-
1
-
-
0032688633
-
Scalable Routing Strategies for Ad Hoc Wireless Networks
-
Iwata A., Chiang C.-C., Pei G., Gerla M., and Chen T.-W. Scalable Routing Strategies for Ad Hoc Wireless Networks. IEEE Journal on Selected Areas in Communications 17 8 (1999) 1369-1379
-
(1999)
IEEE Journal on Selected Areas in Communications
, vol.17
, Issue.8
, pp. 1369-1379
-
-
Iwata, A.1
Chiang, C.-C.2
Pei, G.3
Gerla, M.4
Chen, T.-W.5
-
2
-
-
84907551158
-
-
G. Pei, M. Gerla, X. Hong, C.-C. Chi, A Wireless Hierarchical Routing Protocol with Group Mobility, in: Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC), 1999, pp. 1538-1542.
-
G. Pei, M. Gerla, X. Hong, C.-C. Chi, A Wireless Hierarchical Routing Protocol with Group Mobility, in: Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC), 1999, pp. 1538-1542.
-
-
-
-
3
-
-
0032092244
-
Hierarchically-Organized, Multihop Mobile Wireless Networks for Quality-of-Service Support
-
Ramanathan R., and Steenstrup M. Hierarchically-Organized, Multihop Mobile Wireless Networks for Quality-of-Service Support. Mobile Networks and Applications 3 1 (1998) 101-119
-
(1998)
Mobile Networks and Applications
, vol.3
, Issue.1
, pp. 101-119
-
-
Ramanathan, R.1
Steenstrup, M.2
-
4
-
-
0035392857
-
A Survey of Energy Efficient Network Protocols for Wireless Networks
-
Jones C.E., Sivalingam K.M., Agrawal P., and Chen J.C. A Survey of Energy Efficient Network Protocols for Wireless Networks. Wirel. Netw. 7 4 (2001) 343-358
-
(2001)
Wirel. Netw.
, vol.7
, Issue.4
, pp. 343-358
-
-
Jones, C.E.1
Sivalingam, K.M.2
Agrawal, P.3
Chen, J.C.4
-
5
-
-
0000893747
-
Neuer Beweis eines Satzes ueber Permutationen
-
Prüfer H. Neuer Beweis eines Satzes ueber Permutationen. Archiv für Mathematik und Physik 27 (1918) 742-744
-
(1918)
Archiv für Mathematik und Physik
, vol.27
, pp. 742-744
-
-
Prüfer, H.1
-
7
-
-
0345565893
-
A Survey of Key Management for Secure Group Communication
-
Rafaeli S., and Hutchison D. A Survey of Key Management for Secure Group Communication. ACM Computing Surveys 35 3 (2003) 309-329
-
(2003)
ACM Computing Surveys
, vol.35
, Issue.3
, pp. 309-329
-
-
Rafaeli, S.1
Hutchison, D.2
-
8
-
-
0034449805
-
-
Y. Kim, A. Perrig, G. Tsudik, Simple and fault-tolerant key agreement for dynamic collaborative groups, in: Proceedings of the ACM Conference on Computer and Communications Security, 2000, pp. 235-244.
-
Y. Kim, A. Perrig, G. Tsudik, Simple and fault-tolerant key agreement for dynamic collaborative groups, in: Proceedings of the ACM Conference on Computer and Communications Security, 2000, pp. 235-244.
-
-
-
-
9
-
-
0032218234
-
Authenticated group key agreement and friends
-
ACM Press New York, NY, USA, San Francisco, California, United States
-
Ateniese G., Steiner M., and Tsudik G. Authenticated group key agreement and friends. Proceedings of the 5th ACM conference on Computer and communications security (1998), ACM Press New York, NY, USA, San Francisco, California, United States 17-26
-
(1998)
Proceedings of the 5th ACM conference on Computer and communications security
, pp. 17-26
-
-
Ateniese, G.1
Steiner, M.2
Tsudik, G.3
-
10
-
-
84978999296
-
Efficient and Secure Conference-key Distribution
-
Springer-Verlag, Cambridge, UK
-
Burmester M., and Desmedt Y. Efficient and Secure Conference-key Distribution. Proceedings of the Security Protocols Workshop (1996), Springer-Verlag, Cambridge, UK 119-129
-
(1996)
Proceedings of the Security Protocols Workshop
, pp. 119-129
-
-
Burmester, M.1
Desmedt, Y.2
-
11
-
-
0038318530
-
An Efficient Secure Authenticated Group Key Exchange Algorithm for Large and Dynamic Groups
-
National Institute of Standards and Technology, National Computer Security Center, Baltimore, MD, USA
-
