-
1
-
-
0037086890
-
Wireless sensor networks: A survey
-
Elsevier Science
-
I.F. Akyildiz et al., "Wireless Sensor Networks: A Survey," Computer Networks, Elsevier Science, vol. 38, no. 4, 2002, pp. 393-422.
-
(2002)
Computer Networks
, vol.38
, Issue.4
, pp. 393-422
-
-
Akyildiz, I.F.1
-
4
-
-
0007700726
-
Tamper resistance - A cautionary note
-
R. Anderson and M. Kuhn, "Tamper Resistance - a Cautionary Note," Proc. 2nd Usenix Workshop Electronic Commerce, Usenix, Berkeley, Calif., 1996, pp. 1-11.
-
Proc. 2nd Usenix Workshop Electronic Commerce, Usenix, Berkeley, Calif., 1996
, pp. 1-11
-
-
Anderson, R.1
Kuhn, M.2
-
5
-
-
0000629443
-
Dynamic source routing in ad hoc wireless networks
-
T. Imielinski and H. Korth, eds., Kluwer Academic, Boston
-
D.B. Johnson and D.A. Maltz, "Dynamic Source Routing in Ad Hoc Wireless Networks," Mobile Computing, vol. 353, T. Imielinski and H. Korth, eds., Kluwer Academic, Boston, 1996, pp. 153-181.
-
(1996)
Mobile Computing
, vol.353
, pp. 153-181
-
-
Johnson, D.B.1
Maltz, D.A.2
-
6
-
-
0034547115
-
GPSR: Greedy perimeter stateless routing for wireless networks
-
ACM Press, New York
-
B. Karp and H.T. Kung, "GPSR: Greedy Perimeter Stateless Routing for Wireless Networks," Proc. 6th Ann. Int'l Conf. Mobile Computing and Networking (MobiCom 2000), ACM Press, New York, 2000, pp. 243-254.
-
(2000)
Proc. 6th Ann. Int'l Conf. Mobile Computing and Networking (MobiCom 2000)
, pp. 243-254
-
-
Karp, B.1
Kung, H.T.2
-
7
-
-
0010818647
-
Smurf IP denial-of-service attacks
-
CERT Coordination Center; Jan.
-
CERT Coordination Center, "Smurf IP Denial-of-Service Attacks," CERT Advisory CA-98:01, Jan. 1998.
-
(1998)
CERT Advisory
, vol.CA-98
, Issue.1
-
-
-
8
-
-
85031307530
-
Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers
-
C.E. Perkins and P. Bhagwat, "Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for Mobile Computers," Proc. SIGCOMM, ACM Press, New York, 1994, pp. 234-244.
-
Proc. SIGCOMM, ACM Press, New York, 1994
, pp. 234-244
-
-
Perkins, C.E.1
Bhagwat, P.2
-
9
-
-
85008056769
-
Protecting routing infrastructures from denial of service using cooperative intrusion detection
-
S. Cheung and K.N. Levitt, "Protecting Routing Infrastructures from Denial of Service Using Cooperative Intrusion Detection," Proc. Workshop New Security Paradigms, ACM Press, New York, 1997, pp. 94-106.
-
Proc. Workshop New Security Paradigms, ACM Press, New York, 1997
, pp. 94-106
-
-
Cheung, S.1
Levitt, K.N.2
-
11
-
-
0033357103
-
Securing ad hoc networks
-
L. Zhou and Z.J. Haas, "Securing Ad Hoc Networks," IEEE Network, vol. 13, no. 6 1999, pp. 24-30.
-
(1999)
IEEE Network
, vol.13
, Issue.6
, pp. 24-30
-
-
Zhou, L.1
Haas, Z.J.2
-
12
-
-
0035704362
-
Providing robust and ubiquitous security support for mobile ad hoc networks
-
IEEE CS Press, Los Alamitos, Calif.
-
J. Kong et al., "Providing Robust and Ubiquitous Security Support for Mobile ad hoc Networks," Proc. 9th Int'l Conf. Network Protocols (ICNP 01), IEEE CS Press, Los Alamitos, Calif., 2001, pp. 251-260.
-
(2001)
Proc. 9th Int'l Conf. Network Protocols (ICNP 01)
, pp. 251-260
-
-
Kong, J.1
-
13
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
S. Marti et al., "Mitigating Routing Misbehavior in Mobile Ad Hoc Networks," Proc. 6th Ann. Int'l Conf. Mobile Computing and Networking (MobiCom 2000), ACM Press, New York, 2000, pp. 255-265.
-
Proc. 6th Ann. Int'l Conf. Mobile Computing and Networking (MobiCom 2000), ACM Press, New York, 2000
, pp. 255-265
-
-
Marti, S.1
-
14
-
-
0027693935
-
Diversity coding for transparent self-healing and fault-tolerant communication networks
-
E. Ayanoglu et al., "Diversity Coding for Transparent Self-Healing and Fault-Tolerant Communication Networks," IEEE Trans. Comm., vol. 41, no. 11, 1993, pp. 1677-1686.
-
(1993)
IEEE Trans. Comm.
, vol.41
, Issue.11
, pp. 1677-1686
-
-
Ayanoglu, E.1
-
15
-
-
0030715989
-
Analysis of a denial of service attack on TCP
-
IEEE Press, Piscataway, N.J.
-
C.L. Schuba et al., "Analysis of a Denial of Service Attack on TCP," Proc. IEEE Symp. Security and Privacy, IEEE Press, Piscataway, N.J., 1997, pp. 208-223.
-
(1997)
Proc. IEEE Symp. Security and Privacy
, pp. 208-223
-
-
Schuba, C.L.1
-
16
-
-
84949938425
-
DOS-resistant authentication with client puzzles
-
T. Aura, P. Nikander, and J. Leiwo, "DOS-Resistant Authentication with Client Puzzles," Proc. Security Protocols Workshop 2000, Springer-Verlag, New York, 2000, pp. 170-177.
-
Proc. Security Protocols Workshop 2000, Springer-Verlag, New York, 2000
, pp. 170-177
-
-
Aura, T.1
Nikander, P.2
Leiwo, J.3
-
17
-
-
0034782102
-
A transmission control scheme for media access in sensor networks
-
ACM Press, New York
-
A. Woo and D.E. Culler, "A Transmission Control Scheme for Media Access in Sensor Networks," Proc. 7th Ann. Int'l Conf. Mobile Computing and Networking (MobiCom 2001), ACM Press, New York, 2001, pp. 221-235.
-
(2001)
Proc. 7th Ann. Int'l Conf. Mobile Computing and Networking (MobiCom 2001)
, pp. 221-235
-
-
Woo, A.1
Culler, D.E.2
-
18
-
-
84884315660
-
RAP: A real-time communication architecture for large-scale wireless sensor networks
-
IEEE CS Press, Los Alamitos, Calif.
-
C. Lu et al., "RAP: A Real-Time Communication Architecture for Large-Scale Wireless Sensor Networks," to appear in Proc. 8th Real-Time and Embedded Technology and Applications Symp. (RTAS 2002), IEEE CS Press, Los Alamitos, Calif. 2002.
-
(2002)
Proc. 8th Real-Time and Embedded Technology and Applications Symp. (RTAS 2002)
-
-
Lu, C.1
|