-
1
-
-
0002431508
-
The ALOHA system-another alternative for computer communications
-
November
-
Norman Abramson. The ALOHA System-Another Alternative for Computer Communications. In Proceedings of the Fall 1970 AFIPS Computer Conference, pages 281-285, November 1970.
-
(1970)
Proceedings of the Fall 1970 AFIPS Computer Conference
, pp. 281-285
-
-
Abramson, N.1
-
2
-
-
0035789267
-
Secure peblenets
-
October
-
Stefano Basagni, Kris Herrin, Emilia Rosti, and Danilo Bruschi. Secure Peblenets. In Proceedings of the Second Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 2001), pages 156-163, October 2001.
-
(2001)
Proceedings of the Second Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 2001)
, pp. 156-163
-
-
Basagni, S.1
Herrin, K.2
Rosti, E.3
Bruschi, D.4
-
3
-
-
35048891868
-
Keying hash functions for message authentication
-
In Advances in Cryptology - Crypto '96 edited by Neal Koblitz; Springer-Verlag
-
Mihir Bellare, Ran Canetti, and Hugo Krawczyk. Keying Hash Functions for Message Authentication. In Advances in Cryptology - Crypto '96, edited by Neal Koblitz, pages 1-15. Springer-Verlag, 1996. Lecture Notes in Computer Science Volume 1109.
-
(1996)
Lecture Notes in Computer Science
, vol.1109
, pp. 1-15
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
5
-
-
85032668813
-
MACAW: A media access protocol for wireless LANs
-
August
-
Vaduvur Bharghavan, Alan Demers, Scott Shenker, and Lixia Zhang. MACAW: A Media Access Protocol for Wireless LANs. In Proceedings of the SIGCOMM '94 Conference on Communications Architectures, Protocols and Applications, pages 212-225, August 1994.
-
(1994)
Proceedings of the SIGCOMM '94 Conference on Communications Architectures, Protocols and Applications
, pp. 212-225
-
-
Bharghavan, V.1
Demers, A.2
Shenker, S.3
Zhang, L.4
-
6
-
-
0031703272
-
Detecting disruptive routers: A distributed network monitoring approach
-
May
-
Kirk A. Bradley, Steven Cheung, Nick Puketza, Biswanath Mukherjee, and Ronald A. Olsson. Detecting Disruptive Routers: A Distributed Network Monitoring Approach. In Proceedings of the IEEE Symposium on Research in Security and Privacy, pages 115-124, May 1998.
-
(1998)
Proceedings of the IEEE Symposium on Research in Security and Privacy
, pp. 115-124
-
-
Bradley, K.A.1
Cheung, S.2
Puketza, N.3
Mukherjee, B.4
Olsson, R.A.5
-
7
-
-
85106319926
-
A performance comparison of multi-hop wireless Ad Hoc network routing protocols
-
October
-
Josh Broch, David A. Maltz, David B. Johnson, Yih-Chun Hu, and Jorjeta G. Jetcheva. A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. In Proceedings of the Fourth ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom'98), pages 85-97, October 1998.
-
(1998)
Proceedings of the Fourth ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom'98)
, pp. 85-97
-
-
Broch, J.1
Maltz, D.A.2
Johnson, D.B.3
Hu, Y.-C.4
Jetcheva, J.G.5
-
8
-
-
85084161952
-
PGP in constrained wireless devices
-
August
-
Michael Brown, Donny Cheung, Darrel Hankerson, Julio Lopez Hernandez, Michael Kirkup, and Alfred Menezes. PGP in Constrained Wireless Devices. In 9th USENIX Security Symposium, pages 247-261, August 2000.
-
(2000)
9th USENIX Security Symposium
, pp. 247-261
-
-
Brown, M.1
Cheung, D.2
Hankerson, D.3
Lopez Hernandez, J.4
Kirkup, M.5
Menezes, A.6
-
9
-
-
0031383687
-
An efficient message authentication scheme for link state routing
-
Steven Cheung. An Efficient Message Authentication Scheme for Link State Routing. In 13th Annual Computer Security Applications Conference, pages 90-98, 1997.
-
(1997)
13th Annual Computer Security Applications Conference
, pp. 90-98
-
-
Cheung, S.1
-
10
-
-
85008056769
-
Protecting routing infrastructures from denial of service using cooperative intrusion detection
-
September
-
Steven Cheung and Karl Levitt. Protecting Routing Infrastructures from Denial of Service Using Cooperative Intrusion Detection. In The 1997 New Security Paradigms Workshop, pages 94-106, September 1998.
