Sciweavers

Share
CONEXT   2008 International Conference On Emerging Networking Experiments And Technologies
Wall of Fame | Most Viewed CONEXT-2008 Paper
CONEXT
2008
ACM
8 years 12 months ago
ALPHA: an adaptive and lightweight protocol for hop-by-hop authentication
Wireless multi-hop networks are particularly susceptible to attacks based on flooding and the interception, tampering with, and forging of packets. Thus, reliable communication in...
Tobias Heer, Stefan Götz, Oscar García...
Disclaimer and Copyright Notice
Sciweavers respects the rights of all copyright holders and in this regard, authors are only allowed to share a link to their preprint paper on their own website. Every contribution is associated with a desciptive image. It is the sole responsibility of the authors to ensure that their posted image is not copyright infringing. This service is compliant with IEEE copyright.
IdReadViewsTitleStatus
1Download preprint from source218
2Download preprint from source163
3Download preprint from source161
4Download preprint from source159
5Download preprint from source158
6Download preprint from source154
7Download preprint from source140
8Download preprint from source138
9Download preprint from source137
10Download preprint from source137
11Download preprint from source133
12Download preprint from source132
13Download preprint from source130
14Download preprint from source127
15Download preprint from source127
16Download preprint from source122
17Download preprint from source121
18Download preprint from source120
19Download preprint from source118
20Download preprint from source113
21Download preprint from source113
22Download preprint from source112
23Download preprint from source111
24Download preprint from source110
25Download preprint from source109
26Download preprint from source109
27Download preprint from source107
28Download preprint from source106
29Download preprint from source105
30Download preprint from source104
31Download preprint from source104
32Download preprint from source102
33Download preprint from source101
34Download preprint from source100
35Download preprint from source99
36Download preprint from source99
37Download preprint from source98
38Download preprint from source98
39Download preprint from source97
40Download preprint from source97
41Download preprint from source97
42Download preprint from source97
43Download preprint from source95
44Download preprint from source95
45Download preprint from source94
46Download preprint from source94
47Download preprint from source93
48Download preprint from source93
49Download preprint from source92
50Download preprint from source90
51Download preprint from source89
52Download preprint from source88
53Download preprint from source88
54Download preprint from source87
55Download preprint from source85
56Download preprint from source84
57Download preprint from source83
58Download preprint from source82
59Download preprint from source81
60Download preprint from source80
61Download preprint from source79
62Download preprint from source78
63Download preprint from source78
64Download preprint from source76
65Download preprint from source76
66Download preprint from source75
67Download preprint from source74
68Download preprint from source69
69Download preprint from source68
70Download preprint from source68
71Download preprint from source53
books