-
3
-
-
0033357103
-
Securing Ad Hoc Networks
-
L. Zhou and Z. J. Haas, "Securing Ad Hoc Networks", IEEE Networks, Volume 13, Issue 6, 1999.
-
(1999)
IEEE Networks
, vol.13
, Issue.6
-
-
Zhou, L.1
Haas, Z.J.2
-
4
-
-
0008144151
-
Ubiquitous and Robust Authentication Services for Ad Hoc Wireless Networks
-
Technical Report 200030, UCLA Computer Science Department
-
H. Luo and S. Lu, "Ubiquitous and Robust Authentication Services for Ad Hoc Wireless Networks", Technical Report 200030, UCLA Computer Science Department,2000.
-
(2000)
-
-
Luo, H.1
Lu, S.2
-
5
-
-
1842643245
-
Providing Robust and Ubiquitous Security Support for Mobile Ad-Hoc Networks
-
J. Kong, P. Zerfos, H. Luo, S. Lu and L. Zhang, " Providing Robust and Ubiquitous Security Support for Mobile Ad-Hoc Networks", IEEE ICNP,2001.
-
(2001)
IEEE ICNP
-
-
Kong, J.1
Zerfos, P.2
Luo, H.3
Lu, S.4
Zhang, L.5
-
6
-
-
10644296109
-
Self-securing Ad Hoc Wireless Networks
-
H. Luo, P. Zerfos, J. Kong, S. Lu and L. Zhang, "Self-securing Ad Hoc Wireless Networks", IEEE ISCC,2002.
-
(2002)
IEEE ISCC
-
-
Luo, H.1
Zerfos, P.2
Kong, J.3
Lu, S.4
Zhang, L.5
-
8
-
-
8344229909
-
A Cluster-Based Security Architecture for Ad Hoc Networks
-
M. Bechler., H.-J. Hof, D. Kraft, F. Pahlke, L. Wolf, "A Cluster-Based Security Architecture for Ad Hoc Networks", IEEE INFOCOM,2004.
-
(2004)
IEEE INFOCOM
-
-
Bechler, M.1
Hof, H.-J.2
Kraft, D.3
Pahlke, F.4
Wolf, L.5
-
10
-
-
33751044073
-
Talking To Strangers: Authentication in Ad-Hoc Wireless Networks
-
D. Balfanz, D. K. Smetters, P. Stewart and H. Chi Wong, "Talking To Strangers: Authentication in Ad-Hoc Wireless Networks", Internet Society, Conference Proceeding ofNDSS Conference,2002.
-
(2002)
Internet Society, Conference Proceeding ofNDSS Conference
-
-
Balfanz, D.1
Smetters, D.K.2
Stewart, P.3
Chi Wong, H.4
-
12
-
-
3142739563
-
An Architecture for Key management in Hierarchical Mobile Ad-hoc Networks
-
Kyung Hyune Rhee, Young Ho Park, and Gene Tsudik, "An Architecture for Key management in Hierarchical Mobile Ad-hoc Networks", Journal Of Communications And Networks, VOL. 6, NO. 2, 2004.
-
(2004)
Journal Of Communications And Networks
, vol.6
, Issue.2
-
-
Hyune Rhee, K.1
Young, H.2
Tsudik, G.3
-
13
-
-
0012797660
-
WCA: A Weighted Clustering Algorithm for Mobile Ad Hoc Networks
-
Mainak Chatterjee, Sajal k. Das and Damla Turgut, " WCA: A Weighted Clustering Algorithm for Mobile Ad Hoc Networks", Cluster Computing 5, pp 193-204, 2002.
-
(2002)
Cluster Computing
, vol.5
, pp. 193-204
-
-
Chatterjee, M.1
Das, S.K.2
Turgut, D.3
-
14
-
-
0036705593
-
An efficient distributed clustering scheme for ad hoc wireless network
-
Chyi-Ren DOW, Jyh-Hotng LIN, "An efficient distributed clustering scheme for ad hoc wireless network", IEICI Trans COMMUN, Vol.E85-B, pp 1561-1571, 2002.
-
(2002)
IEICI Trans COMMUN
, vol.E85-B
, pp. 1561-1571
-
-
Chyi-Ren, D.O.W.1
Jyh-Hotng, L.I.N.2
-
15
-
-
47349103480
-
-
Haas, Z.J., Pearlman, M.R. and Samar, P, Zone Routing Protocol(ZRP), IETF Internet Draft, draft-ietf-manet-zrp-04.txt, July 2002.
-
Haas, Z.J., Pearlman, M.R. and Samar, P, " Zone Routing Protocol(ZRP)", IETF Internet Draft, draft-ietf-manet-zrp-04.txt, July 2002.
-
-
-
-
16
-
-
0003582409
-
-
IETF Internet Draft, draftietf-manet-cbrp-spec-00.txt, August
-
Mingliang Jiang, Jinyang Li, Yong Chiang Tay, "Cluster Based Routing Protocol(CBRP) Functional Specification", IETF Internet Draft, draftietf-manet-cbrp-spec-00.txt, August 1998.
-
(1998)
Cluster Based Routing Protocol(CBRP) Functional Specification
-
-
Jiang, M.1
Li, J.2
Yong, C.3
|