-
(1998)
The 1997 New Security Paradigms Workshop
, pp. 94-106
-
-
Cheung, S.1
Levitt, K.2
-
11
-
-
0012609256
-
Tom Clark's totally accurate clock FTP site
-
Greenbelt, Maryland
-
Tom Clark. Tom Clark's Totally Accurate Clock FTP Site. Greenbelt, Maryland. Available at ftp://aleph.gsfc.nasa.gov/GPS/totally.accurate.clock/.
-
-
-
Clark, T.1
-
13
-
-
0004118143
-
A secure routing protocol for ad hoc networks
-
Technical Report UM-CS-2001-037, Electrical Engineering and Computer Science, University of Michigan, August
-
Bridget Dahill, Brian Neil Levine, Elizabeth Royer, and Clay Shields. A Secure Routing Protocol for Ad Hoc Networks. Technical Report UM-CS-2001-037, Electrical Engineering and Computer Science, University of Michigan, August 2001.
-
(2001)
-
-
Dahill, B.1
Levine, B.N.2
Royer, E.3
Shields, C.4
-
14
-
-
0004035649
-
The TLS protocol version 1.0
-
RFC 2246, January
-
T. Dierks and C. Allen. The TLS protocol version 1.0. RFC 2246, January 1999.
-
(1999)
-
-
Dierks, T.1
Allen, C.2
-
17
-
-
0003523471
-
Protection of BGP sessions via the TCP MD5 signature option
-
RFC 2385, August
-
Andy Hefferman. Protection of BGP Sessions via the TCP MD5 Signature Option. RFC 2385, August 1998.
-
(1998)
-
-
Hefferman, A.1
-
21
-
-
0012575586
-
Packet leashes: A defense against wormhole attacks in wireless ad hoc networks
-
Technical report, Department of Computer Science, Rice University, December
-
Yih-Chun Hu, Adrian Perrig, and David B. Johnson. Packet Leashes: A Defense against Wormhole Attacks in Wireless Ad Hoc Networks. Technical report, Department of Computer Science, Rice University, December 2001.
-
(2001)
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
22
-
-
3042667172
-
Rushing attacks and defense in wireless ad hoc network routing protocols
-
Technical Report TR01-384, Department of Computer Science, Rice University, June
-
Yih-Chun Hu, Adrian Perrig, and David B. Johnson. Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols. Technical Report TR01-384, Department of Computer Science, Rice University, June 2002.
-
(2002)
-
-
Hu, Y.1
Perrig, A.2
Johnson, D.B.3
-
25
-
-
84944414022
-
Scenario-based performance analysis of routing protocols for mobile ad-hoc networks
-
August
-
Per Johansson, Tony Larsson, Nicklas Hedman, Bartosz Mielczarek, and Mikael Degermark. Scenario-based Performance Analysis of Routing Protocols for Mobile Ad-hoc Networks. In Proceedings of the Fifth Annual ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom'99), pages 195-206, August 1999.
-
(1999)
Proceedings of the Fifth Annual ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom'99)
, pp. 195-206
-
-
Johansson, P.1
Larsson, T.2
Hedman, N.3
Mielczarek, B.4
Degermark, M.5
-
27
-
-
0000629443
-
Dynamic source routing in ad hoc wireless networks
-
edited by Tomasz Imielinski and Hank Korth, chapter 5; Kluwer Academic Publishers
-
David B. Johnson and David A. Maltz. Dynamic Source Routing in Ad Hoc Wireless Networks. In Mobile Computing. edited by Tomasz Imielinski and Hank Korth, chapter 5, pages 153-181. Kluwer Academic Publishers, 1996.
-
(1996)
Mobile Computing
, pp. 153-181
-
-
Johnson, D.B.1
Maltz, D.A.2
-
28
-
-
0003597247
-
The dynamic source routing protocol for mobile ad hoc networks
-
Internet-Draft, draft-ietf-manet-dsr-07.txt, February; Work in progress
-
David B. Johnson, David A. Maltz, Yih-Chun Hu, and Jorjeta G. Jetcheva. The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks. Internet-Draft, draft-ietf-manet-dsr-07.txt, February 2002. Work in progress.
-
(2002)
-
-
Johnson, D.B.1
Maltz, D.A.2
Hu, Y.-C.3
Jetcheva, J.G.4
-
29
-
-
0023139974
-
The DARPA packet radio network protocols
-
January
-
John Jubin and Janet D. Tornow. The DARPA Packet Radio Network Protocols. Proceedings of the IEEE, 75(1):21-32, January 1987.
