-
1
-
-
37049001818
-
Scalable and deterministic key agreement for large scale networks
-
DOI 10.1109/TWC.2007.06088
-
Y. Zhou and Y. Fang "Scalable and deterministic key agreement for large scale networks" IEEE Trans. Wireless Commun., vol. 6, no. 12, pp. 4366-4373, Dec. 2007. (Pubitemid 350249473)
-
(2007)
IEEE Transactions on Wireless Communications
, vol.6
, Issue.12
, pp. 4366-4373
-
-
Zhou, Y.1
Fang, Y.2
-
2
-
-
9544227378
-
An efficient quality of service routing algorithm for delay-sensitive applications
-
and
-
W. Liu W. Lou and Y. Fang "An efficient quality of service routing algorithm for delay-sensitive applications" Computer Networks, vol. 47, no. 11, pp. 6187-104, 2005.
-
(2005)
Computer Networks
, vol.47
, Issue.11
, pp. 6187-104
-
-
Liu, W.1
Lou, W.2
Fang, Y.3
-
3
-
-
37549009866
-
Distributed algorithms for secure multipath routing in attack-resistant networks
-
Dec
-
P. P. C. Lee V. Misra D. Rubenstein "Distributed algorithms for secure multipath routing in attack-resistant networks" IEEE/ACM Trans. Networking, vol. 15, no. 6, pp. 1490-1501, Dec. 2007.
-
(2007)
IEEE/ACM Trans. Networking
, vol.15
, Issue.6
, pp. 1490-1501
-
-
Lee, P.P.C.1
Misra, V.2
Rubenstein, D.3
-
4
-
-
84868943211
-
Routing with Byzantine robustness
-
[Online]. Available:, pdf, Sept
-
R. Perlman "Routing with Byzantine robustness" Report no: TR-2005-146 [Online]. Available: http://research.sun.com/techrep/2005/smli-tr- 2005-146.pdf, Sept. 2005.
-
(2005)
Report no: TR-2005-146
-
-
Perlman, R.1
-
5
-
-
0004024262
-
Ad hoc on-demand distance vector routing
-
and, Addison-Wesley Chapt 5
-
C. E. Perkins and E. M. Royer "Ad hoc on-demand distance vector routing" Ad Hoc Networking Chapt. 5. Addison-Wesley, 2001.
-
(2001)
Ad Hoc Networking
-
-
Perkins, C.E.1
Royer, E.M.2
-
6
-
-
0035249889
-
Performance comparison of two on-demand routing protocols for ad hoc networks
-
and, Feb
-
C. E. Perkins E. M. Royers and S. R. Das "Performance comparison of two on-demand routing protocols for ad hoc networks "IEEE Personal Commun., vol. 8, no. 1, p. 16-28, Feb. 2001.
-
(2001)
IEEE Personal Commun
, vol.8
, Issue.1
, pp. 16-28
-
-
Perkins, C.E.1
Royers, E.M.2
Das, S.R.3
-
10
-
-
15244339622
-
Authenticated routing for ad hoc networks
-
and, Mar
-
K. Sanzgiri B. Dahill B. N. Levine C. Shields and E. Belding-Royer "Authenticated routing for ad hoc networks" IEEE J. Select. Areas Commun., vol. 2, no. 1, Mar. 2005.
-
(2005)
IEEE J. Select. Areas Commun.
, vol.2
, Issue.1
-
-
Sanzgiri, K.1
Dahill, B.2
Levine, B.N.3
Shields, C.4
Belding-Royer, E.5
-
14
-
-
0242678584
-
Self-organized public-key management for mobile ad hoc networks
-
and, Jan./Mar
-
S. Capkun L. Buttyan and J. Hubaux "Self-organized public-key management for mobile ad hoc networks" IEEE Trans. Mobile Computing, vol. 2, no. 1, pp. 1-13, Jan./Mar. 2003.
-
(2003)
IEEE Trans. Mobile Computing
, vol.2
, Issue.1
, pp. 1-13
-
-
Capkun, S.1
Buttyan, L.2
Hubaux, J.3
-
15
-
-
37549056154
-
Energy and bandwidth-efficient key distribution in wireless ad hoc networks: a cross-layer approach
-
and, Dec
-
J. Salido L. Lazos and R. Poovendran "Energy and bandwidth-efficient key distribution in wireless ad hoc networks: a cross-layer approach" IEEE/ACM Trans. Networking, vol. 15, no. 6, pp. 1527-1540, Dec. 2007.
-
(2007)
IEEE/ACM Trans. Networking
, vol.15
, Issue.6
, pp. 1527-1540
-
-
Salido, J.1
Lazos, L.2
Poovendran, R.3
-
16
-
-
2942656255
-
Secure routing in wireless sensor networks: attacks and countermeasures
-
and
-
C. Karlof and D. Wagner "Secure routing in wireless sensor networks: attacks and countermeasures" Ad Hoc Networks, pp. 293-315, vol. 1, 2003.
