-
1
-
-
85031307530
-
Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers
-
Perkins C, Bhagwat P. Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers. ACM SIGCOMM Computer Communication Review 1994; 24(4):234-244.
-
(1994)
ACM SIGCOMM Computer Communication Review
, vol.24
, Issue.4
, pp. 234-244
-
-
Perkins, C.1
Bhagwat, P.2
-
3
-
-
0001341422
-
DSR: The dynamic source routing protocol for multi-hop wireless ad hoc networks
-
Johnson D, Maltz D, Broch J et al. DSR: The dynamic source routing protocol for multi-hop wireless ad hoc networks. Ad hoc Networking 2001; 5:139-172.
-
(2001)
Ad Hoc Networking
, vol.5
, pp. 139-172
-
-
Johnson, D.1
Maltz, D.2
Broch, J.3
-
4
-
-
11244252132
-
Denial of service resilience in ad hoc networks
-
Philadelphia, PA, September
-
Aad I, Hubaux JP, Knightly E. Denial of service resilience in ad hoc networks. Proceedings of ACM MobiCom, Philadelphia, PA, September 2004.
-
(2004)
Proceedings of ACM MobiCom
-
-
Aad, I.1
Hubaux, J.P.2
Knightly, E.3
-
6
-
-
17444426121
-
Ariadne: A secure on-demand routing protocol for ad hoc networks
-
Hu Y, Perrig A, Johnson D. Ariadne: A secure on-demand routing protocol for ad hoc networks. Wireless Networks 2005; 11(1):21-38.
-
(2005)
Wireless Networks
, vol.11
, Issue.1
, pp. 21-38
-
-
Hu, Y.1
Perrig, A.2
Johnson, D.3
-
8
-
-
11244269535
-
SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks
-
Hu Y, Johnson D, Perrig A. SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks. Ad Hoc Networks 2003; I:175-192.
-
(2003)
Ad Hoc Networks
, vol.1
, pp. 175-192
-
-
Hu, Y.1
Johnson, D.2
Perrig, A.3
-
9
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
ACM: New York, NY, U.S.A.
-
Marti S, Giuli T, Lai K, Baker M. Mitigating routing misbehavior in mobile ad hoc networks. Proceedings of the 6th Annual International Conference on Mobile Computing and Networking. ACM: New York, NY, U.S.A., 2000; 255-265.
-
(2000)
Proceedings of the 6th Annual International Conference on Mobile Computing and Networking
, pp. 255-265
-
-
Marti, S.1
Giuli, T.2
Lai, K.3
Baker, M.4
-
10
-
-
5044238739
-
CORE: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks
-
Portoroz, Slovenia, 22 September
-
Michiardi P, Molva R. CORE: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. CMS'2002, Communication and Multimedia Security 2002 Conference, Portoroz, Slovenia, 22 September 2002.
-
(2002)
CMS'2002, Communication and Multimedia Security 2002 Conference
-
-
Michiardi, P.1
Molva, R.2
-
13
-
-
24344494903
-
AMTP: A multipath multimedia streaming protocol for mobile ad hoc networks
-
Rojviboonchai K, Yang F, Zhang Q, Aida H, Zhu W. AMTP: A multipath multimedia streaming protocol for mobile ad hoc networks. Proceedings of IEEE International Conference on Communications (ICC) 2005; 2:1246-1250.
-
(2005)
Proceedings of IEEE International Conference on Communications(ICC)
, Issue.2
, pp. 1246-1250
-
-
Rojviboonchai, K.1
Yang, F.2
Zhang, Q.3
Aida, H.4
Zhu, W.5
-
14
-
-
34548337322
-
Disjoint multipath routing to two distinct drains in a multi-drain sensor network
-
Anchorage, Alaska, May
-
Thulasiraman P, Ramasubramanian S, Krunz M. Disjoint multipath routing to two distinct drains in a multi-drain sensor network. Proceedings of IEEE International Conference on Computer Communications (INFOCOM), Anchorage, Alaska, May 2007; 643-651.
-
(2007)
Proceedings of IEEE International Conference on Computer Communications (INFOCOM)
, pp. 643-651
-
-
Thulasiraman, P.1
Ramasubramanian, S.2
Krunz, M.3
-
15
-
-
62449095689
-
Directional node-disjoint multipath routing in wireless ad hoc networks
-
Cambridge, MA, November
-
Saha A, Ur Rehman S, Park G-L, Lee J. Directional node-disjoint multipath routing in wireless ad hoc networks. Proceedings of the 19th IASTED International Conference on Parallel and Distributed Computing and Networks, Cambridge, MA, November 2007.
