The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Gabriel Montenegro: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Gabriel Montenegro
    MNCRS: Industry Specifications for the Mobile NC. [Citation Graph (1, 0)][DBLP]
    IEEE Internet Computing, 1998, v:2, n:1, pp:73-77 [Journal]
  2. Claude Castelluccia, Gabriel Montenegro, Julien Laganier, Christoph Neumann
    Hindering Eavesdropping via IPv6 Opportunistic Encryption. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2004, pp:309-321 [Conf]
  3. Claude Castelluccia, Gabriel Montenegro
    Securing Group Management in IPv6 with Cryptographically Generated Addresses. [Citation Graph (0, 0)][DBLP]
    ISCC, 2003, pp:588-593 [Conf]
  4. Gabriel Montenegro, Steve Drach
    System Isolation and Network Fast Fail Capability in Solaris. [Citation Graph (0, 0)][DBLP]
    Symposium on Mobile and Location-Independent Computing, 1995, pp:67-78 [Conf]
  5. Claude Castelluccia, Francis Dupont, Gabriel Montenegro
    A Simple Privacy Extension for Mobile IPV6. [Citation Graph (0, 0)][DBLP]
    MWCN, 2004, pp:239-249 [Conf]
  6. Gabriel Montenegro, Claude Castelluccia
    Statistically Unique and Cryptographically Verifiable (SUCV) Identifiers and Addresses. [Citation Graph (0, 0)][DBLP]
    NDSS, 2002, pp:- [Conf]
  7. Vipul Gupta, Gabriel Montenegro, Jeff Rulifson
    Complete Computing. [Citation Graph (0, 0)][DBLP]
    WWCA, 1998, pp:174-189 [Conf]
  8. Vipul Gupta, Gabriel Montenegro
    Secure and Mobile Networking. [Citation Graph (0, 0)][DBLP]
    MONET, 1998, v:3, n:4, pp:381-390 [Journal]
  9. Claude Castelluccia, Gabriel Montenegro
    Protecting AODV against impersonation attacks. [Citation Graph (0, 0)][DBLP]
    Mobile Computing and Communications Review, 2002, v:6, n:3, pp:108-109 [Journal]
  10. Gabriel Montenegro, Benjamin Gaidioz, Pascale Primet, Bernard Tourancheau
    Equivalent differentiated services for AODVng. [Citation Graph (0, 0)][DBLP]
    Mobile Computing and Communications Review, 2002, v:6, n:3, pp:110-111 [Journal]
  11. Gabriel Montenegro, Claude Castelluccia
    Crypto-based identifiers (CBIDs): Concepts and applications. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2004, v:7, n:1, pp:97-127 [Journal]
  12. Nitin H. Vaidya, Milten N. Mehta, Charles E. Perkins, Gabriel Montenegro
    Delayed duplicate acknowledgements: a TCP-Unaware approach to improve performance of TCP over wireless. [Citation Graph (0, 0)][DBLP]
    Wireless Communications and Mobile Computing, 2002, v:2, n:1, pp:59-70 [Journal]

Search in 0.267secs, Finished in 0.268secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002