-
1
-
-
0014814325
-
Space or time tradeoffs in hash coding with allowable error
-
Bloom, B. (1970) 'Space or time tradeoffs in hash coding with allowable error', Communications of the ACM, Vol. 13, No. 7, pp.422-426.
-
(1970)
Communications of the ACM
, vol.13
, Issue.7
, pp. 422-426
-
-
Bloom, B.1
-
2
-
-
70450232823
-
Network applications of bloom filters: A survey
-
Broder, A. and Mitzen, M. (2005) 'Network applications of bloom filters: a survey', Internet Mathematics, Vol. 1, No. 4, pp.485-509.
-
(2005)
Internet Mathematics
, vol.1
, Issue.4
, pp. 485-509
-
-
Broder, A.1
Mitzen, M.2
-
3
-
-
0022145479
-
Security without identification transaction systems to make big brother obsolete
-
Chaum, D. (1985) 'Security without identification transaction systems to make big brother obsolete', Communication of the ACM, Vol. 28, No. 10, pp.1030-1044.
-
(1985)
Communication of the ACM
, vol.28
, Issue.10
, pp. 1030-1044
-
-
Chaum, D.1
-
4
-
-
77949784096
-
A secure anonymous on demand routing protocol in ad hoc
-
Chen, J., Cui, G., Hong, L. and Fu, C. (2007a) 'A secure anonymous on demand routing protocol in ad hoc', Computer Science, Vol. 34, No. 1, pp.29-33.
-
(2007)
Computer Science
, vol.34
, Issue.1
, pp. 29-33
-
-
Chen, J.1
Cui, G.2
Hong, L.3
Fu, C.4
-
5
-
-
77949819659
-
Pseudonymbased signature scheme for anonymous communication in wireless ad hoc networks
-
Chen, S., Xu, L. and Chen, Z. (2007b) 'Pseudonymbased signature scheme for anonymous communication in wireless ad hoc networks', Journal of Computer Applications, Vol. 27, No. 11, pp.2707-2709.
-
(2007)
Journal of Computer Applications
, vol.27
, Issue.11
, pp. 2707-2709
-
-
Chen, S.1
Xu, L.2
Chen, Z.3
-
6
-
-
77949857500
-
ODAR: On-demand anonymous routing in ad hoc networks
-
IEEE Press, Washington DC
-
Denh, Sy., Rex, C. and Bao, L.C. (2006) 'ODAR: on-demand anonymous routing in ad hoc networks', Proceedings of IEEE International Conference on the Mobile Ad Hoc and Sensor Systems (MASS), IEEE Press, Washington DC, pp.72-76.
-
(2006)
Proceedings of IEEE International Conference on the Mobile Ad Hoc and Sensor Systems (MASS)
, pp. 72-76
-
-
Denh, Sy.1
Rex, C.2
Bao, L.C.3
-
7
-
-
54249155201
-
Identity-based online/offline encryption, financial cryptography and data security (FC'08)
-
Springer-Verlag, Cozumel, Mexico
-
Guo, F., Mu, Y. and Chen, Z. (2008) 'Identity-based online/offline encryption, financial cryptography and data security (FC'08)', Lecture Notes in Computer Science, Springer-Verlag, Cozumel, Mexico, pp.247-261.
-
(2008)
Lecture Notes in Computer Science
, pp. 247-261
-
-
Guo, F.1
Mu, Y.2
Chen, Z.3
-
8
-
-
35248867510
-
Efficient identity based signature schemes based on pairings
-
Springer- Verlag, London, UK
-
Hess, F. (2003) 'Efficient identity based signature schemes based on pairings', Proceedings of SAC'02, Springer- Verlag, London, UK, pp.310-324.
-
(2003)
Proceedings of SAC'02
, pp. 310-324
-
-
Hess, F.1
-
9
-
-
66249092571
-
Pseudonym-based cryptography for anonymous communication in mobile ad-hoc networks
-
Huang, D.J. (2007) 'Pseudonym-based cryptography for anonymous communication in mobile ad-hoc networks', Special Issue on Cryptography in Networks, Int. J. Security and Networks, Vol. 2, Nos. 3-4, pp.272-283.
-
(2007)
Special Issue on Cryptography in Networks, Int. J. Security and Networks
, vol.2
, Issue.3-4
, pp. 272-283
-
-
Huang, D.J.1
-
10
-
-
0000629443
-
Dynamic source routing in ad hoc wireless networks
-
Chapter 5, Kluwer Academic Publishers, Norwell, MA
-
Johnson, D.L. and Maltz, D. (1996) 'Dynamic source routing in ad hoc wireless networks', Mobile Computing, Chapter 5, Kluwer Academic Publishers, Norwell, MA, pp.153-181.
-
(1996)
Mobile Computing
, pp. 153-181
-
-
Johnson, D.L.1
Maltz, D.2
-
11
-
-
0242696170
-
ANODR: A anonymous on-demand routing with untraceable routes for mobile ad-hoc networks
-
ACM Press, New York, NY, USA
-
Kong, J. and Hong, X. (2003) 'ANODR: a anonymous on-demand routing with untraceable routes for mobile ad-hoc networks', Proceedings of the 4th ACM International Symposium on Mobile Ad Hoc Networking and Computing, ACM Press, New York, NY, USA, pp.291-302.
