-
1
-
-
0002431508
-
The ALOHA System - Another Alternative for Computer Communications
-
November
-
Norman Abramson. The ALOHA System - Another Alternative for Computer Communications. In Proceedings of the Fall 1970 AFIPS Computer Conference, pages 281-285, November 1970.
-
(1970)
Proceedings of the Fall 1970 AFIPS Computer Conference
, pp. 281-285
-
-
Abramson, N.1
-
3
-
-
0035789267
-
-
Long Beach, California, USA, October
-
Stefano Basagni, Kris Herrin, Emilia Rosti, and Danilo Bruschi. Secure Pebblenets. In ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 2001), pages 156-163, Long Beach, California, USA, October 2001.
-
(2001)
ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 2001)
, pp. 156-163
-
-
Basagni, S.1
Herrin, K.2
Rosti, E.3
Bruschi, D.4
Pebblenets, S.5
-
6
-
-
85106319926
-
A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols
-
October
-
Josh Broch, David A. Maltz, David B. Johnson, Yih-Chun Hu, and Jorjeta G. Jetcheva. A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. In Proceedings of the Fourth Annual ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom'98), pages 85-97, October 1998.
-
(1998)
Proceedings of the Fourth Annual ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom'98)
, pp. 85-97
-
-
Broch, J.1
Maltz, D.A.2
Johnson, D.B.3
Hu, Y.-C.4
Jetcheva, J.G.5
-
8
-
-
0003938947
-
-
Internet-Draft, draft-ietf-manet-olsr-05.txt, October Work in progress
-
Thomas Clausen, Philippe Jacquet, Anis Laouiti, Pascale Minet, Paul Muhlethaler, Amir Qayyum, and Laurent Viennot. Optimized Link State Routing Protocol. Internet-Draft, draft-ietf-manet-olsr-05.txt, October 2001. Work in progress.
-
(2001)
Optimized Link State Routing Protocol
-
-
Clausen, T.1
Jacquet, P.2
Laouiti, A.3
Minet, P.4
Muhlethaler, P.5
Qayyum, A.6
Viennot, L.7
-
9
-
-
0004118143
-
-
Technical Report Department of Computer Science, University of Massachusetts, August
-
Bridget Dahill, Brian Neil Levine, Elizabeth Royer, and Clay Shields. A Secure Routing Protocol for Ad Hoc Networks. Technical Report 01-37, Department of Computer Science, University of Massachusetts, August 2001.
-
(2001)
A Secure Routing Protocol for Ad Hoc Networks
-
-
Dahill, B.1
Levine, B.N.2
Royer, E.3
Shields, C.4
-
10
-
-
0031372908
-
Wireless Internet Gateways (WINGS)
-
November
-
J.J. Garcia-Luna-Aceves, Chane L. Fullmer, Ewerton Madruga, David Beyer, and Thane Frivold. Wireless Internet Gateways (WINGS). In Proceedings of IEEE MILCOM '97, pages 1271-1276, November 1997.
-
(1997)
Proceedings of IEEE MILCOM '97
, pp. 1271-1276
-
-
Garcia-Luna-Aceves, J.J.1
Fullmer, C.L.2
Madruga, E.3
Beyer, D.4
Frivold, T.5
-
11
-
-
0004147444
-
Summer Course "Cryptography and Computer Security" at MIT
-
August 1999
-
Shafi Goldwasser and Mihir Bellare. Lecture Notes on Cryptography. Summer Course "Cryptography and Computer Security" at MIT, 1996-1999, August 1999.
-
(1996)
Lecture Notes on Cryptography
-
-
Goldwasser, S.1
Bellare, M.2
-
16
-
-
0004118152
-
-
Technical Report Department of Computer Science, Rice University, December
-
Yih-Chun Hu, Adrian Perrig, and David B. Johnson. Ariadne: A Secure On-Demand Routing Protocol for Wireless Ad Hoc Networks. Technical Report TR01-383, Department of Computer Science, Rice University, December 2001.
-
(2001)
Ariadne: A Secure On-Demand Routing Protocol for Wireless Ad Hoc Networks
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
17
-
-
0035789229
-
The Quest for Security in Mobile Ad Hoc Networks
-
Long Beach, CA, USA, October
-
Jean-Pierre Hubaux, Levente Buttyán, and Srdjan Čapkun. The Quest for Security in Mobile Ad Hoc Networks. In Proceedings of the Third ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 2001), Long Beach, CA, USA, October 2001.