-
(2007)
Proceedings of the 19th IASTED International Conference on Parallel and Distributed Computing and Networks
-
-
Saha, A.1
Ur Rehman, S.2
Park, G.-L.3
Lee, J.4
-
16
-
-
43449139418
-
Robust multi-path zone routing protocol for video transport over reconfigurable wireless networks
-
Wu Z, Sun Y, Wu J, Ye S. Robust multi-path zone routing protocol for video transport over reconfigurable wireless networks. Signal Processing Systems 2008; 51(2):183-194.
-
(2008)
Signal Processing Systems
, vol.51
, Issue.2
, pp. 183-194
-
-
Wu, Z.1
Sun, Y.2
Wu, J.3
Ye, S.4
-
18
-
-
0036286842
-
Video transport over ad-hoc networks using multiple paths
-
Lin S, Wang Y, Mao S, Panwar S. Video transport over ad-hoc networks using multiple paths. IEEE International Symposium on Circuits and Systems, Citeseer, 2002.
-
(2002)
IEEE International Symposium on Circuits and Systems, Citeseer
-
-
Lin, S.1
Wang, Y.2
Mao, S.3
Panwar, S.4
-
22
-
-
0242426103
-
The tesla broadcast authentication protocol
-
Perrig A, Canetti R, Tygar D, Song D. The tesla broadcast authentication protocol. Cryptobytes 2002; 5-2:2-13.
-
(2002)
Cryptobytes
, vol.5
, Issue.2
, pp. 2-13
-
-
Perrig, A.1
Canetti, R.2
Tygar, D.3
Song, D.4
-
24
-
-
0019634370
-
Password authentication with insecure communication
-
Lamport L. Password authentication with insecure communication. Communications of the ACM 1981; 24(11):770-772.
-
(1981)
Communications of the ACM
, vol.24
, Issue.11
, pp. 770-772
-
-
Lamport, L.1
-
25
-
-
0018545449
-
How to share a secret
-
Shamir A. How to share a secret. Communications of the ACM 1979; 22(11):612-613.
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
26
-
-
84947931331
-
Some recent research aspects of threshold cryptography
-
Mambo M, Okamoto E, Davida E eds. Springer: Berlin
-
Desmedt Y. Some recent research aspects of threshold cryptography. Information Security, First International Workshop ISW '97 (Lecture Notes in Computer Science, vol.1196), Mambo M, Okamoto E, Davida E (eds.). Springer: Berlin, 1997; 158-173.
-
(1997)
Information Security, First International Workshop ISW '97 (Lecture Notes in Computer Science
, vol.1196
, pp. 158-173
-
-
Desmedt, Y.1
-
28
-
-
84957626176
-
-
Springer: Berlin
-
Herzberg A, Jarecki S, Krawczyk H, Yung M. Proactive Secret Sharing or: How to Cope with Perpetual Leakage (Lecture Notes in Computer Science, vol.963). Springer: Berlin, 1995; 339-352.
-
(1995)
Proactive Secret Sharing Or: How to Cope with Perpetual Leakage (Lecture Notes in Computer Science
, vol.963
, pp. 339-352
-
-
Herzberg, A.1
Jarecki, S.2
Krawczyk, H.3
Yung, M.4
-
30
-
-
4544314577
-
Admission control in peer-to-peer: Design and performance evaluation. SASN '03
-
ACM Press: New York, NY, U.S.A.
-
Saxena N, Tsudik G, Yi JH. Admission control in peer-to-peer: Design and performance evaluation. SASN '03: Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks. ACM Press: New York, NY, U.S.A., 2003; 104-113.
-
(2003)
Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks
, pp. 104-113
-
-
Saxena, N.1
Tsudik, G.2
Yi, J.H.3
-
31
-
-
38649102081
-
Performance of symmetric ciphers and one-way hash functions
-
Springer: London, U.K.
-
Roe M. Performance of symmetric ciphers and one-way hash functions. Fast Software Encryption, Cambridge Security Workshop. Springer: London, U.K., 1994; 83-89.
-
(1994)
Fast Software Encryption, Cambridge Security Workshop
, pp. 83-89
-
-
Roe, M.1
-
32
-
-
0035249889
-
Performance comparison of two on-demand routing protocols for adhoc networks
-
Perkins C, Royer E, Das S, Marina M. Performance comparison of two on-demand routing protocols for adhoc networks. IEEE [see also IEEE Wireless Communications] Personal Communications 2001; 8(1):16-28.
-
(2001)
IEEE [See Also IEEE Wireless Communications] Personal Communications
, vol.8
, Issue.1
, pp. 16-28
-
-
Perkins, C.1
Royer, E.2
Das, S.3
Marina, M.4
|