-
2
-
-
0000629443
-
Dynamic source routing in Ad hoc wireless networks
-
T. Imielinski and H. Korth, eds.,Kluwer Academic Publishers, Norwell Mass
-
D.B. Johnson and D.A. Maltz. Dynamic Source Routing in Ad Hoc Wireless Networks. In Mobile Computing, T. Imielinski and H. Korth, eds.,Kluwer Academic Publishers, Norwell Mass., 1996, 153-181
-
(1996)
Mobile Computing
, pp. 153-181
-
-
Johnson, D.B.1
Maltz, D.A.2
-
9
-
-
2642554455
-
Self-organized public-key management for mobile Ad hoc networks
-
June
-
Srdjan Capkun, Levente Buttyan and Jean-Pierre Hubaux, Self-Organized Public-Key Management for Mobile Ad Hoc Networks, Technical report EPFL/IC/200234, June, 2002
-
(2002)
Technical Report
, vol.EPFL-IC-200234
-
-
Capkun, S.1
Buttyan, L.2
Hubaux, J.-P.3
-
10
-
-
4544258751
-
-
http://www-nrg.ee.lbl.gov/ns/
-
-
-
-
11
-
-
4544317411
-
-
http://www.spinnaker.com/crypt/rsaref/
-
-
-
-
12
-
-
0000629443
-
Dynamic source routing in ad hoc wireless networks
-
edited by Tomasz Imielinski and Hank Korth, chapter 5, Kluwer Academic Publichers
-
David Johnson and David A. Maltz. Dynamic source routing in ad hoc wireless networks. In Mobile Computing, edited by Tomasz Imielinski and Hank Korth, chapter 5, pages 153-181. Kluwer Academic Publichers, 1996
-
(1996)
Mobile Computing
, pp. 153-181
-
-
Johnson, D.1
Maltz, D.A.2
-
13
-
-
1342297468
-
Viennot, optimized link state routing protocol
-
Pakistan
-
T. Clausen, P. Jacquet, A. Laouiti, P. Muhlethaler, a. Qayyum et L. Viennot, Optimized Link State Routing Protocol, IEEE INMIC Pakistan 2001.
-
(2001)
IEEE INMIC
-
-
Clausen, T.1
Jacquet, P.2
Laouiti, A.3
Muhlethaler, P.4
Qayyum, A.5
-
14
-
-
7244251119
-
-
draft-ietf-manet-tbrpf-04 (work in progress), January
-
Lewis, M., Templin, F., Bellur, B. and R. Ogier, "Topology Broadcast based on Reverse-Path Forwarding (TBRPF)", draft-ietf-manet-tbrpf-04 (work in progress), January 2002.
-
(2002)
Topology Broadcast Based on Reverse-path Forwarding (TBRPF)
-
-
Lewis, M.1
Templin, F.2
Bellur, B.3
Ogier, R.4
-
16
-
-
0001475595
-
Relying party credentials framework
-
San Francisco, CA, USA, April 8-12, Proceedings
-
A. Herzberg and Y. Mass, Relying Party Credentials Framework, In The Cryptographer's Track at RSA Conference 2001, San Francisco, CA, USA, April 8-12, 2001, Proceedings
-
(2001)
The Cryptographer's Track at RSA Conference 2001
-
-
Herzberg, A.1
Mass, Y.2
-
18
-
-
0003226048
-
The key note trust-management system, Version 2
-
IETF September
-
M. Blaze, J. Feigenbaum, J. Ioannids and A. Keromytis, The Key Note Trust-Management System, Version 2. RFC 2704, IETF September 1999
-
(1999)
RFC
, vol.2704
-
-
Blaze, M.1
Feigenbaum, J.2
Ioannids, J.3
Keromytis, A.4
-
19
-
-
0003495052
-
Overhead in mobile Ad-hoc network protocols
-
INRIA
-
P. Jacquet, L. Viennot, Overhead in Mobile Ad-hoc Network Protocols, TechReport, INRIA, 2000
-
(2000)
TechReport
-
-
Jacquet, P.1
Viennot, L.2
-
20
-
-
0003068282
-
Security architecture for the internet protocol
-
IETF November
-
S. Kent, R. Atkinson, Security Architecture for the Internet Protocol, RFC 2401, IETF November 1998
-
(1998)
RFC
, vol.2401
-
-
Kent, S.1
Atkinson, R.2
-
21
-
-
0343762511
-
S/MIME version 2 message specification
-
IETF March
-
S. Dusse, P. Hoffman, et, al., S/MIME Version 2 Message Specification, RFC 2311, IETF March 1998
-
(1998)
RFC
, vol.2311
-
-
Dusse, S.1
Hoffman, P.2
-
22
-
-
0003286492
-
The TLS version 1.0
-
IETF, January
-
T. Dierks, C. Allen, The TLS version 1.0, RFC 2246, IETF, January 1999
-
(1999)
RFC
, vol.2246
-
-
Dierks, T.1
Allen, C.2
-
24
-
-
0002024864
-
Lexicographic generation of ordered trees
-
S. Zaks, Lexicographic Generation of Ordered Trees, Theoret. Comput. Sci. 10 (1980)63-82
-
(1980)
Theoret. Comput. Sci.