-
(2001)
Proceedings of the Third ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 2001)
-
-
Hubaux, J.-P.1
Buttyán, L.2
Čapkun, S.3
-
18
-
-
0003580691
-
-
IEEE Std 802.11-1997. The Institute of Electrical and Electronics Engineers, New York, New York
-
IEEE Computer Society LAN MAN Standards Committee. Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, IEEE Std 802.11-1997. The Institute of Electrical and Electronics Engineers, New York, New York, 1997.
-
(1997)
Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications
-
-
-
19
-
-
84944414022
-
Scenario-based Performance Analysis of Routing Protocols for Mobile Ad-hoc Networks
-
August
-
Per Johansson, Tony Larsson, Nicklas Hedman, Bartosz Mielczarek, and Mikael Degermark. Scenario-based Performance Analysis of Routing Protocols for Mobile Ad-hoc Networks. In Proceedings of the Fifth Annual ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom'99), pages 195-206, August 1999.
-
(1999)
Proceedings of the Fifth Annual ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom'99)
, pp. 195-206
-
-
Johansson, P.1
Larsson, T.2
Hedman, N.3
Mielczarek, B.4
Degermark, M.5
-
20
-
-
0000629443
-
Dynamic Source Routing in Ad Hoc Wireless Networks
-
edited by Tomasz Imielinski and Hank Korth, chapter 5, Kluwer Academic Publishers
-
David B. Johnson and David A. Maltz. Dynamic Source Routing in Ad Hoc Wireless Networks. In Mobile Computing, edited by Tomasz Imielinski and Hank Korth, chapter 5, pages 153-181. Kluwer Academic Publishers, 1996.
-
(1996)
Mobile Computing
, pp. 153-181
-
-
Johnson, D.B.1
Maltz, D.A.2
-
21
-
-
0023139974
-
The DARPA Packet Radio Network Protocols
-
January
-
John Jubin and Janet D. Tornow. The DARPA Packet Radio Network Protocols. Proceedings of the IEEE, 75(1):21-32, January 1987.
-
(1987)
Proceedings of the IEEE
, vol.75
, Issue.1
, pp. 21-32
-
-
Jubin, J.1
Tornow, J.D.2
-
22
-
-
84867338222
-
Secure Border Gateway Protocol (S-BGP) - Real World Performance and Deployment Issues
-
February
-
Stephen Kent, Charles Lynn, Joanne Mikkelson, and Karen Seo. Secure Border Gateway Protocol (S-BGP) - Real World Performance and Deployment Issues. In Symposium on Network and Distributed Systems Security (NDSS'00), pages 103-116, February 2000.
-
(2000)
Symposium on Network and Distributed Systems Security (NDSS'00)
, pp. 103-116
-
-
Kent, S.1
Lynn, C.2
Mikkelson, J.3
Seo, K.4
-
23
-
-
0012580890
-
Integration of Security in Network Routing Protocols
-
Brijesh Kumar. Integration of Security in Network Routing Protocols. SIGSAC Review, 11(2):18-25, 1993.
-
(1993)
SIGSAC Review
, vol.11
, Issue.2
, pp. 18-25
-
-
Kumar, B.1
-
24
-
-
0019634370
-
Password Authentication with Insecure Communication
-
November
-
Leslie Lamport. Password Authentication with Insecure Communication. Communications of the ACM, 24(11):770-772, November 1981.
-
(1981)
Communications of the ACM
, vol.24
, Issue.11
, pp. 770-772
-
-
Lamport, L.1
-
27
-
-
0034541756
-
Mitigating Routing Misbehaviour in Mobile Ad Hoc Networks
-
Boston MA, USA, August
-
Sergio Marti, T.J. Giuli, Kevin Lai, and Mary Baker. Mitigating Routing Misbehaviour in Mobile Ad Hoc Networks. In Proceedings of the Sixth Annual International Conference on Mobile Computing and Networking (MobiCom 2000), pages 255-265, Boston MA, USA, August 2000.
-
(2000)
Proceedings of the Sixth Annual International Conference on Mobile Computing and Networking (MobiCom 2000)
, pp. 255-265
-
-
Marti, S.1
Giuli, T.J.2
Lai, K.3
Baker, M.4
-
30
-
-
0031353437
-
A Highly Adaptive Distributed Routing Algorithm for Mobile Wireless Networks
-
April
-
Vincent D. Park and M. Scott Corson. A Highly Adaptive Distributed Routing Algorithm for Mobile Wireless Networks. In Proceedings of INFOCOM '97, pages 1405-1413, April 1997.
