-
1
-
-
85106319926
-
A performance comparison of multi-hop wireless ad hoc network routing protocols
-
Dallas, TX, Oct.
-
J. Brach, D. Maltz, D. Johnson, Y.-C. Hu, and J. Jetcheva, "A performance comparison of multi-hop wireless ad hoc network routing protocols," in Proc. of ACM Mobicom, Dallas, TX, Oct. 1998.
-
(1998)
Proc. of ACM Mobicom
-
-
Brach, J.1
Maltz, D.2
Johnson, D.3
Hu, Y.-C.4
Jetcheva, J.5
-
2
-
-
0035509489
-
A survey on position-based routing in mobile ad hoc networks
-
Nov./Dec.
-
M. Mauve, J. Widmer, and H. Hartenstein, "A survey on position-based routing in mobile ad hoc networks," IEEE Network, vol. 15, pp. 30-39, Nov./Dec. 2001.
-
(2001)
IEEE Network
, vol.15
, pp. 30-39
-
-
Mauve, M.1
Widmer, J.2
Hartenstein, H.3
-
3
-
-
0001866027
-
GPS-based geographic addressing, routing, and resource discovery
-
T. Imielinski and J.C. Navas, "GPS-based geographic addressing, routing, and resource discovery," Commun. ACM, vol. 42, pp. 86-92, 1999.
-
(1999)
Commun. ACM
, vol.42
, pp. 86-92
-
-
Imielinski, T.1
Navas, J.C.2
-
5
-
-
0036957315
-
Ariadne: A secure on-demand routing protocol for ad hoc networks
-
Atlanta, GA, Sept.
-
Y.-C. Hu, A. Perrig, and D.B. Johnson, "Ariadne: a secure on-demand routing protocol for ad hoc networks," in Proc. of ACM Mobicom, Atlanta, GA, Sept. 2002.
-
(2002)
Proc. of ACM Mobicom
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
6
-
-
15344348312
-
Secure routing with tamper resistant module for mobile ad hoc networks
-
July
-
J.-H. Song, V. Wong, V. Leung, and Y. Kawamoto, "Secure routing with tamper resistant module for mobile ad hoc networks," ACM Mobile Computing and Communications Review, vol. 7, issue 3, July 2003.
-
(2003)
ACM Mobile Computing and Communications Review
, vol.7
, Issue.3
-
-
Song, J.-H.1
Wong, V.2
Leung, V.3
Kawamoto, Y.4
-
7
-
-
0041973497
-
Packet leashes: A defense against wormhole attacks in wireless network
-
San Francisco, CA, Mar./Apr.
-
Y.-C. Hu, A. Perrig, and D.B. Johnson, "Packet leashes: a defense against wormhole attacks in wireless network," in Proc. of IEEE Infocom, San Francisco, CA, Mar./Apr. 2003.
-
(2003)
Proc. of IEEE Infocom
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
9
-
-
0034548432
-
A scalable location service for geographic ad hoc routing
-
Boston, MA, Aug.
-
J. Li, J. Jannotti, D.S.J. De Couto, D.R. Karger, and R. Morris, "A scalable location service for geographic ad hoc routing," in Proc. of ACM Mobicom, Boston, MA, Aug. 2000.
-
(2000)
Proc. of ACM Mobicom
-
-
Li, J.1
Jannotti, J.2
De Couto, D.S.J.3
Karger, D.R.4
Morris, R.5
-
10
-
-
0034547115
-
GPSR: Greedy perimeter stateless routing for wireless network
-
Boston, MA, Aug.
-
B. Karp and H.T. Kung, "GPSR: greedy perimeter stateless routing for wireless network," in Proc. of ACM Mobicom, Boston, MA, Aug. 2000.
-
(2000)
Proc. of ACM Mobicom
-
-
Karp, B.1
Kung, H.T.2
-
11
-
-
0242426103
-
The TESLA broadcast authentication protocol
-
Summer/Fall
-
A. Perrig, R. Canetti, J.D. Tygar, and D. Song, "The TESLA broadcast authentication protocol," RSA Laboratories CryptoBytes Technical Newsletter, vol. 5, no. 2, Summer/Fall 2002.
-
(2002)
RSA Laboratories CryptoBytes Technical Newsletter
, vol.5
, Issue.2
-
-
Perrig, A.1
Canetti, R.2
Tygar, J.D.3
Song, D.4
-
12
-
-
0003196107
-
HMAC: Keyed-hashing for message authentication
-
Feb.
-
H. Krawczyk, M. Bellare, and R. Canetti, "HMAC: keyed-hashing for message authentication," IETF RFC 2104, Feb. 1997.
-
(1997)
IETF RFC
, vol.2104
-
-
Krawczyk, H.1
Bellare, M.2
Canetti, R.3
-
13
-
-
0003338167
-
The use of HMAC-MD5-96 within ESP and AH
-
Nov.
-
C. Madson and R. Glenn, "The use of HMAC-MD5-96 within ESP and AH," IETF RFC 2403, Nov. 1998.
-
(1998)
IETF RFC
, vol.2403
-
-
Madson, C.1
Glenn, R.2
-
15
-
-
2442597363
-
Performance analysis of the CONFIDANT protocol
-
Lausanne, Switzerland, June
-
S. Buchegger and J-Y.L. Boudec, "Performance analysis of the CONFIDANT protocol," in Proc. of ACM Mobihoc, Lausanne, Switzerland, June 2002.
-
(2002)
Proc. of ACM Mobihoc
-
-
Buchegger, S.1
Boudec, J.-Y.L.2
-
16
-
-
0034539094
-
The cricket location-support system
-
Boston, MA, Aug.
-
N. Priyantah, A. Chakraborty, and H. Balakrishnan, "The cricket location-support system," in Proc. of ACM Mobicom, Boston, MA, Aug. 2000.
-
(2000)
Proc. of ACM Mobicom
-
-
Priyantah, N.1
Chakraborty, A.2
Balakrishnan, H.3
-
17
-
-
0003237987
-
The kerberos network authentication service (V5)
-
Sept.
-
J. Kohl and B.C. Neuman, "The kerberos network authentication service (V5)," IETF RFC 1510, Sept. 1993.
-
(1993)
IETF RFC
, vol.1510
-
-
Kohl, J.1
Neuman, B.C.2
-
19
-
-
0036980295
-
Self-organized network-layer security in mobile ad hoc networks
-
Atlanta, GA, Sept.
-
H. Yang, X. Meng, and S. Lu, "Self-organized network-layer security in mobile ad hoc networks," in Proc. of ACM Workshop on Wireless Security (WiSe), Atlanta, GA, Sept. 2002.
-
(2002)
Proc. of ACM Workshop on Wireless Security (WiSe)
-
-
Yang, H.1
Meng, X.2
Lu, S.3
-
20
-
-
0013138682
-
Secure routing for mobile ad hoc networks
-
San Antonio, TX, Jan.
-
P. Papadimitratos and Z.J. Haas, "Secure routing for mobile ad hoc networks," in Proc. of SCS CNDS, San Antonio, TX, Jan. 2002.
-
(2002)
Proc. of SCS CNDS
-
-
Papadimitratos, P.1
Haas, Z.J.2
-
22
-
-
15344349572
-
-
NS-2 for grid, www.pdos.lcs.mit.edu/grid/sim/index.html.
-
NS-2 for Grid
-
-
|