-
4
-
-
79251613360
-
The optimized link state routing protocol version 2 draft-ietf-manet- olsrv2-11
-
April
-
Clausen T., Dearlove C., Jacquet P., The optimized link state routing protocol version 2 draft-ietf-manet-olsrv2-11. IETF Internet-Draft, April 2010
-
(2010)
IETF Internet-Draft
-
-
Clausen, T.1
Dearlove, C.2
Jacquet, P.3
-
7
-
-
77957605313
-
Simulation results of the OLSR routing protocol for wireless network
-
Sardegna, Italy
-
Laouti A., Mhlethaler P., Najid A., Plakoo E., Simulation results of the OLSR routing protocol for wireless network Proceedings of the 1st Mediterranean Ad-Hoc Networks workshop (Med-Hoc-Net '02) 2002 Sardegna, Italy
-
(2002)
Proceedings of the 1st Mediterranean Ad-Hoc Networks Workshop (Med-Hoc-Net '02)
-
-
Laouti, A.1
Mhlethaler, P.2
Najid, A.3
Plakoo, E.4
-
8
-
-
72349092315
-
Ospf multipoint relay (mpr) extension for ad hoc networks
-
February
-
Baccelli E., Jacquet P., Nguyen D., Clausen T., Ospf multipoint relay (mpr) extension for ad hoc networks. IETF Request for Comments: 5449, February
-
IETF Request for Comments
, vol.5449
-
-
Baccelli, E.1
Jacquet, P.2
Nguyen, D.3
Clausen, T.4
-
11
-
-
34250306664
-
Threshold cryptography in P2P and MANETs: The case of access control
-
Saxena N., Tsudik G., Yi J. H., Threshold cryptography in P2P and MANETs: the case of access control Computer Networks 2007 51 12 3632 3649
-
(2007)
Computer Networks
, vol.51
, Issue.12
, pp. 3632-3649
-
-
Saxena, N.1
Tsudik, G.2
Yi, J.H.3
-
12
-
-
33947656426
-
Secure and efficient key management in mobile ad hoc networks
-
Wu B., Wu J., Fernandez E. B., Ilyas M., Magliveras S., Secure and efficient key management in mobile ad hoc networks Journal of Network and Computer Applications 2007 30 3 937 954
-
(2007)
Journal of Network and Computer Applications
, vol.30
, Issue.3
, pp. 937-954
-
-
Wu, B.1
Wu, J.2
Fernandez, E.B.3
Ilyas, M.4
Magliveras, S.5
-
13
-
-
28444488609
-
Secure, redundant, and fully distributed key management scheme for mobile ad hoc networks: An analysis
-
Joshi D., Namuduri K., Pendse R., Secure, redundant, and fully distributed key management scheme for mobile ad hoc networks: an analysis EURASIP Journal on Wireless Communications and Networking 2005 2005 4 579 589
-
(2005)
EURASIP Journal on Wireless Communications and Networking
, vol.2005
, Issue.4
, pp. 579-589
-
-
Joshi, D.1
Namuduri, K.2
Pendse, R.3
-
14
-
-
0033357103
-
Securing ad hoc networks
-
Zhou L., Haas Z. J., Securing ad hoc networks IEEE Network 1999 13 6 24 30
-
(1999)
IEEE Network
, vol.13
, Issue.6
, pp. 24-30
-
-
Zhou, L.1
Haas, Z.J.2
-
15
-
-
0035835293
-
Robust threshold DSS signatures
-
Gennaro R., Jarecki S., Krawczyk H., Rabin T., Robust threshold DSS signatures Information and Computation 2001 164 1 54 84
-
(2001)
Information and Computation
, vol.164
, Issue.1
, pp. 54-84
-
-
Gennaro, R.1
Jarecki, S.2
Krawczyk, H.3
Rabin, T.4
-
16
-
-
0035704362
-
Providing robust and ubiquitous security support for mobile ad-hoc networks
-
November
-
