Author of the publication

Provably Secure On-Demand Source Routing in Mobile Ad Hoc Networks

, , and . IEEE Transactions on Mobile Computing, (November 2006)
DOI: http://dx.doi.org/10.1109/TMC.2006.170

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Searchable symmetric encryption: Sequential scan can be practical., and . SoftCOM, page 1-5. IEEE, (2017)Framework for Security Proofs for On-demand Routing Protocols in Multi-Hop Wireless Networks.. IACR Cryptology ePrint Archive, (2011)New look at impossibility result on Dolev-Yao models with hashes.. IACR Cryptology ePrint Archive, (2011)Securing multi-operator-based QoS-aware mesh networks: requirements and design options., , , , , , and . Wirel. Commun. Mob. Comput., 10 (5): 622-646 (2010)Comments on 'Code-division multiple-access techniques in optical fiber networks. II. Systems performance analysis' by J.A. Salehi and C.A. Brackett.. IEEE Trans. Commun., 39 (2): 196 (1991)Kriptográfia és alkalmazásai, and . TypoTex, Budapest, (2005)The Security Proof of a Link-state Routing Protocol for Wireless Sensor Networks., , and . MASS, page 1-6. IEEE Computer Society, (2007)Resilient Aggregation with Attack Detection in Sensor Networks., , and . PerCom Workshops, page 332-336. IEEE Computer Society, (2006)Detection and Recovery from Pollution Attacks in Coding-Based Distributed Storage Schemes., , and . IEEE Trans. Dependable Secur. Comput., 8 (6): 824-838 (2011)Mitigating the Untrusted Terminal Problem Using Conditional Signatures., , and . ITCC (1), page 12-16. IEEE Computer Society, (2004)