|
Search the dblp DataBase
Gabriel Montenegro:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Gabriel Montenegro
MNCRS: Industry Specifications for the Mobile NC. [Citation Graph (1, 0)][DBLP] IEEE Internet Computing, 1998, v:2, n:1, pp:73-77 [Journal]
- Claude Castelluccia, Gabriel Montenegro, Julien Laganier, Christoph Neumann
Hindering Eavesdropping via IPv6 Opportunistic Encryption. [Citation Graph (0, 0)][DBLP] ESORICS, 2004, pp:309-321 [Conf]
- Claude Castelluccia, Gabriel Montenegro
Securing Group Management in IPv6 with Cryptographically Generated Addresses. [Citation Graph (0, 0)][DBLP] ISCC, 2003, pp:588-593 [Conf]
- Gabriel Montenegro, Steve Drach
System Isolation and Network Fast Fail Capability in Solaris. [Citation Graph (0, 0)][DBLP] Symposium on Mobile and Location-Independent Computing, 1995, pp:67-78 [Conf]
- Claude Castelluccia, Francis Dupont, Gabriel Montenegro
A Simple Privacy Extension for Mobile IPV6. [Citation Graph (0, 0)][DBLP] MWCN, 2004, pp:239-249 [Conf]
- Gabriel Montenegro, Claude Castelluccia
Statistically Unique and Cryptographically Verifiable (SUCV) Identifiers and Addresses. [Citation Graph (0, 0)][DBLP] NDSS, 2002, pp:- [Conf]
- Vipul Gupta, Gabriel Montenegro, Jeff Rulifson
Complete Computing. [Citation Graph (0, 0)][DBLP] WWCA, 1998, pp:174-189 [Conf]
- Vipul Gupta, Gabriel Montenegro
Secure and Mobile Networking. [Citation Graph (0, 0)][DBLP] MONET, 1998, v:3, n:4, pp:381-390 [Journal]
- Claude Castelluccia, Gabriel Montenegro
Protecting AODV against impersonation attacks. [Citation Graph (0, 0)][DBLP] Mobile Computing and Communications Review, 2002, v:6, n:3, pp:108-109 [Journal]
- Gabriel Montenegro, Benjamin Gaidioz, Pascale Primet, Bernard Tourancheau
Equivalent differentiated services for AODVng. [Citation Graph (0, 0)][DBLP] Mobile Computing and Communications Review, 2002, v:6, n:3, pp:110-111 [Journal]
- Gabriel Montenegro, Claude Castelluccia
Crypto-based identifiers (CBIDs): Concepts and applications. [Citation Graph (0, 0)][DBLP] ACM Trans. Inf. Syst. Secur., 2004, v:7, n:1, pp:97-127 [Journal]
- Nitin H. Vaidya, Milten N. Mehta, Charles E. Perkins, Gabriel Montenegro
Delayed duplicate acknowledgements: a TCP-Unaware approach to improve performance of TCP over wireless. [Citation Graph (0, 0)][DBLP] Wireless Communications and Mobile Computing, 2002, v:2, n:1, pp:59-70 [Journal]
Search in 0.004secs, Finished in 0.004secs
|