-
1
-
-
33847220514
-
-
David B. Johnson, David A. Malte, Yih-Chun Hu, and Jorjeta G, Jeteheva, The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks (DSR), IETF Mobile Ad Hoc Networks Working Group, Internet Draft, in work in progress, http://www.ietf.org/internet-drafts/draft-ietf-manet-dsr-09. txt, 15 April 2003.
-
David B. Johnson, David A. Malte, Yih-Chun Hu, and Jorjeta G, Jeteheva, "The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks (DSR)," IETF Mobile Ad Hoc Networks Working Group, Internet Draft, in work in progress, http://www.ietf.org/internet-drafts/draft-ietf-manet-dsr-09. txt, 15 April 2003.
-
-
-
-
2
-
-
84968616624
-
Optimized Link State Routing Protocol for Ad Hoc Networks
-
P. Jacquet, P. Muhlethaler, T. Clausen, A. Laouiti, A. Qayyum and L. Viennot, "Optimized Link State Routing Protocol for Ad Hoc Networks," Proceedings IEEE Int'l Multi Topic Conf., 2007, IEEE Press, pp. 62-68, 2001.
-
(2001)
Proceedings IEEE Int'l Multi Topic Conf., 2007, IEEE Press
, pp. 62-68
-
-
Jacquet, P.1
Muhlethaler, P.2
Clausen, T.3
Laouiti, A.4
Qayyum, A.5
Viennot, L.6
-
3
-
-
10744229755
-
Routing and Security in Mobile Ad Hoc Networks
-
February
-
Nikola Milanovic, Miroslaw Malek, Anthony Davidson and Veljko Milutinovic, "Routing and Security in Mobile Ad Hoc Networks," IEEE Computer, Vol. 37, No. 2, pp. 61-65, February 2004.
-
(2004)
IEEE Computer
, vol.37
, Issue.2
, pp. 61-65
-
-
Milanovic, N.1
Malek, M.2
Davidson, A.3
Milutinovic, V.4
-
4
-
-
0033357103
-
Securing Ad Hoc Networks
-
L. Zhou, and Z. J. Haas, "Securing Ad Hoc Networks," IEEE Network Journalz, Vol. 13, No. 6, pp. 24-30, 1999.
-
(1999)
IEEE Network Journalz
, vol.13
, Issue.6
, pp. 24-30
-
-
Zhou, L.1
Haas, Z.J.2
-
6
-
-
0035704362
-
Providing Robust and Ubiquitous Security Support for Mobile Ad-Hoc Networks
-
Jiejun Kong, Petros Zerfos, Haiyun Luo, Songwu Lu and Lixia Zhang, "Providing Robust and Ubiquitous Security Support for Mobile Ad-Hoc Networks," Proceedings of the IEEE 9th International Conference on Network Protocols (ICNP'01), IEEE Computer Society, pp. 251, 2001.
-
(2001)
Proceedings of the IEEE 9th International Conference on Network Protocols (ICNP'01), IEEE Computer Society
, pp. 251
-
-
Kong, J.1
Zerfos, P.2
Luo, H.3
Lu, S.4
Zhang, L.5
-
7
-
-
3042546547
-
-
H. Deng, A. Mukherjee, and D.P. Agrawal, Threshold and Identity-based Key Management and Authentication for Wireless Ad Hoc Networks, Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), IEEE Computer Society, 1, No. 1, pp. 107-111, January 2004.
-
H. Deng, A. Mukherjee, and D.P. Agrawal, "Threshold and Identity-based Key Management and Authentication for Wireless Ad Hoc Networks," Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), IEEE Computer Society, Vol. 1, No. 1, pp. 107-111, January 2004.
-
-
-
-
8
-
-
0242678584
-
Self-Organized Public-Key Management for Mobile Ad Hoc Networks
-
January-March
-
S. Capkun, L. Buttyan, and J. P. Hubaux, "Self-Organized Public-Key Management for Mobile Ad Hoc Networks," IEEE Trans. Mobile Computing, Vol. 2, No. 1, pp. 52-64, January-March 2003.
-
(2003)
IEEE Trans. Mobile Computing
, vol.2
, Issue.1
, pp. 52-64
-
-
Capkun, S.1
Buttyan, L.2
Hubaux, J.P.3
-
9
-
-
85020598353
-
-
A. Shamir, Identity-based cryptosystems and signature schemes, in Advances in Cryptology - Crypto '84, Lecture Notes in Computer Science 196, Springer, pp. 47-53, Springer-Verlag, 1984.
-
A. Shamir, "Identity-based cryptosystems and signature schemes," in Advances in Cryptology - Crypto '84, Lecture Notes in Computer Science 196, Springer, pp. 47-53, Springer-Verlag, 1984.
-
-
-
-
10
-
-
4544385042
-
An Authenticated Broadcasting Scheme for Wireless Ad Hoc Network
-
May 19-21
-
M. Bohio, and A. Miri, "An Authenticated Broadcasting Scheme for Wireless Ad Hoc Network," Proceedings of the Second Annual Conference on Communication Networks and Services Research (CNSR '04), IEEE Computer Society, pp. 69-74, May 19-21, 2004.
-
(2004)
Proceedings of the Second Annual Conference on Communication Networks and Services Research (CNSR '04), IEEE Computer Society
, pp. 69-74
-
-
Bohio, M.1
Miri, A.2
-
11
-
-
84943807207
-
Toward Secure Key Distribution in Truly Ad Hoc Networks
-
A. Khalili, J. Katz, and W. Arbaugh, "Toward Secure Key Distribution in Truly Ad Hoc Networks," 2003 Symposium on Applications and the Internet Workshop (SAINT 2003), IEEE Computer Society, pp. 342-346, 2003.
-
(2003)
2003 Symposium on Applications and the Internet Workshop (SAINT 2003), IEEE Computer Society
, pp. 342-346
-
-
Khalili, A.1
Katz, J.2
Arbaugh, W.3
-
12
-
-
33847228157
-
Models of Authentications in Ad Hoc Networks and their Related Network Properties
-
K. Hoeper, and G. Gong, "Models of Authentications in Ad Hoc Networks and their Related Network Properties," International Association for Cryptologic Research, http://www.iacr.org/, 2004.
-
(2004)
International Association for Cryptologic Research
-
-
Hoeper, K.1
Gong, G.2
-
13
-
-
84964242030
-
Key Distribution Systems Based on Identification Information
-
Springer
-
E. Okamoto, "Key Distribution Systems Based on Identification Information," Advances in Cryptology -Crypto '87, pp. 194-202, Springer, 1987.
-
(1987)
Advances in Cryptology -Crypto '87
, pp. 194-202
-
-
Okamoto, E.1
-
14
-
-
0017930809
-
A Method for Obtaining Digital Signatures and Public-Key Cryptosystems
-
R. L. Rivest, A. Shamir, and L. Adelman, "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems," Comm. of ACM, Vol. 21, No. 2, pp. 120-126, 1978.
-
(1978)
Comm. of ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adelman, L.3
|