-
1
-
-
0013138682
-
Secure routing for mobile ad hoc networks
-
San Antonio, TX, Jan.
-
P. Papadimitratos and Z. J. Haas, "Secure routing for mobile ad hoc networks," Proc. SCS Commun. Networks and Distr. Modeling and Simul. Conf. (CNDS 2002), San Antonio, TX, pp. 1-13, Jan. 2002.
-
(2002)
Proc. SCS Commun. Networks and Distr. Modeling and Simul. Conf. (CNDS 2002)
, pp. 1-13
-
-
Papadimitratos, P.1
Haas, Z.J.2
-
2
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
Boston, MA, Aug.
-
th Annual ACM/IEEE Int. Conf. Mob. Computing and Networking (MobiCom), Boston, MA, pp. 255 - 265, Aug. 2000.
-
(2000)
th Annual ACM/IEEE Int. Conf. Mob. Computing and Networking (MobiCom)
, pp. 255-265
-
-
Marti, S.1
Giuli, T.J.2
Lai, K.3
Baker, M.4
-
4
-
-
0003826083
-
Security-aware ad-hoc routing for wireless networks
-
Dept. of Comp. Sci., Univ. of Illinois, Urbana-Champaign, IL, Aug.
-
S. Yi, P. Naldurg and R. Kravets, "Security-aware ad-hoc routing for wireless networks," Tech. Rpt. UIUCDCS-R-2001-2241, Dept. of Comp. Sci., Univ. of Illinois, Urbana-Champaign, IL, Aug. 2001.
-
(2001)
Tech. Rpt.
, vol.UIUCDCS-R-2001-2241
-
-
Yi, S.1
Naldurg, P.2
Kravets, R.3
-
6
-
-
1542356506
-
The dynamic source routing protocol for mobile ad hoc networks (DSR)
-
Feb.
-
D B. Johnson, D. A. Maltz and Y-C. Hu, "The dynamic source routing protocol for mobile ad hoc networks (DSR)," Internet Draft, MANET Working Group, IETF, Feb. 2002.
-
(2002)
Internet Draft, MANET Working Group, IETF
-
-
Johnson, D.B.1
Maltz, D.A.2
Hu, Y.-C.3
-
7
-
-
0003899978
-
The interzone routing protocol (BERP) for ad hoc networks
-
draft-ietf-manet-zone-ierp-01.txt, Jun 1
-
Z. J. Haas, M. Perlman and P. Samar, "The interzone routing protocol (BERP) for ad hoc networks," IETF MANET Working Group, draft-ietf-manet-zone-ierp-01.txt, Jun 1, 2001.
-
(2001)
IETF MANET Working Group
-
-
Haas, Z.J.1
Perlman, M.2
Samar, P.3
-
8
-
-
0035415758
-
The performance of query control schemes of the zone routing protocol
-
Aug.
-
Z. J. Haas and M. Perlman, "The performance of query control schemes of the zone routing protocol," IEEE/ACM Trans. Networking, 9, pp. 427-438, Aug. 2001.
-
(2001)
IEEE/ACM Trans. Networking
, vol.9
, pp. 427-438
-
-
Haas, Z.J.1
Perlman, M.2
-
9
-
-
0031096869
-
Associativity-based routing for ad-hoc mobile networks
-
Mar.
-
C. K. Toh, "Associativity-based routing for ad-hoc mobile networks, " Wireless Pers. Commun. J., 4, pp. 103-139, Mar. 1997.
-
(1997)
Wireless Pers. Commun. J.
, vol.4
, pp. 103-139
-
-
Toh, C.K.1
-
10
-
-
0344095743
-
Using elliptic curve Diffie-Hellman in the SPKM GSS-API
-
Aug.
-
R. Zucceratto and C. Adams, "Using elliptic curve Diffie-Hellman in the SPKM GSS-API," Internet Draft, IETF, Aug. 1999.
-
(1999)
Internet Draft, IETF
-
-
Zucceratto, R.1
Adams, C.2
-
11
-
-
0017018484
-
New directions in cryptography
-
Nov.
-
W. Diffie and M.E. Hellman, "New directions in cryptography," IEEE Trans. Info.Theory, 22, pp. 644-654, Nov. 1976.
-
(1976)
IEEE Trans. Info.Theory
, vol.22
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.E.2
-
12
-
-
0034317075
-
Key agreement in ad hoc networks
-
Nov. 1
-
N. Asokan and P. Ginzboorg, "Key agreement in ad hoc networks, " Comp. Commun., 23, pp. 1627-1637, Nov. 1, 2000.
-
(2000)
Comp. Commun.