-
(2003)
Proceedings of the 4th ACM International Symposium on Mobile Ad Hoc Networking and Computing
, pp. 291-302
-
-
Kong, J.1
Hong, X.2
-
12
-
-
77949865886
-
-
Accepted by IEEE TrustCom, Zhang Jiajie, China
-
Liu, Z., Xu, L., Chen, Z., Mu, Y. and Guo, F. (2008) Hierarchical Identity-Based Online/Offline, Accepted by IEEE TrustCom, Zhang Jiajie, China.
-
(2008)
Hierarchical Identity-Based Online/Offline
-
-
Liu, Z.1
Xu, L.2
Chen, Z.3
Mu, Y.4
Guo, F.5
-
13
-
-
33847336831
-
-
IEEE Press, Kuala Lumpur, Malaysia
-
Mu, Y., Zhang, F. and Susilo, W. (2005) 'Secure and anonymous mobile ad-hoc networks', IEEE 7th International Conference on Communication and the 13th IEEE International Conference on Networks, IEEE Press, Kuala Lumpur, Malaysia, pp.16-18.
-
(2005)
IEEE 7th International Conference on Communication and the 13th IEEE International Conference on Networks
, pp. 16-18
-
-
Mu, Y.1
Zhang, F.2
Susilo, W.3
'Secure, A.M.A.-H.N.4
-
14
-
-
33847698965
-
Efficient pairing computation on super singular abelian varieties
-
Kluwer Academic Publishers, Norwell, MA, USA
-
Paulo, S.L., Barreto, M., Steven, G., O'Heigeartaiqh, C. and Scott, M. (2007) 'Efficient pairing computation on super singular abelian varieties', Designs, Codes and Cryptography, Kluwer Academic Publishers, Vol. 42, No. 3, Norwell, MA, USA, pp.239-271.
-
(2007)
Designs, Codes and Cryptography
, vol.42
, Issue.3
, pp. 239-271
-
-
Paulo, S.L.1
Barreto, M.2
Steven, G.3
O'Heigeartaiqh, C.4
Scott, M.5
-
16
-
-
85020598353
-
Identity-based cryptosystems and signature scheme
-
LNCS 196, Springer-Verlag, Santa Barbara, CA, USA
-
Shamir, A. (1984) 'Identity-based cryptosystems and signature scheme', Advance in Cryptology CRYPTO'84, LNCS 196, Springer-Verlag, Santa Barbara, CA, USA, pp.47-53.
-
(1984)
Advance in Cryptology CRYPTO'84
, pp. 47-53
-
-
Shamir, A.1
-
17
-
-
33745945444
-
AnonDSR: Efficient anonymous dynamic source routing for mobile ad-hoc networks
-
NRC Press, Alexandria, VA, USA
-
Song, R., Korba, L. and Yee, G. (2005) 'AnonDSR: efficient anonymous dynamic source routing for mobile ad-hoc networks', The Proceedings of the 2005 ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN'05), NRC Press, Alexandria, VA, USA, pp.32-42.
-
(2005)
Proceedings of the 2005 ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN'05)
, pp. 32-42
-
-
Song, R.1
Korba, L.2
Yee, G.3
-
19
-
-
34248553603
-
A heuristic fault-tolerant routing algorithm in mesh using rectilinear-monotone polygonal fault blocks
-
Wang, D. (2007) 'A heuristic fault-tolerant routing algorithm in mesh using rectilinear-monotone polygonal fault blocks', Journal of Systems Architecture, Vol. 53, No. 9, pp.619-628.
-
(2007)
Journal of Systems Architecture
, vol.53
, Issue.9
, pp. 619-628
-
-
Wang, D.1
-
20
-
-
77949788350
-
Secure dynamic source routing protocol (SDSR) for mobile ad hoc networks
-
IISc, Bangalore, India
-
Zafrulla, Z., Shekhar, H., Arora, M. and Ramanatha, K. (2003) 'Secure dynamic source routing protocol (SDSR) for mobile ad hoc networks', International Conference on Communication and Broadband Networking, IISc, Bangalore, India, pp.1-11.
-
(2003)
International Conference on Communication and Broadband Networking
, pp. 1-11
-
-
Zafrulla, Z.1
Shekhar, H.2
Arora, M.3
Ramanatha, K.4
-
21
-
-
25844443821
-
Anonymous communications in mobile ad hoc networks
-
IEEE Press, Miami, FL, USA
-
Zhang, Y., Liu, W. and Lou, W. (2005) 'Anonymous communications in mobile ad hoc networks', Proceedings of IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies, IEEE Press, Miami, FL, USA, pp.1940-1953.
-
(2005)
Proceedings of IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies
, pp. 1940-1953
-
-
Zhang, Y.1
Liu, W.2
Lou, W.3
|