-
1
-
-
0003582910
-
-
Charles E. Perkins, Ed., Addison Wesley
-
Charles E. Perkins, Ed., "Ad hoc Networking", Addison Wesley, 2001.
-
(2001)
Ad Hoc Networking
-
-
-
2
-
-
0003843664
-
-
Internet draft, Internet Engineering Task force, February Work in Progress
-
Charles E. Perkins, Elizabeth M. Royer, and Samir R. Das., "Ad hoc Demand Distance Vector (AODV) Routing", http://www.ietf.org/internet-drafts/draft-ietf-manet-aodv-13.txt, Internet draft, Internet Engineering Task force, February 2003. Work in Progress.
-
(2003)
Ad Hoc Demand Distance Vector (AODV) Routing
-
-
Perkins, C.E.1
Royer, E.M.2
Das, S.R.3
-
4
-
-
33750337948
-
Talking to Strangers: Authentication in Ad Hoc Networks
-
San Diego, CA, February
-
D. Balfanz, D. K. Smetters, P. Stuart, H. C. Wang, "Talking to Strangers: Authentication in Ad Hoc Networks", Network and Distributed System Security Symposium, San Diego, CA, February 2002.
-
(2002)
Network and Distributed System Security Symposium
-
-
Balfanz, D.1
Smetters, D.K.2
Stuart, P.3
Wang, H.C.4
-
5
-
-
0035789229
-
The Quest for Security in Mobile Ad Hoc Networks
-
Long Beach, CA, October
-
J. P. Hubaux, L. Buttyan, and S. Capkun, "The Quest for Security in Mobile Ad Hoc Networks", 2nd MobiHoc, Long Beach, CA, October 2001.
-
(2001)
2nd MobiHoc
-
-
Hubaux, J.P.1
Buttyan, L.2
Capkun, S.3
-
6
-
-
0035178273
-
Security Enhancement in AODV Protocol for Wireless Ad Hoc Netoworks
-
S. Bhargava and D.P. Agrawal, "Security Enhancement in AODV Protocol for Wireless Ad Hoc Netoworks", Vehiculat Technology Conference, vol. 4, 2001.
-
(2001)
Vehiculat Technology Conference
, vol.4
-
-
Bhargava, S.1
Agrawal, D.P.2
-
7
-
-
0242510138
-
Ariadne: A Secure On-demand Routing Protocol for ad-hoc networks
-
Y. Hu, A. Perrig, D. Johnson., "Ariadne: A Secure On-demand Routing Protocol for ad-hoc networks", MobiHoc 2002.
-
MobiHoc 2002
-
-
Hu, Y.1
Perrig, A.2
Johnson, D.3
-
8
-
-
0004118143
-
-
Technical report, UMass-CS-2001-037
-
B. Dahill, B. Levine, E. Royer, C. Shields, "A secure Routing Protocol for ad-hoc networks", Technical report, UMass-CS-2001-037.
-
A Secure Routing Protocol for Ad-hoc Networks
-
-
Dahill, B.1
Levine, B.2
Royer, E.3
Shields, C.4
-
10
-
-
0003826083
-
-
Technical Report, UIUCDCS-R-2001-2241, UILU-ENG-2001-1748
-
S. Yi, P. Nadurg, R. Kravets., "Security-Aware-Ad-Hoc routing for wireless networks", Technical Report, UIUCDCS-R-2001-2241, UILU-ENG-2001-1748.
-
Security-Aware-Ad-Hoc Routing for Wireless Networks
-
-
Yi, S.1
Nadurg, P.2
Kravets, R.3
-
13
-
-
3042520226
-
Report on a Working Session on Security in Wireless Ad hoc Networks
-
Levente Buttyan, Jean-Pierre Hubaux, "Report on a Working Session on Security in Wireless Ad hoc Networks", Mobile Computing and Communication Review Volumn 6 Number 4, 2002.
-
(2002)
Mobile Computing and Communication Review
, vol.6
, Issue.4
-
-
Buttyan, L.1
Hubaux, J.-P.2
-
14
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
Advances in Cryptology (Proceedings of Crypto '84), Springer-Verllag
-
Shamir, "Identity-based cryptosystems and signature schemes", Advances in Cryptology (Proceedings of Crypto '84), Lecture Notes in Computer Science, vol 196, Springer-Verllag, 1985.
-
(1985)
Lecture Notes in Computer Science
, vol.196
-
-
Shamir1
-
15
-
-
84874324906
-
Identity based encryption from the Weil pairing
-
extended abstract in Advances in Cryptology - Crypto 2001, Springer-Verlag, August
-
D. Boneh, M. Franklin, "Identity based encryption from the Weil pairing", extended abstract in Advances in Cryptology - Crypto 2001, Lecture Notes in Computer Science, Vol. 2139, Springer-Verlag, pp. 231-229, August 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2139
, pp. 231-1229
-
-
Boneh, D.1
Franklin, M.2
-
16
-
-
0034771605
-
SPINS: Security Protocols for Sensor Networks
-
Rome, Italy
-
A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. D. Tygar, "SPINS: Security Protocols for Sensor Networks" Proc. 7th Ann. Intl. Conf. Mobile Computing and Networks (MobiCom 2001), Rome, Italy, 2001.
-
(2001)
Proc. 7th Ann. Intl. Conf. Mobile Computing and Networks (MobiCom 2001)
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, J.D.5
-
17
-
-
0037194815
-
ID-based signatures from pairings on elliptic curves
-
K. G. Paterson., "ID-based signatures from pairings on elliptic curves". Electronics Letters, 38(18):1025-1026, 2002.
-
(2002)
Electronics Letters
, vol.38
, Issue.18
, pp. 1025-1026
-
-
Paterson, K.G.1
-
19
-
-
0003791041
-
-
Kluwer International series in Engineering and Computer Science
-
A. J. Menezes, "Elliptic Curve Public Key Cryptosystems", Kluwer International series in Engineering and Computer Science, 1993.
-
(1993)
Elliptic Curve Public Key Cryptosystems
-
-
Menezes, A.J.1
-
20
-
-
1542296538
-
-
Carnegie Mellon University Technical Report
-
Ratish J. Punnose, Pavel V. Nikitin, Josh Broch, Daniel D. Stancil, "Optimizing Wireless Network Protocols Using Real-Time Predictive Propagation Modeling", Carnegie Mellon University Technical Report, 1999.
-
(1999)
Optimizing Wireless Network Protocols Using Real-Time Predictive Propagation Modeling
-
-
Punnose, R.J.1
Nikitin, P.V.2
Broch, J.3
Stancil, D.D.4
|