-
1
-
-
0036948878
-
Minimum-energy broadcast in all-wireless networks: NP-completness and distribution issues
-
presented at the, Atlanta, GA
-
M. Çagalj, J. P. Hubaux, and C. Enz, "Minimum-energy broadcast in all-wireless networks: NP-completness and distribution issues," presented at the ACM Mobile Communications Conf., MOBICOM 2002, Atlanta, GA, 2002.
-
(2002)
ACM Mobile Communications Conf., MOBICOM
-
-
Çagalj, M.1
Hubaux, J.P.2
Enz, C.3
-
2
-
-
0000205020
-
Efficient communication-storage tradeoffs for multicast encryption
-
presented at the, Prague, Czech Republic
-
R. Canetti, T. Malkin, and K. Nissim, "Efficient communication-storage tradeoffs for multicast encryption," presented at the Eurocrypt'99, Prague, Czech Republic, 1999.
-
(1999)
Eurocrypt'99
-
-
Canetti, R.1
Malkin, T.2
Nissim, K.3
-
3
-
-
37549006081
-
-
A. Clementi, P. Crescenzi, P. Penna, G. Rossi, and P. Vocca, A worstcase analysis of a MST-based heuristic to construct energy-efficient broadcast subtrees in wireless networks, Univ. of Rome Tor Vergata,0 TR 010, 2001 [Online]. Available: http:// www.mat.uniroma2.it/penna/papers/stacs01-TR.ps.gz
-
A. Clementi, P. Crescenzi, P. Penna, G. Rossi, and P. Vocca, "A worstcase analysis of a MST-based heuristic to construct energy-efficient broadcast subtrees in wireless networks," Univ. of Rome Tor Vergata,0 TR 010, 2001 [Online]. Available: http:// www.mat.uniroma2.it/penna/papers/stacs01-TR.ps.gz
-
-
-
-
4
-
-
0001214263
-
Maximum matching and a polyhedron with (0,1) vertices
-
Jun
-
J. Edmonds, "Maximum matching and a polyhedron with (0,1) vertices," J. Res. National Bureau of Standards, vol. 69B, pp. 125-130, Jun. 1965.
-
(1965)
J. Res. National Bureau of Standards
, vol.69 B
, pp. 125-130
-
-
Edmonds, J.1
-
6
-
-
84979291225
-
Advances in Cryptology-Crypto'93, Lecture Notes in Computer Science
-
80-491
-
A. Fiat and M. Naor, "Broadcast encryption," Advances in Cryptology-Crypto'93, Lecture Notes in Computer Science, vol. 773, pp. 4 80-491, 1994.
-
(1994)
, vol.773
, pp. 4
-
-
Fiat, A.1
Naor, M.2
-
7
-
-
85030568489
-
Data structures for weighted matching and nearest common ancestors with linking
-
San Francisco, CA, Jan
-
H. Gabow, "Data structures for weighted matching and nearest common ancestors with linking," in Proc. 1st Annu. ACM SIAM Symp. Discrete Algorithms (SODA '90), San Francisco, CA, Jan. 1990, pp. 434-443.
-
(1990)
Proc. 1st Annu. ACM SIAM Symp. Discrete Algorithms (SODA '90)
, pp. 434-443
-
-
Gabow, H.1
-
9
-
-
0003037529
-
Reducibility among combinatorial problems
-
R. Miller and J. Thatcher, Eds. New York: Plenum Press
-
R. M. Karp, "Reducibility among combinatorial problems," in Complexity of Computer Communications, R. Miller and J. Thatcher, Eds. New York: Plenum Press, 1972, pp. 85-103.
-
(1972)
Complexity of Computer Communications
, pp. 85-103
-
-
Karp, R.M.1
-
11
-
-
4143085056
-
Cross-layer design for energy-efficient secure multicast communications in ad hoc networks
-
Paris, France, May
-
L. Lazos and R. Poovendran, "Cross-layer design for energy-efficient secure multicast communications in ad hoc networks," in Proc. IEEE Int. Conf. Communications, ICC 2004, Paris, France, May 2004, pp. 3633-3639.
