Biomedical Engineering Reference
In-Depth Information
References
1. Haas ZJ, Liang B (1999) Ad hoc mobility management using quorum systems. IEEE/ACM
Trans Networking 7:2
2. Lee U, Magistretti E, Zhou B, Gerla M, Bellavista P, Corradi A (2006) Mobeyes: smart mobs
for urban monitoring with a vehicular sensor network. IEEE Wirel Commun 13(5):52
3. Feldman P (1987) A practical scheme for non-interactive verifiable secret sharing. In:
Proceedings of the 28th annual symposium on the foundations of computer science, pp 427-
437. IEEE, 12-14 Oct 1987
4. Hauser R, Przygienda T, Tsudik G (1999) Lowering security overhead in link state routing.
Comput Netw 31(8):885-894
5. Kumar B (1993) Integration of security in network routing protocols. SIGSAC Rev 11(2):18-
25
6. Desmedt Y, Jajodia S (1997) Redistributing secret shares to new access structures and its
applications. Technical report ISSE TR-97-01, George Mason University
7. Gong L (1993) Increasing availability and security of an authentication service. IEEE J Sel
Areas Commun 11(5):657-662
Search WWH ::




Custom Search