-
1
-
-
84937579774
-
The oracle diffiehellman assumptions and an analysis of DHIES
-
Springer-Verlag
-
M. Abdalla, M. Bellare, and P. Rogaway. The oracle diffiehellman assumptions and an analysis of DHIES. In Topic in Cryptology–CR-RSA’01, volume 2020 of Lecture Notes in Computer Science, pages 143–158. Springer-Verlag, 2001.
-
(2001)
Topic in Cryptology–CR-RSA’01, Volume 2020 of Lecture Notes in Computer Science
, pp. 143-158
-
-
Abdalla, M.1
Bellare, M.2
Rogaway, P.3
-
9
-
-
0003597249
-
Wormhole detection in wireless ad hoc networks
-
Rice University, Dec.
-
Y.-C. Hu, A. Perrig, and D. B. Johnson. Wormhole detection in wireless ad hoc networks. Technical Report TR01-384, Department of Computer Science, Rice University, Dec. 2001.
-
(2001)
Technical Report TR01-384, Department of Computer Science
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
11
-
-
0003735739
-
The Elliptic Curve Digital Signature Algorithm (ECDSA)
-
University of Waterloo, Canada, Aug. Updated: 2000/02/24
-
D. Johnson and A. Menezes. The Elliptic Curve Digital Signature Algorithm (ECDSA). Technical report CORR 99-34, Dept. of C&O, University of Waterloo, Canada, Aug. 1999. Updated: 2000/02/24.
-
(1999)
Technical Report CORR 99-34, Dept. Of C&O
-
-
Johnson, D.1
Menezes, A.2
-
12
-
-
0003597247
-
-
Internet draft, IETF MANET Working Group, Apr. draft-ietf-manet-dsr-09.txt, Work in Progress
-
D. B. Johnson, D. A. Maltz, and Y.-C. Hu. The dynamic source routing protocol for mobile ad hoc networks (DSR). Internet draft, IETF MANET Working Group, Apr. 2003. draft-ietf-manet-dsr-09.txt, Work in Progress.
-
(2003)
The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks (DSR)
-
-
Johnson, D.B.1
Maltz, D.A.2
Hu, Y.-C.3
-
15
-
-
0003557429
-
Key establishment in large dynamic groups using one-way function trees
-
Glenwood, MD, USA, May
-
D. McGrew and A. Sherman. Key establishment in large dynamic groups using one-way function trees. Technical Report 755, TIS Labs at Network Associates, Glenwood, MD, USA, May 1998.
-
(1998)
Technical Report 755, TIS Labs at Network Associates
-
-
McGrew, D.1
Sherman, A.2
-
19
-
-
0034771605
-
Spins: Security protocols for sensor networks
-
ACM Press
-
A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. D. Tygar. SPINS: Security protocols for sensor networks. In Proceedings of the 7th Annual International Conference on Mobile Computing and Networks (Mobicom’01). ACM Press, 2001.
-
(2001)
Proceedings of the 7th Annual International Conference on Mobile Computing and Networks (Mobicom’01)
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, J.D.5
-
20
-
-
0034229951
-
Picoradio supports ad hoc ultra-low power wireless networking
-
July
-
J. Rabaey, J. Ammer, J. da Silva, D. Patel, and S. Roundy. Picoradio supports ad hoc ultra-low power wireless networking. IEEE Computer Magazine, July 2000.
-
(2000)
IEEE Computer Magazine
-
-
Rabaey, J.1
Ammer, J.2
da Silva, J.3
Patel, D.4
Roundy, S.5
-
21
-
-
84867480504
-
EHBT: An efficient protocol for group key management
-
Springer-Verlag
-
S. Rafaeli, L. Mathy, and D. Hutchison. EHBT: An efficient protocol for group key management. In Proceedings of the Third International COST264 Workshop (NGC 2001), volume 2233 of Lecture Notes in Computer Science, pages 159–171. Springer-Verlag, 2001.
-
(2001)
Proceedings of the Third International COST264 Workshop (NGC 2001), Volume 2233 of Lecture Notes in Computer Science
, pp. 159-171
-
-
Rafaeli, S.1
Mathy, L.2
Hutchison, D.3
-
24
-
-
0002474948
-
Performance comparison of public-key cryptosystems
-
M. J. Wiener. Performance comparison of public-key cryptosystems. RSA Laboratories’ CryptoBytes, 4(1):1+3–5, 1998.
-
(1998)
RSA Laboratories’ CryptoBytes
, vol.4
, Issue.1
-
-
Wiener, M.J.1
|