-
2
-
-
0003582910
-
-
ch. Ad hoc On-Demand Distance Vector Routing. Addison-Wesley
-
C. E. Perkins and E. M. Royer, Ad hoc Networking, ch. Ad hoc On-Demand Distance Vector Routing. Addison-Wesley, 2000.
-
(2000)
Ad Hoc Networking
-
-
Perkins, C.E.1
Royer, E.M.2
-
3
-
-
0001341422
-
DSR: The dynamic source routing protocol for multi-hop wireless ad hoc networks
-
ch. 5, Addison-Wesley
-
D. B. Johnson, D. A. Maltz, and J. Broch, DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks. in Ad Hoc Networking, ch. 5, pp. 139-172. Addison-Wesley, 2001.
-
(2001)
Ad Hoc Networking
, pp. 139-172
-
-
Johnson, D.B.1
Maltz, D.A.2
Broch, J.3
-
7
-
-
0033357103
-
Securing ad hoc networks
-
November/December
-
L. Zhou and Z. Haas, "Securing ad hoc networks," IEEE Network Magazine, vol. 13, November/December 1999.
-
(1999)
IEEE Network Magazine
, vol.13
-
-
Zhou, L.1
Haas, Z.2
-
8
-
-
85084161952
-
PGP in constrained wireless devices
-
USENIX, August
-
M. Brown, D. Cheung, D. Hankerson, J. Hernandez, M. Kirkup, and A. Menezes., "PGP in constrained wireless devices," in The 9th USENIX Security Symposium, USENIX, August 2000.
-
(2000)
The 9th USENIX Security Symposium
-
-
Brown, M.1
Cheung, D.2
Hankerson, D.3
Hernandez, J.4
Kirkup, M.5
Menezes, A.6
-
12
-
-
0013091373
-
-
No. FIPS 198
-
The Keyed-Hash Message Authentication Code (HMAC). No. FIPS 198, National Institute for Standards and Technology (NIST), 2002. http://csrc.nist.gov/publications/fips/index.html.
-
(2002)
The Keyed-Hash Message Authentication Code (HMAC)
-
-
-
13
-
-
84961572484
-
SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks
-
IEEE, June
-
Y.-C. Hu, D. B. Johnson, and A. Perrig, "SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks," in The 4th IEEE Workshop on Mobile Computing Systems and Applications, IEEE, June 2002.
-
(2002)
The 4th IEEE Workshop on Mobile Computing Systems and Applications
-
-
Hu, Y.-C.1
Johnson, D.B.2
Perrig, A.3
-
15
-
-
15744368857
-
Efficient and secure source authentication for multicast
-
February
-
A. Perrig, R. Canetti, D. Song, and D. Tygar, "Efficient and secure source authentication for multicast," in Network and Distributed System Security Symposium, February 2001.
-
(2001)
Network and Distributed System Security Symposium
-
-
Perrig, A.1
Canetti, R.2
Song, D.3
Tygar, D.4
-
16
-
-
0004118143
-
-
Tech. Rep. 01-37, Department of Computer Science, University of Massachusetts, August
-
B. Dahill, B. Levine, C. Shields, and E. Royer, "A secure routing protocol for ad hoc networks," Tech. Rep. 01-37, Department of Computer Science, University of Massachusetts, August 2001.
-
(2001)
A Secure Routing Protocol for Ad Hoc Networks
-
-
Dahill, B.1
Levine, B.2
Shields, C.3
Royer, E.4
-
18
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
August
-
S. Marti, T. Giuli, K. Lai, and M. Baker, "Mitigating routing misbehavior in mobile ad hoc networks," in The 6th ACM International Conference on Mobile Computing and Networking, August 2000.
-
(2000)
The 6th ACM International Conference on Mobile Computing and Networking
-
-
Marti, S.1
Giuli, T.2
Lai, K.3
Baker, M.4
-
19
-
-
0031383687
-
An efficient message authentication scheme for link state routing
-
December
-
S. Cheung, "An efficient message authentication scheme for link state routing," in The 13th Annual Computer Security Applications Conference, pp. 90-98, December 1997.
-
(1997)
The 13th Annual Computer Security Applications Conference
, pp. 90-98
-
-
Cheung, S.1
-
21
-
-
0013144099
-
Efficient and secure network routing algorithms
-
January
-
M. T. Goodrich, "Efficient and secure network routing algorithms." Provisional patent filing., January 2001.
-
(2001)
Provisional Patent Filing
-
-
Goodrich, M.T.1
-
24
-
-
0032026162
-
Efficient security mechanisms for the border gateway routing protocol
-
B. Smith and J. Garcia-Luna-Aceves, "Efficient security mechanisms for the border gateway routing protocol," Computer Communications (Elsevier), vol. 21, no. 3, pp. 203-210, 1998.