-
(1987)
Proceedings of the IEEE
, vol.75
, Issue.1
, pp. 21-32
-
-
Jubin, J.1
Tornow, J.D.2
-
30
-
-
84867338222
-
Secure border gateway protocol (S-BGP) - Real world performance and deployment issues
-
February
-
Stephen Kent, Charles Lynn, Joanne Mikkelson, and Karen Seo. Secure Border Gateway Protocol (S-BGP) - Real World Performance and Deployment Issues. In Symposium on Network and Distributed Systems Security (NDSS '00), pages 103-116, February 2000.
-
(2000)
Symposium on Network and Distributed Systems Security (NDSS '00)
, pp. 103-116
-
-
Kent, S.1
Lynn, C.2
Mikkelson, J.3
Seo, K.4
-
33
-
-
0003899818
-
The kerberos network authentication service (V5)
-
RFC 1510, September
-
John Kohl and B Clifford Neuman. The Kerberos Network Authentication Service (V5). RFC 1510, September 1993.
-
(1993)
-
-
Kohl, J.1
Clifford Neuman, B.2
-
34
-
-
0012580890
-
Integration of security in network routing protocols
-
B. Kumar. Integration of Security in Network Routing Protocols. SIGSAC Review, 11(2):18-25, 1993.
-
(1993)
SIGSAC Review
, vol.11
, Issue.2
, pp. 18-25
-
-
Kumar, B.1
-
35
-
-
0032667063
-
The effects of on-demand behavior in routing protocols for multi-hop wireless ad hoc networks
-
August
-
David A. Maltz, Josh Broch, Jorjeta Jetcheva, and David B. Johnson. The Effects of On-Demand Behavior in Routing Protocols for Multi-Hop Wireless Ad Hoc Networks. IEEE Journal on Selected Areas in Communications, 17(8):1439-1453, August 1999.
-
(1999)
IEEE Journal on Selected Areas in Communications
, vol.17
, Issue.8
, pp. 1439-1453
-
-
Maltz, D.A.1
Broch, J.2
Jetcheva, J.3
Johnson, D.B.4
-
36
-
-
0034541756
-
Mitigating routing misbehaviour in mobile ad hoc networks
-
August
-
Sergio Marti, T.J. Giuli, Kevin Lai, and Mary Baker. Mitigating Routing Misbehaviour in Mobile Ad Hoc Networks. In Proceedings of the Sixth Annual IEEE/ACM International Conference on Mobile Computing and Networking (MobiCom 2000), pages 255-265, August 2000.
-
(2000)
Proceedings of the Sixth Annual IEEE/ACM International Conference on Mobile Computing and Networking (MobiCom 2000)
, pp. 255-265
-
-
Marti, S.1
Giuli, T.J.2
Lai, K.3
Baker, M.4
-
37
-
-
0003424562
-
TCP selective acknowledgement options
-
RFC 2018, October
-
Matt Mathis, Jamshid Mahdavi, Sally Floyd, and Allyn Romanow. TCP Selective Acknowledgement Options. RFC 2018, October 1996.
-
(1996)
-
-
Mathis, M.1
Mahdavi, J.2
Floyd, S.3
Romanow, A.4
-
39
-
-
0003672666
-
Neighbor discovery for IP version 6 (IPv6)
-
RFC 2461, December
-
Thomas Narten, Erik Nordmark, and William Allen Simpson. Neighbor Discovery for IP Version 6 (IPv6). RFC 2461, December 1998.
-
(1998)
-
-
Narten, T.1
Nordmark, E.2
Simpson, W.A.3
-
43
-
-
15744368857
-
Efficient and secure source authentication for multicast
-
February
-
Adrian Perrig, Ran Canetti, Dawn Song, and J. D. Tygar. Efficient and Secure Source Authentication for Multicast. In Network and Distributed System Security Symposium, NDSS '01, pages 35-46, February 2001.
-
(2001)
Network and Distributed System Security Symposium, NDSS '01
, pp. 35-46
-
-
Perrig, A.1
Canetti, R.2
Song, D.3
Tygar, J.D.4
-
44
-
-
0033690336
-
Efficient authentication and signing of multicast streams over lossy channels
-
May
-
Adrian Perrig, Ran Canetti, J.D. Tygar, and Dawn Song. Efficient Authentication and Signing of Multicast Streams over Lossy Channels. In IEEE Symposium on Security and Privacy, pages 56-73, May 2000.
-
(2000)
IEEE Symposium on Security and Privacy
, pp. 56-73
-
-
Perrig, A.1
Canetti, R.2
Tygar, J.D.3
Song, D.4
-
45
-
-
0034771605
-
SPINS: Security protocols for sensor networks
-
July
-
Adrian Perrig, Robert Szewczyk, Vector Wen, David Culler, and J. D. Tygar. SPINS: Security Protocols for Sensor Networks. In Proceedings of the Seventh Annual International Conference on Mobile Computing and Networking (MobiCom 2001), pages 189-199, July 2001.