-
(1997)
Proceedings of INFOCOM '97
, pp. 1405-1413
-
-
Park, V.D.1
Corson, M.S.2
-
31
-
-
85031307530
-
Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for Mobile Computers
-
August A revised version of the paper
-
Charles E. Perkins and Pravin Bhagwat. Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for Mobile Computers. In Proceedings of the SIGCOMM '94 Conference on Communications Architectures, Protocols and Applications, pages 234-244, August 1994. A revised version of the paper is available from http://www.cs.umd.edu/projects/mcml/papers/Sigcomm94.ps.
-
(1994)
Proceedings of the SIGCOMM '94 Conference on Communications Architectures, Protocols and Applications
, pp. 234-244
-
-
Perkins, C.E.1
Bhagwat, P.2
-
35
-
-
7744238188
-
-
Technical Report Department of Computer Science, Rice University, December
-
Adrian Perrig, Yih-Chun Hu, and David B. Johnson. Wormhole Protection in Wireless Ad Hoc Networks. Technical Report TR01-384, Department of Computer Science, Rice University, December 2001.
-
(2001)
Wormhole Protection in Wireless Ad Hoc Networks
-
-
Perrig, A.1
Hu, Y.-C.2
Johnson, D.B.3
-
36
-
-
0034771605
-
SPINS: Security Protocols for Sensor Networks
-
Rome, Italy, July
-
Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, and J. D. Tygar. SPINS: Security Protocols for Sensor Networks. In Seventh Annual ACM International Conference on Mobile Computing and Networks (MobiCom 2001), Rome, Italy, July 2001.
-
(2001)
Seventh Annual ACM International Conference on Mobile Computing and Networks (MobiCom 2001)
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, J.D.5
-
37
-
-
0020128340
-
Theory of Spread Spectrum Communications - A Tutorial
-
May
-
Raymond L. Pickholtz, Donald L. Schilling, and Laurence B. Milstein. Theory of Spread Spectrum Communications - A Tutorial. IEEE Transactions on Communications, 30(5):855-884, May 1982.
-
(1982)
IEEE Transactions on Communications
, vol.30
, Issue.5
, pp. 855-884
-
-
Pickholtz, R.L.1
Schilling, D.L.2
Milstein, L.B.3
-
39
-
-
15844391060
-
Better than BiBa: Short One-time Signatures with Fast Signing and Verifying
-
Leonid Reyzin and Natan Reyzin. Better than BiBa: Short One-time Signatures with Fast Signing and Verifying. Cryptology ePrint Archive, Report 2002/014, 2002. Available at http://eprint.iacr.org/.
-
(2002)
Cryptology ePrint Archive
-
-
Reyzin, L.1
Reyzin, N.2
-
42
-
-
0001831930
-
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks
-
edited by B. Christianson, B. Crispo, and M. Roe. Springer Verlag Berlin Heidelberg
-
Frank Stajano and Ross Anderson. The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks. In Security Protocols, 7th International Workshop, edited by B. Christianson, B. Crispo, and M. Roe. Springer Verlag Berlin Heidelberg, 1999.
-
(1999)
Security Protocols, 7th International Workshop
-
-
Stajano, F.1
Anderson, R.2
-
43
-
-
15844404847
-
Secure Ad hoc On-Demand Distance Vector (SAODV) Routing
-
Message-ID 3BC17B40.BBF52E09@nokia.com October 8
-
Manel Guerrero Zapata. Secure Ad hoc On-Demand Distance Vector (SAODV) Routing. IETF MANET Mailing List, Message-ID 3BC17B40.BBF52E09@nokia.com, ftp://manet.itd.nrl.navy.mil/pub/manet/2001-10.mail, October 8, 2001.
-
(2001)
IETF MANET Mailing List
-
-
Zapata, M.G.1
-
44
-
-
0033357103
-
Securing Ad Hoc Networks
-
November/December
-
Lidong Zhou and Zygmunt J. Haas. Securing Ad Hoc Networks. IEEE Network Magazine, 13(6), November/December 1999.
-
(1999)
IEEE Network Magazine
, vol.13
, pp. 6
-
-
Zhou, L.1
Haas, Z.J.2
|