-
1
-
-
0003964874
-
Next-generation intrusion detection expert system (NIDES): A summary
-
Technical Report SRI-CSL-95-07, Computer Science Laboratory, SRI International, Menlo Park, California, May
-
D. Anderson, T. Frivold, and A. Valdes. Next-generation intrusion detection expert system (NIDES): A summary. Technical Report SRI-CSL-95-07, Computer Science Laboratory, SRI International, Menlo Park, California, May 1995.
-
(1995)
-
-
Anderson, D.1
Frivold, T.2
Valdes, A.3
-
2
-
-
0035271246
-
Authenticated ad hoc routing at the link layer for mobile systems
-
J. Binkley and W. Trost. Authenticated ad hoc routing at the link layer for mobile systems. Wireless Networks, 7(2): 139-145, 2001.
-
(2001)
Wireless Networks
, vol.7
, Issue.2
, pp. 139-145
-
-
Binkley, J.1
Trost, W.2
-
3
-
-
0037885580
-
Nodes bearing grudges: Towards routing security, fairness, and robustness in mobile ad hoc networks
-
Canary Islands, Spain, Jan.; IEEE Computer Society
-
S. Buchegger and J. L. Boudec. Nodes bearing grudges: Towards routing security, fairness, and robustness in mobile ad hoc networks. In Proceedings of the Tenth Euromicro Workshop on Parallel, Distributed and Network-based Processing, pages 403-410, Canary Islands, Spain, Jan. 2002. IEEE Computer Society.
-
(2002)
Proceedings of the Tenth Euromicro Workshop on Parallel, Distributed and Network-Based Processing
, pp. 403-410
-
-
Buchegger, S.1
Boudec, J.L.2
-
7
-
-
0003899978
-
The zone routing protocol (ZRP) for ad hoc networks
-
Internet draft draft-ietf-manetzone-zrp-04.txt, expired 2003, July
-
Z. Haas and M. R. Pearlman. The zone routing protocol (ZRP) for ad hoc networks. Internet draft draft-ietf-manetzone-zrp-04.txt, expired 2003, July 2000.
-
(2000)
-
-
Haas, Z.1
Pearlman, M.R.2
-
9
-
-
0035789229
-
The quest for security in mobile ad hoc networks
-
J. Hubaux, L. Buttyan, and S. Capkun. The quest for security in mobile ad hoc networks. In Proceeding of the ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), Long Beach, CA, 2001.
-
Proceeding of the ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), Long Beach, CA, 2001
-
-
Hubaux, J.1
Buttyan, L.2
Capkun, S.3
-
10
-
-
0000629443
-
Dynamic source routing in ad hoc wireless networks
-
In T. Imielinski and H. Korth, editors; Kluwer Academic Publishers
-
D. B. Johnson and D. A. Maltz. Dynamic source routing in ad hoc wireless networks. In T. Imielinski and H. Korth, editors, Mobile Computing, pages 153-181. Kluwer Academic Publishers, 1996.
-
(1996)
Mobile Computing
, pp. 153-181
-
-
Johnson, D.B.1
Maltz, D.A.2
-
13
-
-
0035249889
-
Performance comparison of two on-demand routing protocols for ad hoc networks
-
Feb.
-
C. Perkins, E. M. Royer, S. R. Das, and M. K. Marina. Performance comparison of two on-demand routing protocols for ad hoc networks. IEEE Personal Communications Magazine special issue on Ad hoc Networking, pages 16-28, Feb. 2001.
-
(2001)
IEEE Personal Communications Magazine Special Issue on Ad Hoc Networking
, pp. 16-28
-
-
Perkins, C.1
Royer, E.M.2
Das, S.R.3
Marina, M.K.4
-
15
-
-
0034771605
-
SPINS: Security protocols for sensor networks
-
A. Perrig, R. Szewczyk, V. Wen, D. E. Culler, and J. D. Tygar. SPINS: security protocols for sensor networks. In Mobile Computing and Networking, pages 189-199, 2001.
-
(2001)
Mobile Computing and Networking
, pp. 189-199
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.E.4
Tygar, J.D.5
-
17
-
-
0013294535
-
Secure routing protocols: Theory and practice
-
Technical report, North Carolina State University
-
F. Wang, B. Vetter, and S. F. Wu. Secure routing protocols: Theory and practice. Technical report, North Carolina State University, 2000.
-
(2000)
-
-
Wang, F.1
Vetter, B.2
Wu, S.F.3
|