-
(2001)
Proceedings of the Seventh Annual International Conference on Mobile Computing and Networking (MobiCom 2001)
, pp. 189-199
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, J.D.5
-
46
-
-
0020128340
-
Theory of spread spectrum communications - A tutorial
-
May
-
Raymond L. Pickholtz, Donald L. Schilling, and Laurence B. Milstein. Theory of Spread Spectrum Communications - A Tutorial. IEEE Transactions on Communications, 30(5):855-884, May 1982.
-
(1982)
IEEE Transactions on Communications
, vol.30
, Issue.5
, pp. 855-884
-
-
Pickholtz, R.L.1
Schilling, D.L.2
Milstein, L.B.3
-
48
-
-
0004092895
-
A border gateway protocol 4 (BGP-4)
-
RFC 1771, March
-
Yakov Rekhter and Tony Li. A Border Gateway Protocol 4 (BGP-4). RFC 1771, March 1995.
-
(1995)
-
-
Rekhter, Y.1
Li, T.2
-
49
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
Ronald L. Rivest, Adi Shamir, and Leonard M. Adleman. A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM, 21(2):120-126, 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.M.3
-
50
-
-
0030373106
-
Securing the border gateway routing protocol
-
November
-
Bradley R. Smith and J.J. Garcia-Luna-Aceves. Securing the Border Gateway Routing Protocol. In Global Internet'96, pages 81-85, November 1996.
-
(1996)
Global Internet'96
, pp. 81-85
-
-
Smith, B.R.1
Garcia-Luna-Aceves, J.J.2
-
52
-
-
85177185807
-
The resurrecting duckling: Security issues for ad-hoc wireless networks
-
Frank Stajano and Ross Anderson. The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks. In Security Protocols, 7th International Workshop, volume 1796 of Lecture Notes in Computer Science, Springer Verlag, 1999.
-
Security Protocols, 7th International Workshop, Volume 1796 of Lecture Notes in Computer Science, Springer Verlag, 1999
-
-
Stajano, F.1
Anderson, R.2
-
53
-
-
85177170726
-
-
Trimble Navigation Limited. Data Sheet and Specifications for Trimble Thunderbolt GPS Disciplined Clock. Sunnyvale, California
-
Trimble Navigation Limited. Data Sheet and Specifications for Trimble Thunderbolt GPS Disciplined Clock. Sunnyvale, California. Available at http://www.trimble.com/thunderbolt.html.
-
-
-
-
54
-
-
0035731128
-
Multipath routing in mobile ad hoc networks or how to route in the presence of topological changes
-
October
-
Aristotelis Tsirigos and Zygmunt J. Haas. Multipath Routing in Mobile Ad Hoc Networks or How to Route in the Presence of Topological Changes. In Proceedings of IEEE MILCOM 2001, pages 878-883, October 2001.
-
(2001)
Proceedings of IEEE MILCOM 2001
, pp. 878-883
-
-
Tsirigos, A.1
Haas, Z.J.2
-
55
-
-
0003826083
-
Security-aware ad hoc routing for wireless networks
-
Technical Report UIUCDCS-R-2001-2241, Department of Computer Science, University of Illinois at Urbana-Champaign, August
-
Seung Yi, Prasad Naldurg, and Robin Kravets. Security-Aware Ad hoc Routing for Wireless Networks. Technical Report UIUCDCS-R-2001-2241, Department of Computer Science, University of Illinois at Urbana-Champaign, August 2001.
-
(2001)
-
-
Yi, S.1
Naldurg, P.2
Kravets, R.3
-
56
-
-
0003456435
-
Secure ad hoc on-demand distance vector (SAODV) routing
-
IETF MANET Mailing List, Message-ID:3BC17B40.BBF52E09@nokia.com; October 8
-
Manel Guerrero Zapata. Secure Ad hoc On-Demand Distance Vector (SAODV) Routing. IETF MANET Mailing List, Message-ID:3BC17B40.BBF52E09@nokia.com, Available at ftp://manet.itd.nrl.navy.mil/pub/manet/2001-10.mail, October 8, 2001.
-
(2001)
-
-
Zapata, M.G.1
-
58
-
-
0033357103
-
Securing ad hoc networks
-
November/December
-
Lidong Zhou and Zygmunt J. Haas. Securing Ad Hoc Networks. IEEE Network Magazine, 13(6):24-30, November/December 1999.
-
(1999)
IEEE Network Magazine
, vol.13
, Issue.6
, pp. 24-30
-
-
Zhou, L.1
Haas, Z.J.2
|