Alves-Foss J. An Efficient Secure Authenticated Group Key Exchange Algorithm for Large and Dynamic Groups. Proceedings of 23rd National Information Systerms Security Conference (NISSC) (2000), National Institute of Standards and Technology, National Computer Security Center, Baltimore, MD, USA 254-266
-
(2000)
Proceedings of 23rd National Information Systerms Security Conference (NISSC)
, pp. 254-266
-
-
Alves-Foss, J.1
-
12
-
-
84884730529
-
An Optimal Class of Symmetric Key Generation Systems
-
EUROCRYPT'84, Springer-Verlag, Paris, France
-
Blom R. An Optimal Class of Symmetric Key Generation Systems. EUROCRYPT'84. Lecture Notes in Computer Science Vol. 209 (1985), Springer-Verlag, Paris, France 335-338
-
(1985)
Lecture Notes in Computer Science
, vol.209
, pp. 335-338
-
-
Blom, R.1
-
13
-
-
0005908666
-
Perfectly-Secure Key Distribution for Dynamic Conferences
-
Blundo C., Santis A.D., Herzberg A., Kutten S., Vaccaro U., and Yung M. Perfectly-Secure Key Distribution for Dynamic Conferences. Information and Computation 146 1 (1998) 1-23
-
(1998)
Information and Computation
, vol.146
, Issue.1
, pp. 1-23
-
-
Blundo, C.1
Santis, A.D.2
Herzberg, A.3
Kutten, S.4
Vaccaro, U.5
Yung, M.6
-
14
-
-
84979291225
-
Broadcast Encryption
-
CRYPTO'93, Springer-Verlag New York, Inc., Santa Barbara, California, United States
-
Fiat A., and Naor M. Broadcast Encryption. CRYPTO'93. Lecture Notes in Computer Science Vol. 773 (1994), Springer-Verlag New York, Inc., Santa Barbara, California, United States 480-491
-
(1994)
Lecture Notes in Computer Science
, vol.773
, pp. 480-491
-
-
Fiat, A.1
Naor, M.2
-
15
-
-
39149130543
-
-
T. Ballardie, Scalable Multicast Key Distribution, RFC 1949, 1996. .
-
T. Ballardie, Scalable Multicast Key Distribution, RFC 1949, 1996. .
-
-
-
-
17
-
-
39149098315
-
-
H. Harney, C. Muckenhirn, Group Key Management Protocol (GKMP) Architecture, RFC 2094.
-
H. Harney, C. Muckenhirn, Group Key Management Protocol (GKMP) Architecture, RFC 2094.
-
-
-
-
18
-
-
39149085221
-
-
S. Mittra, A Framework for Scalable Secure Multicasting, in: Proceedings of ACM SIGCOMM, 1997, pp. 277-288.
-
S. Mittra, A Framework for Scalable Secure Multicasting, in: Proceedings of ACM SIGCOMM, 1997, pp. 277-288.
-
-
-
-
20
-
-
0038043478
-
Key Establishment in Large Dynamic Groups Using One-Way Function Trees
-
Sherman A.T., and McGrew D.A. Key Establishment in Large Dynamic Groups Using One-Way Function Trees. IEEE Transactions on Software Engineering 29 5 (2003) 444-458
-
(2003)
IEEE Transactions on Software Engineering
, vol.29
, Issue.5
, pp. 444-458
-
-
Sherman, A.T.1
McGrew, D.A.2
-
21
-
-
0000636954
-
The VersaKey Framework: Versatile Group Key Management
-
Waldvogel M., Caronni G., Sun D., Weiler N., and Plattner B. The VersaKey Framework: Versatile Group Key Management. IEEE Journal on Selected Areas in Communications 17 9 (1999) 1614-1631
-
(1999)
IEEE Journal on Selected Areas in Communications
, vol.17
, Issue.9
, pp. 1614-1631
-
-
Waldvogel, M.1
Caronni, G.2
Sun, D.3
Weiler, N.4
Plattner, B.5
-
22
-
-
39149103592
-
-
D.M. Wallner, E.J. Harder, R.C. Agee, Key Management for Multicast: Issues and Architectures, RFC 2627.
-
D.M. Wallner, E.J. Harder, R.C. Agee, Key Management for Multicast: Issues and Architectures, RFC 2627.
-
-
-
-
23
-
-
14544302192
-
A Key-chain Based Keying Scheme For Many-to-Many Secure Group Communication
-
Huang D., and Medhi D. A Key-chain Based Keying Scheme For Many-to-Many Secure Group Communication. ACM Transactions on Information and System Security 7 4 (2004) 523-552
-
(2004)
ACM Transactions on Information and System Security
, vol.7
, Issue.4
, pp. 523-552
-
-
Huang, D.1
Medhi, D.2
-
24
-
-
0038341106
-
-
L. Eschenauer, V.D. Gligor, A Key-management Scheme for Distributed Sensor Networks, in: Proceedings of the 9th ACM Conference on Computer and Communication Security (CCS-02), 2002, pp. 41-47.
