-
1
-
-
11244291652
-
-
White Paper by NetScreen Technologies Inc., March
-
GPRS security threats and solutions. White Paper by NetScreen Technologies Inc., March 2002.
-
(2002)
GPRS Security Threats and Solutions
-
-
-
3
-
-
27544460639
-
Mitigating byzantine attacks in ad hoc wireless networks
-
March.
-
AWERBUCH, B., CURTMOLA, R., HOLMER, D., NITA-ROTARU, C., AND RUBENS, H. Mitigating byzantine attacks in ad hoc wireless networks. Tech. rep., March.
-
Tech. Rep.
-
-
Awerbuch, B.1
Curtmola, R.2
Holmer, D.3
Nita-Rotaru, C.4
Rubens, H.5
-
4
-
-
0036986441
-
An on-demand secure routing protocol resilient to byzantine failures
-
September
-
AWERBUCH, B., HOLMER, D., NITA-ROTARU, C., AND RUBENS, H. An on-demand secure routing protocol resilient to byzantine failures. In ACM Workshop on Wireless Security (WiSe) (September 2002).
-
(2002)
ACM Workshop on Wireless Security (WiSe)
-
-
Awerbuch, B.1
Holmer, D.2
Nita-Rotaru, C.3
Rubens, H.4
-
5
-
-
0242711168
-
High throughput route selection in multi-rate ad hoc wireless networks
-
March
-
AWERBUCH, B., HOLMER, D., AND RUBENS, H. High throughput route selection in multi-rate ad hoc wireless networks. Tech. rep., March 2003.
-
(2003)
Tech. Rep.
-
-
Awerbuch, B.1
Holmer, D.2
Rubens, H.3
-
6
-
-
0031988269
-
Performance evaluation of the orca shared-object system
-
BAL, H. E., BHOEDJANG, R., HOFMAN, R., JACOBS, C., LANGENDOEN, K., RUHL, T., AND KAASHOEK, M. F. Performance evaluation of the orca shared-object system. ACM Trans. Comput. Syst. 16, 1 (1998), 1-10.
-
(1998)
ACM Trans. Comput. Syst.
, vol.16
, Issue.1
, pp. 1-10
-
-
Bal, H.E.1
Bhoedjang, R.2
Hofman, R.3
Jacobs, C.4
Langendoen, K.5
Ruhl, T.6
Kaashoek, M.F.7
-
7
-
-
35248861711
-
Instant ciphertext-only cryptanalysis of gsm encrypted communication
-
LNCS
-
BARKAN, E., BIHAM, E., AND KELLER, N. Instant ciphertext-only cryptanalysis of gsm encrypted communication. In Proceedings of CRYPTO2003 (2003), LNCS, pp. 600-616.
-
(2003)
Proceedings of CRYPTO2003
, pp. 600-616
-
-
Barkan, E.1
Biham, E.2
Keller, N.3
-
8
-
-
84925368904
-
802.11 denial-of-service attacks: Real vulnerabilities and practical solutions
-
BELLARDO, J., AND SAVAGE, S. 802.11 denial-of-service attacks: Real vulnerabilities and practical solutions. In USENIX 2003 (2003).
-
(2003)
USENIX 2003
-
-
Bellardo, J.1
Savage, S.2
-
9
-
-
11244290742
-
Secure and privacy-preserving communication in hybrid ad hoc networks
-
EPFL-IC, January
-
CAPKUN, S., HUBAUX, J. P., AND JAKOBSSON, M. Secure and privacy-preserving communication in hybrid ad hoc networks. Tech. Rep. IC/2004/10, EPFL-IC, January 2004.
-
(2004)
Tech. Rep.
, vol.IC-2004-10
-
-
Capkun, S.1
Hubaux, J.P.2
Jakobsson, M.3
-
12
-
-
1542359009
-
A high-throughput path metric for multi-hop wireless routing
-
ACM Press
-
DE COUTO, D. S. J., AGUAYO, D., BICKET, J., AND MORRIS, R. A high-throughput path metric for multi-hop wireless routing. In Proceedings of the 9th annual international conference on Mobile computing and networking (2003), ACM Press, pp. 134-146.
-
(2003)
Proceedings of the 9th Annual International Conference on Mobile Computing and Networking
, pp. 134-146
-
-
De Couto, D.S.J.1
Aguayo, D.2
Bicket, J.3
Morris, R.4
-
13
-
-
0000914873
-
Ambivalent data structures for dynamic 2-edge-connectivity and k smallest spanning trees
-
FREDERICKSON, G. N. Ambivalent data structures for dynamic 2-edge-connectivity and k smallest spanning trees. SIAM J. of Comp. 26(2) (1997), 484-538.
-
(1997)
SIAM J. of Comp.
, vol.26
, Issue.2
, pp. 484-538
-
-
Frederickson, G.N.1
-
14
-
-
3042691604
-
An ad hoc routing protocol in hybrid wireless networks for emergency communications
-
March
-
FUJIWARA, T., IIDA, N., AND WATANABE, T. An ad hoc routing protocol in hybrid wireless networks for emergency communications. In IEEE ICDCS2004 (WWAN2004) (March 2004), pp. 748-754.
-
(2004)
IEEE ICDCS2004 (WWAN2004)
, pp. 748-754
-
-
Fujiwara, T.1
Iida, N.2
Watanabe, T.3
-
15
-
-
0033324263
-
On location-restricted services
-
Nov/Dec
-
GABBER, E., AND WOOL, A. On location-restricted services. IEEE Network 13 (Nov/Dec 1999), 44-52.