, vol.23
, pp. 1627-1637
-
-
Asokan, N.1
Ginzboorg, P.2
-
13
-
-
84976699318
-
The Byzantine generals problem
-
Jul.
-
L. Lamport, R. Shostak and M. Pease, "The Byzantine generals problem," ACM Trans.v Program. Lang., 4, pp. 382-401, Jul. 1982.
-
(1982)
ACM Trans.v Program. Lang.
, vol.4
, pp. 382-401
-
-
Lamport, L.1
Shostak, R.2
Pease, M.3
-
14
-
-
0003580691
-
Wireless LAN media access control (MAC) and physical layer (PHY) specifications
-
IEEE Std. 802.11, "Wireless LAN media access control (MAC) and physical layer (PHY) specifications," http://standards.ieee.org/getieee802/, 1999.
-
(1999)
IEEE Std. 802.11
-
-
-
15
-
-
0003196107
-
HMAC: Keyed-hashing for message authentication
-
Feb.
-
H. Krawczyk, M. Bellare and R. Canetti, "HMAC: keyed-hashing for message authentication," IETF RFC 2104, Feb. 1997.
-
(1997)
IETF RFC
, vol.2104
-
-
Krawczyk, H.1
Bellare, M.2
Canetti, R.3
-
16
-
-
84944878354
-
-
CRC Press, Boca Raton, FL, Oct.
-
A. Menezes, P. van Oorschot and S. Vanstone, Handbook of Applied Cryptography, CRC Press, Boca Raton, FL, Oct. 1996
-
(1996)
Handbook of Applied Cryptography
-
-
Menezes, A.1
Van Oorschot, P.2
Vanstone, S.3
-
17
-
-
73249134721
-
Secure hash standard
-
Comp. Sys. Lab., MIST, Gaithersburg, MD, Apr.
-
"Secure hash standard," FIPS Pub. 180-1, Comp. Sys. Lab., MIST, Gaithersburg, MD, Apr. 1995.
-
(1995)
FIPS Pub.
, vol.180
, Issue.1
-
-
-
18
-
-
0003195066
-
The MD5 message-digest algorithm
-
Apr.
-
R. Rivest, "The MD5 message-digest algorithm," IETF RFC 1321, Apr. 1992.
-
(1992)
IETF RFC
, vol.1321
-
-
Rivest, R.1
-
19
-
-
0036613083
-
An immunity-based technique to characterize intrusions in computer networks
-
Jun.
-
D. Dagupta and F. Gonzalez. "An immunity-based technique to characterize intrusions in computer networks," IEEE Trans. Evol. Comput., 6, pp. 281-291, Jun. 2002.
-
(2002)
IEEE Trans. Evol. Comput.
, vol.6
, pp. 281-291
-
-
Dagupta, D.1
Gonzalez, F.2
-
21
-
-
84964461159
-
Mobile security agents for network traffic analysis
-
Anaheim, CA, Jun. 12-14
-
D. Dasgupta and H. Brian, "Mobile security agents for network traffic analysis," Proc. DARPA Inform. Surviv. Conf. and Expo. II (DISCEX-11), Anaheim, CA, Jun. 12-14, 2001.
-
(2001)
Proc. DARPA Inform. Surviv. Conf. and Expo. II (DISCEX-11)
-
-
Dasgupta, D.1
Brian, H.2
-
22
-
-
0034546374
-
Architecture for an artificial immune system
-
S. A. Hofmeyr and S. Forrest. "Architecture for an artificial immune system," Evol. Comput., 8, pp. 443-473, 2000.
-
(2000)
Evol. Comput.
, vol.8
, pp. 443-473
-
-
Hofmeyr, S.A.1
Forrest, S.2
-
24
-
-
0029718285
-
An immunological approach to change detection: Algorithms, analysis, and implications
-
Oakland, CA, May
-
P. D'haeseleer, S. Forrest and P. Helman, "An immunological approach to change detection: algorithms, analysis, and implications," Proc. 1996 IEEE Symp. Comp. Security and Privacy, Oakland, CA, pp. 110-119, May 1996.
-
(1996)
Proc. 1996 IEEE Symp. Comp. Security and Privacy
, pp. 110-119
-
-
D'Haeseleer, P.1
Forrest, S.2
Helman, P.3
-
25
-
-
0027961889
-
Self-nonself discrimination in a computer
-
Los Alamitos. CA, May
-
S. Forrest, A. Perelson, L. Allen and R. Cherukuri, "Self-nonself discrimination in a computer," Proc. 1994 IEEE Symp. on Resrch in Security and Privacy, Los Alamitos. CA, May 1994.