Kong J., Zerfos P., Luo H., Lu S., Zhang L., Providing robust and ubiquitous security support for mobile ad-hoc networks Proceedings of the International Conference on Network Protocols (ICNP '01) November 2001 251 260
-
(2001)
Proceedings of the International Conference on Network Protocols (ICNP '01)
, pp. 251-260
-
-
Kong, J.1
Zerfos, P.2
Luo, H.3
Lu, S.4
Zhang, L.5
-
21
-
-
77955295080
-
Efficient certification path discovery for MANET
-
Kambourakis G., Konstantinou E., Douma A., Anagnostopoulos M., Fotiadis G., Efficient certification path discovery for MANET EURASIP Journal on Wireless Communications and Networking 2010 2010 16
-
(2010)
EURASIP Journal on Wireless Communications and Networking
, vol.2010
, pp. 16
-
-
Kambourakis, G.1
Konstantinou, E.2
Douma, A.3
Anagnostopoulos, M.4
Fotiadis, G.5
-
22
-
-
34047142151
-
Building a virtual hierarchy to simplify certification path discovery in mobile ad-hoc networks
-
Satizbal C., Hernndez-Serrano J., Forn J., Pegueroles J., Building a virtual hierarchy to simplify certification path discovery in mobile ad-hoc networks Computer Communications 2007 30 7 1498 1512
-
(2007)
Computer Communications
, vol.30
, Issue.7
, pp. 1498-1512
-
-
Satizbal, C.1
Hernndez-Serrano, J.2
Forn, J.3
Pegueroles, J.4
-
23
-
-
33646847482
-
On-demand public-key management for mobile ad hoc networks
-
DOI 10.1002/wcm.396
-
Li R., Li J., Liu P., Chen H.-H., On-demand public-key management for mobile ad hoc networks Wireless Communications and Mobile Computing 2006 6 3 295 306 (Pubitemid 43774309)
-
(2006)
Wireless Communications and Mobile Computing
, vol.6
, Issue.3
, pp. 295-306
-
-
Li, R.1
Li, J.2
Liu, P.3
Chen, H.-H.4
-
24
-
-
34548821880
-
A localized certificate revocation scheme for mobile ad hoc networks
-
Arboit G., Crpeau C., Davis C. R., Maheswaran M., A localized certificate revocation scheme for mobile ad hoc networks Ad Hoc Networks 2008 6 1 17 31
-
(2008)
Ad Hoc Networks
, vol.6
, Issue.1
, pp. 17-31
-
-
Arboit, G.1
Crpeau, C.2
Davis, C.R.3
Maheswaran, M.4
-
26
-
-
33751078079
-
A probabilistic certificate updating protocol for manet
-
Washington, DC, USA
-
Xie D., Zhou H., A probabilistic certificate updating protocol for manet 2 Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 06) 2006 Washington, DC, USA 147 154
-
(2006)
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 06)
, vol.2
, pp. 147-154
-
-
Xie, D.1
Zhou, H.2
-
28
-
-
0242456134
-
Small worlds in security systems: An analysis of the PGP certificate graph
-
September Norfolk, Va, USA
-
Capkun S., Buttyan L., Hubaux J. P., Small worlds in security systems: an analysis of the PGP certificate graph Proceedings of the ACM New Security Paradigms Workshop September 2002 Norfolk, Va, USA 8
-
(2002)
Proceedings of the ACM New Security Paradigms Workshop
, pp. 8
-
-
Capkun, S.1
Buttyan, L.2
Hubaux, J.P.3
-
30
-
-
44649084918
-
Small world model-based polylogarithmic routing using mobile nodes
-
Wu J., Yang S.-H., Small world model-based polylogarithmic routing using mobile nodes Journal of Computer Science and Technology 2008 23 3 327 342
-
(2008)
Journal of Computer Science and Technology
, vol.23
, Issue.3
, pp. 327-342
-
-
Wu, J.1
Yang, S.-H.2
|