-
L. Eschenauer, V.D. Gligor, A Key-management Scheme for Distributed Sensor Networks, in: Proceedings of the 9th ACM Conference on Computer and Communication Security (CCS-02), 2002, pp. 41-47.
-
-
-
-
25
-
-
28444433009
-
Random Key Predistribution Schemes for Sensor Networks
-
IEEE Computer Society, Los Alamitos, CA
-
Chan H., Perrig A., and Song D. Random Key Predistribution Schemes for Sensor Networks. Proceedings of 2003 Symposium on Security and Privacy (2003), IEEE Computer Society, Los Alamitos, CA 197-215
-
(2003)
Proceedings of 2003 Symposium on Security and Privacy
, pp. 197-215
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
26
-
-
0035789267
-
Secure Pebblenets
-
ACM Press New York, NY, USA
-
Basagni S., Herrin K., Bruschi D., and Rosti E. Secure Pebblenets. Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing (2001), ACM Press New York, NY, USA 156-163
-
(2001)
Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing
, pp. 156-163
-
-
Basagni, S.1
Herrin, K.2
Bruschi, D.3
Rosti, E.4
-
27
-
-
3142739563
-
An Architecture for Key Management in Hierarchical Mobile Ad-Hoc Networks
-
Rhee K., Park Y., and Tsudik G. An Architecture for Key Management in Hierarchical Mobile Ad-Hoc Networks. Journal of Communications and Networks 6 2 (2004) 156-162
-
(2004)
Journal of Communications and Networks
, vol.6
, Issue.2
, pp. 156-162
-
-
Rhee, K.1
Park, Y.2
Tsudik, G.3
-
28
-
-
33846272388
-
Looking Back at the Bell-La Padula Model
-
IEEE Computer Society, Washington, DC, USA
-
Bell D.E. Looking Back at the Bell-La Padula Model. Looking Back at the Bell-La Padula Model, in: ACSAC '05: Proceedings of the 21st Annual Computer Security Applications Conference (2005), IEEE Computer Society, Washington, DC, USA 337-351
-
(2005)
Looking Back at the Bell-La Padula Model, in: ACSAC '05: Proceedings of the 21st Annual Computer Security Applications Conference
, pp. 337-351
-
-
Bell, D.E.1
-
29
-
-
39149134452
-
-
D.E. Bell, L.J. LaPadula, Secure Computer Systems: Unified Exposition and Multics Interpretation, Tech. rep., MITRE Corporation (1976).
-
D.E. Bell, L.J. LaPadula, Secure Computer Systems: Unified Exposition and Multics Interpretation, Tech. rep., MITRE Corporation (1976).
-
-
-
-
32
-
-
39149132685
-
-
R.G. Ogier, F.L. Templin, M.G. Lewis, Topology Dissemination Based on Reverse-Path Forwarding (TBRPF), IETF Internet RFC 3684.
-
R.G. Ogier, F.L. Templin, M.G. Lewis, Topology Dissemination Based on Reverse-Path Forwarding (TBRPF), IETF Internet RFC 3684.
-
-
-
-
34
-
-
11244265545
-
Almost Optimal Hash Sequence Traversal
-
InterVarsity Press, Southampton, Bermuda
-
Coppersmith D., and Jakobsson M. Almost Optimal Hash Sequence Traversal. Proceedings of the Finacial Cryptography (2002), InterVarsity Press, Southampton, Bermuda 102-119
-
(2002)
Proceedings of the Finacial Cryptography
, pp. 102-119
-
-
Coppersmith, D.1
Jakobsson, M.2
-
35
-
-
0036352143
-
-
M. Jakobsson, Fractal Hash Sequence Representation and Traversal, in: Proceedings of the IEEE International Symposium on Information Theory (ISIT'02), 2002, pp. 437-444.
-
M. Jakobsson, Fractal Hash Sequence Representation and Traversal, in: Proceedings of the IEEE International Symposium on Information Theory (ISIT'02), 2002, pp. 437-444.
-
-
-
-
36
-
-
84863090748
-
Steiner Tree Problems
-
Hwang F.K., and Richards D.S. Steiner Tree Problems. Networks 22 (1992) 55-89
-
(1992)
Networks
, vol.22
, pp. 55-89
-
-
Hwang, F.K.1
Richards, D.S.2
-
37
-
-
0030263992
-
Efficient Solutions to Multicast Routing in Communication Networks
-
Makki K., Pissinou N., and Frieder O. Efficient Solutions to Multicast Routing in Communication Networks. Mobile Networks and Applications 1 2 (1996) 221-232
-
(1996)
Mobile Networks and Applications
, vol.1
, Issue.2
, pp. 221-232
-
-
Makki, K.1
Pissinou, N.2
Frieder, O.3
|