-
(1994)
Proc. 1994 IEEE Symp. on Resrch in Security and Privacy
-
-
Forrest, S.1
Perelson, A.2
Allen, L.3
Cherukuri, R.4
-
26
-
-
0016557674
-
Multidimensional binary search trees used for associative searching
-
Sept.
-
J. L. Bentley, "Multidimensional binary search trees used for associative searching," Commun. ACM, 18, pp. 509-517, Sept. 1975.
-
(1975)
Commun. ACM
, vol.18
, pp. 509-517
-
-
Bentley, J.L.1
-
28
-
-
84945709355
-
An algorithm for finding best matches in logarithmic expected time
-
Sept.
-
J. H. Friedman, J. L. Bentley and R. A. Finkel, "An algorithm for finding best matches in logarithmic expected time," ACM Trans. Math Softw., 3. pp. 209-226, Sept. 1977.
-
(1977)
ACM Trans. Math Softw.
, vol.3
, pp. 209-226
-
-
Friedman, J.H.1
Bentley, J.L.2
Finkel, R.A.3
-
33
-
-
0002900357
-
The case against accuracy estimation for comparing induction algorithms
-
Madison, WI, Jul.
-
th Int. Conf. Mach. Learning, Madison, WI, pp.445-453, Jul. 1998.
-
(1998)
th Int. Conf. Mach. Learning
, pp. 445-453
-
-
Provost, F.1
Fawcett, T.2
Kohavi, R.3
-
34
-
-
0012021893
-
Novelty detection in time series data using ideas from immunology
-
Jun.
-
D. Dasgupta and S. Forrest, "Novelty detection in time series data using ideas from immunology," Proc. Int. Conf. on Intelligent Sys., pp. 82-87, Jun. 1996.
-
(1996)
Proc. Int. Conf. on Intelligent Sys.
, pp. 82-87
-
-
Dasgupta, D.1
Forrest, S.2
-
36
-
-
0000401181
-
A sequential niche technique for multimodal function optimization
-
D. Beasley, D. R. Bull and R. R. Martin, "A sequential niche technique for multimodal function optimization," Evol. Comput., 1, pp. 101-125, 1993.
-
(1993)
Evol. Comput.
, vol.1
, pp. 101-125
-
-
Beasley, D.1
Bull, D.R.2
Martin, R.R.3
-
37
-
-
0009949716
-
Evolving complex fuzzy classifier rules using a linear genetic representation
-
Morgan Kaufman, San Fran., CA, July
-
D. Dagupta and F. González, "Evolving complex fuzzy classifier rules using a linear genetic representation," Proc. Int. Conf. Genet. and Evol. Comput. (GECCO), Morgan Kaufman, San Fran., CA, July 2001
-
(2001)
Proc. Int. Conf. Genet. and Evol. Comput. (GECCO)
-
-
Dagupta, D.1
González, F.2
-
38
-
-
84955591263
-
An intelligent decision support system for intrusion detection and response
-
St. Petersburg, Rus., Springer-Verlag, New York, NY, May
-
D. Dagupta and F. González, "An intelligent decision support system for intrusion detection and response," Info. Assurance in Comp. Networks, Lecture Notes in Comp.Sci., Proc. Int. Wrkshp Math. Meth., Models, and Architect. Comp. Netwks Security (MMM-ACNS), St. Petersburg, Rus., Springer-Verlag, New York, NY, pp. 1-14, May 2001.
-
(2001)
Info. Assurance in Comp. Networks, Lecture Notes in Comp.Sci., Proc. Int. Wrkshp Math. Meth., Models, and Architect. Comp. Netwks Security (MMM-ACNS)
, pp. 1-14
-
-
Dagupta, D.1
González, F.2
-
40
-
-
0003843664
-
Ad hoc on-demand distance vector routing
-
draft-ietf-manet-aodv-12.txt, Nov.
-
C.E. Perkins, E.M. Royer, and S.R. Das, "Ad hoc on-demand distance vector routing," Internet Draft, MANET Working Group, IETF, draft-ietf-manet-aodv-12.txt, Nov. 2002.
-
(2002)
Internet Draft, MANET Working Group, IETF
-
-
Perkins, C.E.1
Royer, E.M.2
Das, S.R.3
|