, vol.10
, pp. 63-82
-
-
Zaks, S.1
-
25
-
-
0022094367
-
Generating binary trees using rotations
-
D. Zerling, generating Binary Trees Using Rotations, J. ACM 32 (1985) 694-701
-
(1985)
J. ACM
, vol.32
, pp. 694-701
-
-
Zerling, D.1
-
27
-
-
0003308762
-
Internet X.509 public key infrastructure certificate and CRL profile
-
IETF, January
-
R. Housley, W. Ford, et. al, Internet X.509 Public Key Infrastructure Certificate and CRL Profile, RFC 2459, IETF, January 1999
-
(1999)
RFC
, vol.2459
-
-
Housley, R.1
Ford, W.2
-
28
-
-
0004179384
-
Efficient certificate revocation
-
S. Micali, Efficient Certificate Revocation, Technical Memo MIT/LCS/TM-542b,
-
Technical Memo
, vol.MIT-LCS-TM-542B
-
-
Micali, S.1
-
30
-
-
4544270332
-
Internet X.509 public key infrastructure: Roadmap
-
A. Arsenault, S. Turner, Internet X.509 Public Key Infrastructure: Roadmap, IETF Draft, 2003
-
(2003)
IETF Draft
-
-
Arsenault, A.1
Turner, S.2
-
31
-
-
4544325186
-
Public key infrastructure (PKI) technical specification: Part A - Technical concept of operations
-
September
-
W.E. Burr, Public Key Infrastructure (PKI) technical Specification: Part A - Technical Concept of Operations, Working Draft, September 1998, available at http://csrc.nist.gov/pki/twg/baseline/pkicon20b.PDF
-
(1998)
Working Draft
-
-
Burr, W.E.1
-
32
-
-
0141751849
-
Trust models and management in public-key infrastructures
-
November
-
John Linn, Trust Models and Management in Public-Key Infrastructures, RAS Technical Report, November 2000, available at http://www.rsasecurity.com/ rsalabs/technotes/
-
(2000)
RAS Technical Report
-
-
Linn, J.1
-
33
-
-
0034428960
-
Policy-directed certificate retrieval
-
September
-
Carl A. Gunter and Trevor Jim. Policy-directed certificate retrieval. Software: Practice & Experience, 30(15):1609-1640, September 1999
-
(1999)
Software: Practice & Experience
, vol.30
, Issue.15
, pp. 1609-1640
-
-
Gunter, C.A.1
Jim, T.2
-
34
-
-
0035751908
-
Distributed credential chain discovery in trust management
-
Philadelphia, PA, USA, November
-
N. Li, W. Winsborough, and J. Mitchell, Distributed Credential Chain Discovery in Trust Management, In Proceedings of the 8th ACM Conference on Computer and Communications Security, Philadelphia, PA, USA, November, 2001
-
(2001)
Proceedings of the 8th ACM Conference on Computer and Communications Security
-
-
Li, N.1
Winsborough, W.2
Mitchell, J.3
-
36
-
-
0036957315
-
Ariadne: A secure on-demand routing protocol for Ad hoc networks
-
September
-
Y. Hu, A. Perrig, D. B. Johnson. Ariadne: A secure On-Demand Routing Protocol for Ad hoc Networks, MobiCom 2002, September 2002
-
(2002)
MobiCom 2002
-
-
Hu, Y.1
Perrig, A.2
Johnson, D.B.3
-
37
-
-
0003456435
-
Secure Ad hoc on-demand distance vector (SAODV) routing
-
August
-
M. G. Zapata. Secure Ad hoc On-Demand Distance Vector (SAODV) Routing IETF draft-guerrero-manet-saodv-00.txt, August 2002
-
(2002)
IETF Draft-guerrero-manet-saodv-00.txt
-
-
Zapata, M.G.1
|