-
(2004)
Proc. IEEE Int. Conf. Communications, ICC 2004
, pp. 3633-3639
-
-
Lazos, L.1
Poovendran, R.2
-
12
-
-
33845953217
-
Power proximity based key management for secure multicast in ad hoc networks
-
Feb
-
L. Lazos and R. Poovendran, "Power proximity based key management for secure multicast in ad hoc networks," ACM/Springer J. Wireless Networks (WINET), vol. 13, no. 1, pp. 127-148, Feb. 2007.
-
(2007)
ACM/Springer J. Wireless Networks (WINET)
, vol.13
, Issue.1
, pp. 127-148
-
-
Lazos, L.1
Poovendran, R.2
-
13
-
-
17144418536
-
VP3: Using vertex path and power proximity for energy efficient key distribution
-
Los Angeles, CA, Sep
-
L. Lazos, J. Salido, and R. Poovendran, "VP3: Using vertex path and power proximity for energy efficient key distribution," in Proc. IEEE Vehicular Technology Conf., VTC 2004, Los Angeles, CA, Sep. 2004, pp. 1228-1232.
-
(2004)
Proc. IEEE Vehicular Technology Conf., VTC 2004
, pp. 1228-1232
-
-
Lazos, L.1
Salido, J.2
Poovendran, R.3
-
14
-
-
33745958753
-
-
Seattle, WA, Univ. of Washington, Dept. Electr. Eng, Tech. Rep. Series, UWEETR-2003-0012
-
L. Lazos, R. Poovendran, and G. H. Cirincione, "Location-aware secure wireless multicast in ad hoc networks under heterogeneous pathloss," Seattle, WA, Univ. of Washington, Dept. Electr. Eng., Tech. Rep. Series, UWEETR-2003-0012, 2003.
-
(2003)
Location-aware secure wireless multicast in ad hoc networks under heterogeneous pathloss
-
-
Lazos, L.1
Poovendran, R.2
Cirincione, G.H.3
-
15
-
-
0346627966
-
Batch re-keying approach for secure multicast
-
Hong Kong, May
-
X. Li, Y. Yang, M. Gouda, and S. Lam, "Batch re-keying approach for secure multicast," in Proc. World Wide Web 10 (WWW10), Hong Kong, May 2001.
-
(2001)
Proc. World Wide Web 10
-
-
Li, X.1
Yang, Y.2
Gouda, M.3
Lam, S.4
-
16
-
-
0003396988
-
-
Internet draft, draft-irtf-smug-key-tree-balance-00. txt, Jun
-
M. Moyer, J. Rao, and P. Rohatgi, "Maintaining balanced key trees for secure multicast," Internet draft, draft-irtf-smug-key-tree-balance-00. txt, Jun. 1999.
-
(1999)
Maintaining balanced key trees for secure multicast
-
-
Moyer, M.1
Rao, J.2
Rohatgi, P.3
-
17
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
R. Needham and M. Schroeder, "Using encryption for authentication in large networks of computers," Commun. ACM, vol. 21, no. 12, pp. 993-999, 1978.
-
(1978)
Commun. ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
Needham, R.1
Schroeder, M.2
-
18
-
-
0035504627
-
An information-theoretic approach for design and analysis of rooted-tree-based multicast key management schemes
-
Nov
-
R. Poovendran and J. S. Baras, "An information-theoretic approach for design and analysis of rooted-tree-based multicast key management schemes," IEEE Trans. Inf. Theory, vol. 47, no. 7, pp. 2824-2834, Nov. 2001.