-
(1999)
IEEE Network
, vol.13
, pp. 44-52
-
-
Gabber, E.1
Wool, A.2
-
20
-
-
84950280844
-
A multichannel CSMA MAC protocol with receiver-based channel selection for multihop wireless networks
-
JAIN, N., DAS, S., AND NASIPURI, A. A multichannel CSMA MAC protocol with receiver-based channel selection for multihop wireless networks. In Proceedings of IEEE IC3N, Phoenix, October 2001. (2001).
-
(2001)
Proceedings of IEEE IC3N, Phoenix, October 2001
-
-
Jain, N.1
Das, S.2
Nasipuri, A.3
-
22
-
-
11244327295
-
-
Addison-Wesley, ch. 5
-
JOHNSON, D. B., MALTZ, D. A., AND BROCH, J. DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks, in Ad Hoc Networking. Addison-Wesley, 2001, ch. 5, pp. 139-172.
-
(2001)
DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks, in Ad Hoc Networking
, pp. 139-172
-
-
Johnson, D.B.1
Maltz, D.A.2
Broch, J.3
-
24
-
-
1542358969
-
Ucan: A unified cellular and ad-hoc network architecture
-
ACM Press
-
LUO, H., RAMJEE, R., SINHA, P., Li, L. E., AND LU, S. Ucan: a unified cellular and ad-hoc network architecture. In Proceedings of the 9th annual international conference on Mobile computing and networking (2003), ACM Press, pp. 353-367.
-
(2003)
Proceedings of the 9th Annual International Conference on Mobile Computing and Networking
, pp. 353-367
-
-
Luo, H.1
Ramjee, R.2
Sinha, P.3
Li, L.E.4
Lu, S.5
-
25
-
-
2442572177
-
An incentive mechanism for p2p networks
-
IEEE Computer Society
-
MA, R. T. B., LEE, S. C. M., LUI, J. C. S., AND YAU, D. K. Y. An incentive mechanism for p2p networks. In Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS'04) (2004), IEEE Computer Society, pp. 516-523.
-
(2004)
Proceedings of the 24th International Conference on Distributed Computing Systems (ICDCS'04)
, pp. 516-523
-
-
Ma, R.T.B.1
Lee, S.C.M.2
Lui, J.C.S.3
Yau, D.K.Y.4
-
26
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
August
-
MARTI, S., GIULI, T., LAI, K., AND BAKER, M. Mitigating routing misbehavior in mobile ad hoc networks. In The 6th ACM International Conference on Mobile Computing and Networking (August 2000).
-
(2000)
The 6th ACM International Conference on Mobile Computing and Networking
-
-
Marti, S.1
Giuli, T.2
Lai, K.3
Baker, M.4
-
31
-
-
0003582910
-
-
Addison-Wesley, ch. Ad hoc Om-Demand Distance Vector Routing
-
PERKINS, C. E., AND ROYER, E. M. Ad hoc Networking. Addison-Wesley, 2000, ch. Ad hoc Om-Demand Distance Vector Routing.
-
(2000)
Ad Hoc Networking
-
-
Perkins, C.E.1
Royer, E.M.2
-
32
-
-
0242527340
-
A charging and rewarding scheme for packet forwarding in multi-hop cellular networks
-
ACM Press
-
SALEM, N. B., BUTTYAN, L., HUBAUX, J.-P., AND JAKOBSSON, M. A charging and rewarding scheme for packet forwarding in multi-hop cellular networks. In Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing (2003), ACM Press, pp. 13-24.
-
(2003)
Proceedings of the 4th ACM International Symposium on Mobile Ad Hoc Networking & Computing
, pp. 13-24
-
-
Salem, N.B.1
Buttyan, L.2
Hubaux, J.-P.3
Jakobsson, M.4
-
33
-
-
84904904836
-
A secure routing protocol for ad hoc networks
-
November
-
SANZGIRI, K., DAHILL, B., LEVINE, B. N., SHIELDS, C., AND BELDING-ROYER, E. A secure routing protocol for ad hoc networks. In 10th IEEE International Conference on Network Protocols (ICNP'02) (November 2002).
-
(2002)
10th IEEE International Conference on Network Protocols (ICNP'02)
-
-
Sanzgiri, K.1
Dahill, B.2
Levine, B.N.3
Shields, C.4
Belding-Royer, E.5
-
34
-
-
26244461814
-
Multi-channel MAC for ad hoc networks: Handling multi-channel hidden terminals using a single transceiver
-
So, J., AND VAIDYA, N. Multi-channel MAC for ad hoc networks: Handling multi-channel hidden terminals using a single transceiver. In Proceedings of MobiHoc (2004).
-
(2004)
Proceedings of MobiHoc
-
-
So, J.1
Vaidya, N.2
-
36
-
-
85041859933
-
A new multi-channel MAC protocol with on-demand channel assignment for multi-hop mobile ad hoc networks
-
IEEE Computer Society
-
Wu, S.-L., LIN, C.-Y., TSENG, Y.-C., AND SHEU, J.-P. A new multi-channel MAC protocol with on-demand channel assignment for multi-hop mobile ad hoc networks. In Proceedings of the 2000 International Symposium on Parallel Architectures, Algorithms and Networks (ISPAN '00) (2000), IEEE Computer Society, p. 232.
-
(2000)
Proceedings of the 2000 International Symposium on Parallel Architectures, Algorithms and Networks (ISPAN '00)
, pp. 232
-
-
Wu, S.-L.1
Lin, C.-Y.2
Tseng, Y.-C.3
Sheu, J.-P.4
-
37
-
-
0042014530
-
Random waypoint considered harmful
-
YOON, J., LIU, M., AND NOBLE, B. Random waypoint considered harmful. In INFOCOM (2003).
-
(2003)
INFOCOM
-
-
Yoon, J.1
Liu, M.2
Noble, B.3
|