-
1
-
-
0034777649
-
Intercepting mobile commnnications: The insecurity of 802.11
-
Rome, Italy, July
-
N. Borisov, I. Goldberg, D. Wagner, Intercepting mobile commnnications: the insecurity of 802.11, Seventh Annual International Conference on Mobile Computing and Networking, Rome, Italy, July (2001).
-
(2001)
Seventh Annual International Conference on Mobile Computing and Networking
-
-
Borisov, N.1
Goldberg, I.2
Wagner, D.3
-
2
-
-
0032165431
-
Security at the internet layer
-
R. Oppfiger, Security at the internet layer, Computer 31 (9) (1998) 43-47.
-
(1998)
Computer
, vol.31
, Issue.9
, pp. 43-47
-
-
Oppfiger, R.1
-
3
-
-
7544225344
-
IP AuthemticationHeader
-
S. Kent, R. Atkinson, IP AuthemticationHeader. IETF RFC 2402, 1998.
-
(1998)
IETF RFC
, vol.2402
-
-
Kent, S.1
Atkinson, R.2
-
4
-
-
0003315821
-
IP Encapsulating Security Payload (ESP)
-
S. Kent, R. Atkmsan. IP Encapsulating Security Payload (ESP). IEIF RFC 2406, 1998.
-
(1998)
IEIF RFC
, vol.2406
-
-
Kent, S.1
Atkmsan, R.2
-
5
-
-
0003068282
-
Security architecture for the Internet protocol
-
S. Kent, R. Atkinson. Security Architecture for the Internet Protocol. IETF RFC 2401, 1998.
-
(1998)
IETF RFC
, vol.2401
-
-
Kent, S.1
Atkinson, R.2
-
6
-
-
84962888133
-
Energy impact of secure computation offloading on a handheld device
-
IEEE Computer Society Press, Los Alanritos, CA, November
-
Z. Li, R. Xu, Energy impact of secure computation offloading on a handheld device, IEEE Fifth Annual Workshop on Workload Characterization (WWC-5), IEEE Computer Society Press, Los Alanritos, CA, November 2002.
-
(2002)
IEEE Fifth Annual Workshop on Workload Characterization (WWC-5)
-
-
Li, Z.1
Xu, R.2
-
7
-
-
7544238980
-
The use of HMAC-MD5-36 within ESP and AH
-
November
-
C. Madson, R. Glenn. The Use of HMAC-MD5-36 within ESP and AH. RFC 2403, November, 1998.
-
(1998)
RFC
, vol.2403
-
-
Madson, C.1
Glenn, R.2
-
8
-
-
7544249013
-
The use of HMAC-SHA4-96 within ESP and AH
-
November
-
C. Madson, R. Glenn. The Use of HMAC-SHA4-96 within ESP and AH. RFC 2404, November, 1998.
-
(1998)
RFC
, vol.2404
-
-
Madson, C.1
Glenn, R.2
-
9
-
-
0003272021
-
The Internet Key Exchange (IKE)
-
D. Harkins, D. Carael. The Internet Key Exchange (IKE). RFC 2409.
-
RFC
, vol.2409
-
-
Harkins, D.1
Carael, D.2
-
10
-
-
84983089516
-
The security of cipher block chaining
-
Y. Desmedt (Ed.), Proceedings of Advances in Cryptology (Crypto 94), Springer, Berlin
-
M. Bellare, I. kilian, P. Rogaway, The security of cipher block chaining in: Y. Desmedt (Ed.), Proceedings of Advances in Cryptology (Crypto 94), Lecture Notes in Computer Science 839, Springer, Berlin, 1994.
-
(1994)
Lecture Notes in Computer Science
, vol.839
-
-
Bellare, M.1
Kilian, I.2
Rogaway, P.3
-
13
-
-
0038440906
-
Power control in ad-hoc networks: Theory, architecture, algorithm and implementation of the COMPOW protocol
-
February
-
S. Narayanaswamy, V. Kawadia, R.S. Sreenivas, P.R. Kumar, Power control in ad-hoc networks: theory, architecture, algorithm and implementation of the COMPOW protocol, European Wireless February (2002).
-
(2002)
European Wireless
-
-
Narayanaswamy, S.1
Kawadia, V.2
Sreenivas, R.S.3
Kumar, P.R.4
-
15
-
-
0004141908
-
-
Prentice Hall, Englewood Cliffs, NJ
-
A.S. Tanenbaum, Computer Networks, third ed, Prentice Hall, Englewood Cliffs, NJ, 1996. pp. 588-595.
-
(1996)
Computer Networks, Third Ed
, pp. 588-595
-
-
Tanenbaum, A.S.1
-
16
-
-
0038339251
-
Impact of data compression on energy consumption of wireless-networked handheld devices
-
IEEE Computer Society Press, Los Alamitos, CA, May 19
-
R. Xu, Z. Li, C. Wang, P. Ni, Impact of data compression on energy consumption of wireless-networked handheld devices, Proceedings of the 23rd IEEE International Conference on Distributed Computing Systems (ICDCS'03), IEEE Computer Society Press, Los Alamitos, CA, pp. 302-311, May 19, 2003.
-
(2003)
Proceedings of the 23rd IEEE International Conference on Distributed Computing Systems (ICDCS'03)
, pp. 302-311
-
-
Xu, R.1
Li, Z.2
Wang, C.3
Ni, P.4
-
17
-
-
7544235089
-
-
Chapman & Hall/CRC Press, London/Boca Raton, FL, December
-
S.S. Wagstaff Jr., Cryptanalysis of Number Theoretic Ciphers, Chapman & Hall/CRC Press, London/Boca Raton, FL, December, 2002.
-
(2002)
Cryptanalysis of Number Theoretic Ciphers
-
-
Wagstaff Jr., S.S.1
|