-
(2001)
IEEE Trans. Inf. Theory
, vol.47
, Issue.7
, pp. 2824-2834
-
-
Poovendran, R.1
Baras, J.S.2
-
19
-
-
0033690786
-
Kronos: A scalable group re-keying approach for secure multicast
-
Oakland, CA, May
-
S. Setia, S. Koussih, and S. Jajodia, "Kronos: A scalable group re-keying approach for secure multicast," in Proc. IEEE Security and Privacy Symp. 2000, Oakland, CA, May 2000, pp. 215-228.
-
(2000)
Proc. IEEE Security and Privacy Symp. 2000
, pp. 215-228
-
-
Setia, S.1
Koussih, S.2
Jajodia, S.3
-
20
-
-
0035001560
-
A lower bound for multicast key distribution
-
Apr
-
J. Snoeyink, S. Suri, and G. Varghese, "A lower bound for multicast key distribution," in Proc. IEEE INFOCOM 2001, Apr. 2001, pp. 422-431.
-
(2001)
Proc. IEEE INFOCOM 2001
, pp. 422-431
-
-
Snoeyink, J.1
Suri, S.2
Varghese, G.3
-
21
-
-
4644294648
-
A scalable multicast key management scheme for heterogeneous wireless networks
-
Aug
-
Y. Sun, W. Trappe, and K. J. R. Liu, "A scalable multicast key management scheme for heterogeneous wireless networks," IEEE/ACM Trans. Networking, vol. 12, no. 4, pp. 653-666, Aug. 2004.
-
(2004)
IEEE/ACM Trans. Networking
, vol.12
, Issue.4
, pp. 653-666
-
-
Sun, Y.1
Trappe, W.2
Liu, K.J.R.3
-
22
-
-
1642313744
-
Metrics useful in network tomography studies
-
Mar
-
Y. Vardi, "Metrics useful in network tomography studies," IEEE Signal Process. Lett., vol. 11, no. 3, pp. 353-355, Mar. 2004.
-
(2004)
IEEE Signal Process. Lett
, vol.11
, Issue.3
, pp. 353-355
-
-
Vardi, Y.1
-
24
-
-
0033894011
-
On the construction of energy efficient broadcast and multicast trees in wireless networks
-
Mar
-
J. E. Wieselthier, G. D. Nguyen, and A. Ephremides, "On the construction of energy efficient broadcast and multicast trees in wireless networks," in Proc. IEEE INFOCOM 2000, Mar. 2000, pp. 585-594.
-
(2000)
Proc. IEEE INFOCOM 2000
, pp. 585-594
-
-
Wieselthier, J.E.1
Nguyen, G.D.2
Ephremides, A.3
-
25
-
-
0033893174
-
Secure group communications using key graphs
-
Feb
-
C. K. Wong, M. Gouda, and S. Lam, "Secure group communications using key graphs," IEEE/ACM Trans. Networking, vol. 8, no. 1, pp. 16-31, Feb. 2000.
-
(2000)
IEEE/ACM Trans. Networking
, vol.8
, Issue.1
, pp. 16-31
-
-
Wong, C.K.1
Gouda, M.2
Lam, S.3
-
26
-
-
0006513010
-
Reliable group rekeying: Design and performance analysis
-
presented at the, San Diego, CA, Aug
-
Y. Yang, X. Li, and S. Lam, "Reliable group rekeying: Design and performance analysis," presented at the ACM SIGCOMM, San Diego, CA, Aug. 2001.
-
(2001)
ACM SIGCOMM
-
-
Yang, Y.1
Li, X.2
Lam, S.3
-
27
-
-
0347946946
-
Protocol design for scalable and reliable group rekeying
-
Dec
-
X. B. Zhang, S. S. Lam, D. Y. Lee, and Y. R. Yang, "Protocol design for scalable and reliable group rekeying," IEEE/ACM Trans. Networking vol. 11, no. 6, pp. 908-921, Dec. 2003.
-
(2003)
IEEE/ACM Trans. Networking
, vol.11
, Issue.6
, pp. 908-921
-
-
Zhang, X.B.1
Lam, S.S.2
Lee, D.Y.3
Yang, Y.R.4
|