-
(1998)
Computer Communications (Elsevier)
, vol.21
, Issue.3
, pp. 203-210
-
-
Smith, B.1
Garcia-Luna-Aceves, J.2
-
25
-
-
0013133602
-
Intrusion detection for link-state routing protocols
-
S. F. Wu, F. yi Wang, B. M. Vetter, W. R. Cleaveland, Y. F. Jou, F. Gong, and C. Sargor, "Intrusion detection for link-state routing protocols," in IEEE Symposium on Security and Privacy, 1997.
-
(1997)
IEEE Symposium on Security and Privacy
-
-
Wu, S.F.1
Yi Wang, F.2
Vetter, B.M.3
Cleaveland, W.R.4
Jou, Y.F.5
Gong, F.6
Sargor, C.7
-
26
-
-
0013090414
-
Statistical anomaly detection for link-state routing protocols
-
May
-
D. Qu, B. M. Vetter, F. Wang, R. Narayan, S. F. Wu, Y. F. Jou, F. Gong, and C. Sargor, "Statistical anomaly detection for link-state routing protocols," in IEEE Symposium on Security and Privacy (5 Minutes), May 1997.
-
(1997)
IEEE Symposium on Security and Privacy (5 Minutes)
-
-
Qu, D.1
Vetter, B.M.2
Wang, F.3
Narayan, R.4
Wu, S.F.5
Jou, Y.F.6
Gong, F.7
Sargor, C.8
-
27
-
-
0003307310
-
JiNao: Design and implementation of a scalable intrusion detection system for the OSPF routing protocol
-
S. Wu, H. Chang, D. Qu, F. W. F. Jou, F. Gong, C. Sargor, and R. Cleaveland, "JiNao: Design and implementation of a scalable intrusion detection system for the OSPF routing protocol," Journal of Computer Networks and ISDN Systems, 1999.
-
(1999)
Journal of Computer Networks and ISDN Systems
-
-
Wu, S.1
Chang, H.2
Qu, D.3
Jou, F.W.F.4
Gong, F.5
Sargor, C.6
Cleaveland, R.7
-
29
-
-
0013294745
-
Protecting routing infrastructures from denial of service using cooperative intrusion detection
-
S. Cheung and K. Levitt, "Protecting routing infrastructures from denial of service using cooperative intrusion detection," in New Security Paradigms Workshop, 1997.
-
(1997)
New Security Paradigms Workshop
-
-
Cheung, S.1
Levitt, K.2
-
30
-
-
0031703272
-
Detecting disruptive routers: A distributed network monitoring approach
-
K. A. Bradley, S. Cheung, N. Puketza, B. Mukherjee, and R. A. Olsson, "Detecting disruptive routers: A distributed network monitoring approach," in IEEE Symposium on Security and Privacy, 1998.
-
(1998)
IEEE Symposium on Security and Privacy
-
-
Bradley, K.A.1
Cheung, S.2
Puketza, N.3
Mukherjee, B.4
Olsson, R.A.5
-
32
-
-
85032668813
-
MACAW: A media access protocol for wireless LAN's
-
V. Bharghavan, A. J. Demers, S. Shenker, and L. Zhang, "MACAW: A media access protocol for wireless LAN's," in SIGCOMM, pp. 212-225, 1994.
-
(1994)
SIGCOMM
, pp. 212-225
-
-
Bharghavan, V.1
Demers, A.J.2
Shenker, S.3
Zhang, L.4
-
33
-
-
0013145154
-
When the CRC and TCP checksum disagree
-
August/September
-
J. Stone and C. Partridge, "When the CRC and TCP checksum disagree," in ACM SIGCOM, August/September 2000.
-
(2000)
ACM SIGCOM
-
-
Stone, J.1
Partridge, C.2
-
34
-
-
0017018484
-
New directions in cryptography
-
November
-
W. Diffie and M. E. Hellman, "New directions in cryptography," IEEE Trans. Inform. Theory, vol. IT-22, pp. 644-654, November 1976.
-
(1976)
IEEE Trans. Inform. Theory
, vol.IT-22
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.E.2
-
35
-
-
0003629991
-
-
No. FIPS 180-1
-
Secure Hash Standard (SHA1). No. FIPS 180-1, National Institute for Standards and Technology (NIST), 1995. http://www.itl.nist.gov/fipspubs/fip180-1.htm.
-
(1995)
Secure Hash Standard (SHA1)
-
-
-
36
-
-
0003508558
-
-
No. FIPS 197
-
Advanced Encryption Standard (AES). No. FIPS 197, National Institute for Standards and Technology (NIST), 2001. http://csrc.nist.gov/encryption/aes/.
-
(2001)
Advanced Encryption Standard (AES)
-
-
|