-
1
-
-
0842326315
-
-
TR-2002-44, Institute for Systems Research, University of Maryland, May
-
R. Bobba, L. Eschenauer, V. Gligor and W. Arbaugh, "Bootstrapping Security Associations for Routing in Mobile Ad-Hoc Networks, TR-2002-44, Institute for Systems Research, University of Maryland, May 2002.
-
(2002)
Bootstrapping Security Associations for Routing in Mobile Ad-hoc Networks
-
-
Bobba, R.1
Eschenauer, L.2
Gligor, V.3
Arbaugh, W.4
-
2
-
-
84961572484
-
SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks
-
IEEE, Calicoon, NY, June
-
Y. C. Hu, D. B. Johnson, and A. Perrig, "SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks", in Proc. of 4th IEEE Workshop on Mobile Computing Systems & Applications (WMCSA), IEEE, Calicoon, NY, June 2002.
-
(2002)
Proc. of 4th IEEE Workshop on Mobile Computing Systems & Applications (WMCSA)
-
-
Hu, Y.C.1
Johnson, D.B.2
Perrig, A.3
-
4
-
-
0041973497
-
Packet Leashes: A defense Against Wormhole Attacks in Wireless Networks
-
March
-
Y. C. Hu, A. Perrig, and D. B. Johnson, "Packet Leashes: A defense Against Wormhole Attacks in Wireless Networks", in Proc. of IEEE Infocom, March 2003.
-
(2003)
Proc. of IEEE Infocom
-
-
Hu, Y.C.1
Perrig, A.2
Johnson, D.B.3
-
5
-
-
0035789229
-
The Quest for Security in Mobile Ad Hoc Networks
-
Long Beach, CA, USA
-
J. P. Hubaux, L. Buttyan and S. Capkun, "The Quest for Security in Mobile Ad Hoc Networks", in Proc. of ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC), Long Beach, CA, USA, 2001.
-
(2001)
Proc. of ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC)
-
-
Hubaux, J.P.1
Buttyan, L.2
Capkun, S.3
-
6
-
-
0001341422
-
DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks
-
C. Perkins (ed.), Ch. 5, Addison-Wesley
-
D. B. Johnson, D. A. Maltz, and J. Broch, "DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks" in Ad Hoc Networking, C. Perkins (ed.), Ch. 5, pp. 139-172, Addison-Wesley, 2001.
-
(2001)
Ad Hoc Networking
, pp. 139-172
-
-
Johnson, D.B.1
Maltz, D.A.2
Broch, J.3
-
7
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
S. Marti, T. Giuli, K. Lai, and M. Baker, "Mitigating routing misbehavior in mobile ad hoc networks", Proc. of 6th ACM/IEEE International Conference on Mobile Computing and Networking, pp. 255-265, 2000.
-
(2000)
Proc. of 6th ACM/IEEE International Conference on Mobile Computing and Networking
, pp. 255-265
-
-
Marti, S.1
Giuli, T.2
Lai, K.3
Baker, M.4
-
8
-
-
1642324009
-
Statistically Unique and Cryptographically Verifiable (SUCV) Identifiers and Addresses
-
San Diego, Feb.
-
G. Montenegro and C. Castelluccia, "Statistically Unique and Cryptographically Verifiable (SUCV) Identifiers and Addresses", Proc. of Network and Distributed System Security, San Diego, Feb. 2002.
-
(2002)
Proc. of Network and Distributed System Security
-
-
Montenegro, G.1
Castelluccia, C.2
-
10
-
-
0013093839
-
Child-proof Authentication for MIPv6 (CAM)
-
Apr.
-
G. O'Shea and M. Roe, "Child-proof Authentication for MIPv6 (CAM)", ACM Comp. Comm. Review, Apr. 2001
-
(2001)
ACM Comp. Comm. Review
-
-
O'Shea, G.1
Roe, M.2
-
13
-
-
0842283101
-
A Secure Routing Protocol for Ad Hoc Networks
-
Nov.
-
K. Sanzgiri, B. Dahill, B. Levine, C. Shields, E. Belding-Royer. "A Secure Routing Protocol for Ad Hoc Networks," Proc. of 2002 IEEE Int'l. Conf. on Network Protocols (ICNP), Nov. 2002.
-
(2002)
Proc. of 2002 IEEE Int'l. Conf. on Network Protocols (ICNP)
-
-
Sanzgiri, K.1
Dahill, B.2
Levine, B.3
Shields, C.4
Belding-Royer, E.5
-
14
-
-
0013413164
-
-
J. Wiley and Sons, Ltd., ISBN 0470 84493 0
-
F. Stajano, Security for Ubiquitous Computing, J. Wiley and Sons, Ltd., 2002, 247 pp., ISBN 0470 84493 0.
-
(2002)
Security for Ubiquitous Computing
, pp. 247
-
-
Stajano, F.1
|