-
1
-
-
1542329039
-
Towards realistic mobility models for mobile ad hoc networks
-
J. Amit, M. Elizabeth, Belding-Royer, C. Kevin, Almeroth, S. Subhash. Towards Realistic Mobility Models For Mobile Ad Hoc Networks. In Proceedings of MobiCom'03, p.217 - 229, 2003.
-
(2003)
Proceedings of MobiCom'03
, pp. 217-229
-
-
Amit, J.1
Elizabeth, M.2
Belding-Royer, K.C.3
Almeroth, S.S.4
-
2
-
-
85106319926
-
A performance comparison of muti-hop wireless ad hoc network routing protocols
-
J. Broch, D. A. Maltz, D. Johnson, Y. C. Hu, and J. Jetcheva. A Performance Comparison of Muti-Hop Wireless Ad Hoc Network Routing Protocols. In Proceedings of MobiCom'98, p.85-97, 1998.
-
(1998)
Proceedings of MobiCom'98
, pp. 85-97
-
-
Broch, J.1
Maltz, D.A.2
Johnson, D.3
Hu, Y.C.4
Jetcheva, J.5
-
4
-
-
4544374484
-
A certificate revocation scheme for wireless ad hoc networks
-
C. Crepeau and C. R. Davis. A Certificate Revocation Scheme for Wireless Ad Hoc Networks. In Proceedings of SASN'03, p.54-61, 2003.
-
(2003)
Proceedings of SASN'03
, pp. 54-61
-
-
Crepeau, C.1
Davis, C.R.2
-
6
-
-
0005362390
-
-
Standard Edition, v.1.4.2 (J2SE)
-
Java 2 Platform, Standard Edition, v.1.4.2 (J2SE).
-
Java 2 Platform
-
-
-
7
-
-
84958063551
-
On certificate revocation and validation
-
P. C. Kocher. On Certificate Revocation and Validation. In Proceedings of FC'98, p.172-177, 1998.
-
(1998)
Proceedings of FC'98
, pp. 172-177
-
-
Kocher, P.C.1
-
8
-
-
0035704362
-
Providing robust and ubiquitous security support for mobile ad-hoc networks
-
J. Kong, P. Zerfos, H. Luo, S. Lu, and L. Zhang. Providing Robust and Ubiquitous Security Support for Mobile Ad-Hoc Networks. In Proceedings of ICNP'01, p.251-260, 2001.
-
(2001)
Proceedings of ICNP'01
, pp. 251-260
-
-
Kong, J.1
Zerfos, P.2
Luo, H.3
Lu, S.4
Zhang, L.5
-
9
-
-
84883869163
-
Self-securing ad hoc wireless networks
-
H. Luo, P. Zerfos, J. Kong, S. Lu, and L. Zhang. Self-securing Ad Hoc Wireless Networks. In Proceedings of 7th International Symposium on Computers and Communications, p.567-574, 2002.
-
(2002)
Proceedings of 7th International Symposium on Computers and Communications
, pp. 567-574
-
-
Luo, H.1
Zerfos, P.2
Kong, J.3
Lu, S.4
Zhang, L.5
-
12
-
-
84943517115
-
On the utility of distributed cryptography in P2P and MANETs: The case of membership control
-
M. Narasimha, G. Tsudik, and J. H. Yi. On the Utility of Distributed Cryptography in P2P and MANETs: the Case of Membership Control. In Proceedings of ICNP'03, p.336-345, 2003.
-
(2003)
Proceedings of ICNP'03
, pp. 336-345
-
-
Narasimha, M.1
Tsudik, G.2
Yi, J.H.3
-
13
-
-
0017930809
-
A method for obtaining Digital signatures, and public key cryptosystems
-
R. L. Rivest, A. Shamir, and L. Adleman. A method for obtaining Digital Signatures, and Public Key Cryptosystems. Communications of the ACM, 21(2):120-126, 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
15
-
-
0018545449
-
How to share a secret
-
A. Shamir. How to Share a Secret. Communications of the ACM, 22(11): 612-613, 1979.
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
16
-
-
0011255177
-
X.509 internet public key infrastructure certificate and certificate revocation list (CRL) profile
-
April
-
X.509 Internet Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. RFC 3208, April 2002.
-
(2002)
RFC 3208
-
-
-
17
-
-
0003344055
-
X.509 internet public key infrastructure online certificate status protocol - OCSP
-
June, 99
-
X.509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP. RFC 2560, June, 99.
-
RFC 2560
-
-
-
18
-
-
17144398990
-
MOCA: Mobile certificate authority for wireless ad hoc networks
-
S. Yi and R. Kravets. MOCA: Mobile Certificate Authority for Wireless Ad Hoc Networks. In Proceedings of PKI '03, 2003.
-
(2003)
Proceedings of PKI '03
-
-
Yi, S.1
Kravets, R.2
-
19
-
-
0033357103
-
Securing ad hoc networks
-
L. Zhou and Z. J. Haas. Securing Ad Hoc Networks. IEEE Network, 13(6):24-30, 1999.
-
(1999)
IEEE Network
, vol.13
, Issue.6
, pp. 24-30
-
-
Zhou, L.1
Haas, Z.J.2
|