-
(2003)
Ad Hoc Networks
, vol.1
, pp. 293-315
-
-
Karlof, C.1
Wagner, D.2
-
17
-
-
18144393441
-
Using feedback in collaborative reinforcement learning to adaptively optimize MANET routing
-
and, May
-
J. Dowling E. Curran R. Cunningham and V. Cahil "Using feedback in collaborative reinforcement learning to adaptively optimize MANET routing" IEEE Trans. SMC, Part A: Systems Humans, pp. 360-372, vol. 35, no. 3, May 2005.
-
(2005)
IEEE Trans. SMC, Part A: Systems Humans
, vol.35
, Issue.3
, pp. 360-372
-
-
Dowling, J.1
Curran, E.2
Cunningham, R.3
Cahil, V.4
-
20
-
-
21644472211
-
-
ns-2 [Online]. Available
-
The Network Simulator ns-2 [Online]. Available: http://www.isi.edu/nsnam/ ns/.
-
The Network Simulator
-
-
-
21
-
-
84888068366
-
Two implementation methods of a 1024-bit RSA cryptoprocessor based on modified Montgomery algorithm
-
and, in, May
-
T.-W. Kwon C.-S. You W.-S. Heo Y.-K. Kang and J.-R. Choi "Two implementation methods of a 1024-bit RSA cryptoprocessor based on modified Montgomery algorithm" in Proc. 2001 IEEE Int. Symp. Circuits Systems (ISCAS'01), vol. 4, pp. 650-653, May 2001.
-
(2001)
Proc. 2001 IEEE Int. Symp. Circuits Systems (ISCAS'01)
, vol.4
, pp. 650-653
-
-
Kwon, T.-W.1
You, C.-S.2
Heo, W.-S.3
Kang, Y.-K.4
Choi, J.-R.5
-
22
-
-
34547505939
-
Ad hoc network security: a review
-
and, Aug
-
C. Zhang M. C. Zhou and M. Yu "Ad hoc network security: a review" Int. J. Commun. Syst., vol. 20, no. 8, pp. 909-925, Aug. 2007.
-
(2007)
Int. J. Commun. Syst.
, vol.20
, Issue.8
, pp. 909-925
-
-
Zhang, C.1
Zhou, M.C.2
Yu, M.3
-
23
-
-
33847273536
-
A new secure routing protocol to defend byzantine attacks for ad hoc networks
-
DOI 10.1109/ICON.2005.1635686, 1635686, 2005 13th IEEE International Conference on Networks jointly held with the 2005 7th IEEE Malaysia International Conference on Communications, Proceedings
-
M. Yu S. Kulkarni and P. Lau "A new secure routing protocol to defend Byzantine attacks for ad hoc networks" in Proc. IEEE Int. Conf. Networks (ICON'05), vol. 2, pp. 1126-1131, Nov. 2005, Kuala Lumpur, Malaysia. (Pubitemid 46314845)
-
(2005)
2005 13th IEEE International Conference on Networks jointly held with the 2005 7th IEEE Malaysia International Conference on Communications, Proceedings
, vol.2
, pp. 1126-1131
-
-
Yu, M.1
Kulkarni, S.2
Lau, P.3
-
24
-
-
41849085232
-
A distributed radio channel allocation scheme for WLANs with multiple data rates
-
and, Mar
-
M. Yu A. Malvankar and W. Su "A distributed radio channel allocation scheme for WLANs with multiple data rates" IEEE Trans. Commun., vol. 56, no. 3, Mar. 2008.
-
(2008)
IEEE Trans. Commun.
, vol.56
, Issue.3
-
-
Yu, M.1
Malvankar, A.2
Su, W.3
-
25
-
-
1842478856
-
Distributed Bayesian algorithms for fault-tolerant event region detection in wireless sensor networks
-
and, Mar
-
B. Krishnamachari and S. Iyengar "Distributed Bayesian algorithms for fault-tolerant event region detection in wireless sensor networks" IEEE Trans. Computers, vol. 53, no. 3, pp. 241-250, Mar. 2004.
-
(2004)
IEEE Trans. Computers
, vol.53
, Issue.3
, pp. 241-250
-
-
Krishnamachari, B.1
Iyengar, S.2
-
27
-
-
0037623983
-
Identity based encryption from the Weil pairing
-
and
-
D. Boneh and M. Franklin "Identity based encryption from the Weil pairing" SIAM J. Computing, vol. 32, no. 3, pp. 586-615, 2003.
-
(2003)
SIAM J. Computing
, vol.32
, Issue.3
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.2
-
28
-
-
15244347963
-
A compilation framework for power and energy management on mobile computers
-
and, DCS-TR-446, Rutgers University, June
-
U. Kremer J. Hicks and J. M. Rehg "A compilation framework for power and energy management on mobile computers" Dept. CS Technical Report, DCS-TR-446, Rutgers University, June 2001.
-
(2001)
Dept. CS Technical Report
-
-
Kremer, U.1
Hicks, J.2
Rehg, J.M.3
|