 2002.
-
(2002)
IEEE Symposium on Security and Privacy
, pp. 53-65
-
-
Sherwood, R.1
Bhattacharjee, B.2
Srinivasan, A.3
-
15
-
-
34547399878
-
-
RFC, url
-
OPSF Version 2, RFC, url = http://www.faqs.org/rfcs/rfc2328.html.
-
OPSF Version 2
-
-
-
17
-
-
0000629443
-
Dynamic Source Routing in Ad Hoc Wireless Networks
-
D. Johnson and D. Maltz, Dynamic Source Routing in Ad Hoc Wireless Networks, in Proc. of ACM SIGCOMM, 1996.
-
(1996)
Proc. of ACM SIGCOMM
-
-
Johnson, D.1
Maltz, D.2
-
18
-
-
84961572484
-
-
Y.-C. Hu, D. B. Johnson, and A. Perrig, SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks, in Proc. of the 4 IEEE WMCSA 2002, June 2002, pp. 3-13. Submitted for publication.
-
Y.-C. Hu, D. B. Johnson, and A. Perrig, SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks, in Proc. of the 4 IEEE WMCSA 2002, June 2002, pp. 3-13. Submitted for publication.
-
-
-
-
19
-
-
0036957315
-
Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks
-
Y.-C. Hu, D. B. Johnson, and A. Perrig, Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks, in Proc. of MOBICOM'02, 2002.
-
(2002)
Proc. of MOBICOM'02
-
-
Hu, Y.-C.1
Johnson, D.B.2
Perrig, A.3
-
20
-
-
0036986441
-
An On-Demand Secure Routing Protocol Resilient to Byzantine Failures
-
WiSe
-
B. Awerbuch, D. Holmer, C. Nita-Rotaru, and H. Rubens, An On-Demand Secure Routing Protocol Resilient to Byzantine Failures, In ACM Workshop on Wireless Security (WiSe), 2002.
-
(2002)
ACM Workshop on Wireless Security
-
-
Awerbuch, B.1
Holmer, D.2
Nita-Rotaru, C.3
Rubens, H.4
-
21
-
-
0036811662
-
-
L. Sweeney, K-Anonymity : A Model for Protecting Privacy, International Journal on Uncertainty, Fuzziness and Knowledge-based Systems, 10(5):557-570, 2002.
-
(2002)
K-Anonymity : A Model for Protecting Privacy, International Journal on Uncertainty, Fuzziness and Knowledge-based Systems
, vol.10
, Issue.5
, pp. 557-570
-
-
Sweeney, L.1
-
22
-
-
58149089560
-
-
A. Machanavajjhala, J. Gehrke, D. Kifer, and M. Venkitasubramaniani, l-Diversity: Privacy Beyond, k-Anonymity,
-
l-Diversity: Privacy Beyond, k-Anonymity
-
-
Machanavajjhala, A.1
Gehrke, J.2
Kifer, D.3
Venkitasubramaniani, M.4
-
28
-
-
22944492132
-
AO2P: Ad hoc On-demand Position-based Private Routing Protocol
-
X. Wu and B. Bhargava, AO2P: Ad hoc On-demand Position-based Private Routing Protocol, IEEE Transactions on Mobile Computing, Vol. 4, No. 4, Pages 335-348, 2005.
-
(2005)
IEEE Transactions on Mobile Computing
, vol.4
, Issue.4
, pp. 335-348
-
-
Wu, X.1
Bhargava, B.2
-
29
-
-
0023861309
-
The Dining Cryptographers Problem: Unconditional Sender and Receipient Untraceability
-
D. Chaum, The Dining Cryptographers Problem: Unconditional Sender and Receipient Untraceability, Journal of Cryptography, Vol. 24, No. 2, Pages 65-75, 1988.
-
(1988)
Journal of Cryptography
, vol.24
, Issue.2
, pp. 65-75
-
-
Chaum, D.1
|