Back to Results
First PageMeta Content
Network architecture / Routing / Public-key cryptography / Optimized Link State Routing Protocol / Internet privacy / Link-state routing protocol / Packet drop attack / Tor / Wireless ad-hoc network / Wireless networking / Cryptography / Routing algorithms


Document Date: 2005-09-23 05:34:14


Open Document

File Size: 466,49 KB

Share Result on Facebook

City

San Francisco / Nicosia / Washington DC / Mahdia / Paris / Pairing / Tokyo / Atlanta / /

Company

Ad Hoc Networks / Low Cost Hardware / 2005 European Wireless / Mobile Ad Hoc Networks / Army Research Laboratory / HP / /

Country

Tunisia / Cyprus / Japan / United States / /

Currency

pence / /

Event

FDA Phase / /

Facility

Stanford University / Fort Monmouth / University of Waterloo / Massachusetts Institute of Technology / Rational Arithmetic C/C++ Library / /

IndustryTerm

Internet-Draft / link state routing protocols / ad-hoc networks / implemented protocol / Identity-based systems / secure on-demand routing protocol / external networks / low-resource routers / overall balanced security solution / larger network / challenge/response protocol / wireless ad-hoc networks / recent equipment / manufacturing / noticeable processing power / router router / wireless devices / ad-hoc network / Wireless Ad-Hoc Networking / /

Organization

Authentication Authority / Power Sources Directorate / Massachusetts Institute of Technology / University of Waterloo / Computer Science Department / PKI Authority / Internet Engineering Task Force / Stanford University / Distributed Certificate Authority / Centre for Applied Cryptographic Research / Security Lab / /

Person

David B. Johnson / Paul Mhlethaler / Blackhole Attack / Kimaya Sanzgiri / Marshall Pease / Thomas Clausen / Morain Enge / Elizabeth M. Belding-Royer / Hideo Nakano / Emmanuel Baccelli / Robert Shostak / Bridget Dahill / Clay Shields / Adrian Perrig / Brian N. Levine / Anis Laouiti / Daniele Raffo / Cdric Adjih / Dobb / Katsumi Onisi / Thomas Ed / Andreas Enge / Chun Hu / Leslie Lamport / Philippe Jacquet / Philippe Ed / Gerson H. Pfitscher / Burton H. Bloom / Bruce Schneier / Yih-Chun Hu / Amir - Viennot Laurent / /

Product

RR-5145 / This remedy / OLSR / /

ProgrammingLanguage

Hoc / DC / C++ / /

ProvinceOrState

Monmouth / Georgia / Massachusetts / /

PublishedMedium

Cryptology ePrint Archive / Communications of the ACM / /

SportsLeague

Stanford University / /

Technology

3 router / One routing protocol / wireless devices / router router / PKI / OLSR routing protocol / private key / one router / 2 router / link state routing protocols / specific key exchange protocol / 4 routers / secure on-demand routing protocol / Network Layer Protocols / Encryption / challenge/response protocol / Ethernet / cryptography / 4 2 router / routing protocol / currently implemented protocol / public key / 3 0.2 router / Mobile Computing / low-resource routers / Secure Routing Protocol / OLSR protocol / digital signature / /

URL

http /

SocialTag