-
1
-
-
85089416445
-
A distance routing effect algorithm for mobility (dream)
-
S. Basagni, I. Chlamtac, V. R. Syrotiuk, and B. A. Woodward, "A distance routing effect algorithm for mobility (dream)," in Proceedings of Fourth Annual ACM/IEEE International Conference in Mobile Computing and Networking (MobiCom), pp. 76-84, 1998.
-
(1998)
Proceedings of Fourth Annual ACM/IEEE International Conference in Mobile Computing and Networking (MobiCom)
, pp. 76-84
-
-
Basagni, S.1
Chlamtac, I.2
Syrotiuk, V.R.3
Woodward, B.A.4
-
2
-
-
2942524994
-
Location privacy in pervasive computing
-
A. R. Beresford and F. Stajano, "Location privacy in pervasive computing," IEEE Pervasive Computing, vol. 2, no. 1, pp. 46-55, 2003.
-
(2003)
IEEE Pervasive Computing
, vol.2
, Issue.1
, pp. 46-55
-
-
Beresford, A.R.1
Stajano, F.2
-
3
-
-
0035505507
-
Routing with guaranteed delivery in ad hoc wireless networks
-
Nov
-
P. Bose, P. Morin, I. Stojmenoví, and J. Urrutia, "Routing with guaranteed delivery in ad hoc wireless networks," Wireless Networks, vol. 7, no. 6, pp. 609-616, Nov. 2001.
-
(2001)
Wireless Networks
, vol.7
, Issue.6
, pp. 609-616
-
-
Bose, P.1
Morin, P.2
Stojmenoví, I.3
Urrutia, J.4
-
4
-
-
85018204196
-
Anonymous usage of location-based services through spatial and temporal cloaking
-
M. Gruteser and D. Grunwald, "Anonymous usage of location-based services through spatial and temporal cloaking," in The First International Conference on Mobile Systems, Applications, and Services (MobiSys), pp. 31-42, 2002.
-
(2002)
The First International Conference on Mobile Systems, Applications, and Services (MobiSys)
, pp. 31-42
-
-
Gruteser, M.1
Grunwald, D.2
-
5
-
-
0036957315
-
Ariadne: a secure on-demand routing protocol for Ad Hoc networks
-
Sept
-
Y.-C. Hu, A. Perrig, and D. B. Johnson, "Ariadne: a secure on-demand routing protocol for Ad Hoc networks," in Proceedings of the Eighth Annual International Conference on Mobile Computing and Networking (MobiCom 2002), pp. 12-23, Sept. 2002.
-
(2002)
Proceedings of the Eighth Annual International Conference on Mobile Computing and Networking (MobiCom 2002)
, pp. 12-23
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
6
-
-
0003593249
-
IEEE Computer Society, Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specification
-
IEEE Computer Society, Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specification, IEEE Standard 802.11, 1999.
-
(1999)
IEEE Standard 802.11
-
-
-
7
-
-
0000629443
-
Dynamic source routing in ad hoc wireless networks
-
D. B. Johnson and D. A. Maltz, "Dynamic source routing in ad hoc wireless networks," in Mobile Computing, Kluwer Academic Publishers, vol. 353, pp. 153-181, 1996.
-
(1996)
Mobile Computing, Kluwer Academic Publishers
, vol.353
, pp. 153-181
-
-
Johnson, D.B.1
Maltz, D.A.2
-
8
-
-
0034547115
-
GPSR: greedy perimeter stateless routing for wireless networks
-
B. Karp and H. T. Kung, "GPSR: greedy perimeter stateless routing for wireless networks," in Mobile Computing and Networking, pp. 243-254, 2000.
-
(2000)
Mobile Computing and Networking
, pp. 243-254
-
-
Karp, B.1
Kung, H.T.2
-
9
-
-
0003068282
-
Security Architecture for the Internet Protocol
-
S. Kent and R. Atkinson, Security Architecture for the Internet Protocol, RFC 2401, 1998.
-
(1998)
RFC 2401
-
-
Kent, S.1
Atkinson, R.2
-
10
-
-
3042632485
-
Anodr: Anonymous on demand routing with untraceable routes for mobile ad-hoc networks
-
citeseer.ist.psu.edu/ kong03anodr.html
-
J. Kong and X. Hong, "Anodr: Anonymous on demand routing with untraceable routes for mobile ad-hoc networks," citeseer.ist.psu.edu/ kong03anodr.html
-
-
-
Kong, J.1
Hong, X.2
-
11
-
-
0034548432
-
A scalable location service for geographic ad-hoc routing
-
J. Li, J. Jannotti, D. De Couto, D. Karger, and R. Morris, "A scalable location service for geographic ad-hoc routing," in Proceedings of the 6th ACM International Conference on Mobile Computing and Networking (MobiCom'00), pp. 120-130, 2000.
-
(2000)
Proceedings of the 6th ACM International Conference on Mobile Computing and Networking (MobiCom'00)
, pp. 120-130
-
-
Li, J.1
Jannotti, J.2
De Couto, D.3
Karger, D.4
Morris, R.5
-
12
-
-
0035509489
-
A survey on position-based routing in mobile ad-hoc networks
-
M. Mauve, J. Widmer, and H. Hartenstein, "A survey on position-based routing in mobile ad-hoc networks," IEEE Network, vol. 15, no. 6, pp. 30-39, 2001.
-
(2001)
IEEE Network
, vol.15
, Issue.6
, pp. 30-39
-
-
Mauve, M.1
Widmer, J.2
Hartenstein, H.3
-
15
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
R. L. Rivest, A. Shamir, and L. A. Adleman, "A method for obtaining digital signatures and public-key cryptosystems," Communications of the ACM, vol. 21, no. 2, pp. 120-126, 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.A.3
-
16
-
-
84946833891
-
How to leak a secret
-
Springer-Verlag
-
R. L. Rivest, A. Shamir, and Y. Tauman, "How to leak a secret," in Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security, pp. 552-565, Springer-Verlag, 2001.
-
(2001)
Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security
, pp. 552-565
-
-
Rivest, R.L.1
Shamir, A.2
Tauman, Y.3
-
17
-
-
84904904836
-
A secure routing protocol for Ad Hoc networks
-
Nov
-
K. Sanzgiri, B. Dahill, B. N. Levine, C. Shields, and E. M. Belding-Royer, "A secure routing protocol for Ad Hoc networks," in Proceedings of IEEE International Conference on Network Protocols(ICNP), pp. 78-89, Nov. 2002.
-
(2002)
Proceedings of IEEE International Conference on Network Protocols(ICNP)
, pp. 78-89
-
-
Sanzgiri, K.1
Dahill, B.2
Levine, B.N.3
Shields, C.4
Belding-Royer, E.M.5
-
18
-
-
0036646011
-
Position-based routing in ad hoc networks
-
I. Stojmenovic, "Position-based routing in ad hoc networks," IEEE Communications Magazine, vol. 40, no. 7, pp. 128-134, 2002.
-
(2002)
IEEE Communications Magazine
, vol.40
, Issue.7
, pp. 128-134
-
-
Stojmenovic, I.1
-
19
-
-
0035215664
-
A scalable location management scheme in mobile ad-hoc networks
-
Y. Xue, B. Li, and K. Nahrstedt, "A scalable location management scheme in mobile ad-hoc networks," in 26th Annual IEEE Conference on Local Computer Networks (LCN'01), pp. 102-111, 2001.
-
(2001)
26th Annual IEEE Conference on Local Computer Networks (LCN'01)
, pp. 102-111
-
-
Xue, Y.1
Li, B.2
Nahrstedt, K.3
|