메뉴 건너뛰기




Volumn , Issue , 2004, Pages 618-624

SDAR: A Secure Distributed Anonymous Routing protocol for wireless and mobile ad hoc networks

Author keywords

[No Author keywords available]

Indexed keywords

ANONYMOUS COMMUNICATION; MOBILE AD HOC NETWORKS; NETWORK TOPOLOGY; SDAR (SECURE DISTRIBUTED ANONYMOUS ROUTING PROTOCOL);

EID: 20544471574     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/LCN.2004.109     Document Type: Conference Paper
Times cited : (114)

References (21)
  • 6
    • 84860946074 scopus 로고    scopus 로고
    • http://www.sendfakemail.com/~raph/remailer-list.html
  • 7
    • 84860953245 scopus 로고    scopus 로고
    • http://www2.pro-ns.net/~crypto/chapter8.html
  • 9
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • Feb.
    • D. Chaum: Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms. Communications of the ACM, vol. 24, no. 2, pages 84-88, Feb. 1981.
    • (1981) Communications of the ACM , vol.24 , Issue.2 , pp. 84-88
    • Chaum, D.1
  • 11
    • 0038684298 scopus 로고    scopus 로고
    • MorphMix: Peer-to-peer based anonymous internet usage with collusion detection
    • TIK, ETH Zurich, Switzerland, August
    • M. Rennhard. MorphMix: Peer-to-Peer based Anonymous Internet Usage with Collusion Detection. Technical Report Nr. 147, TIK, ETH Zurich, Switzerland, August 2002
    • (2002) Technical Report Nr. 147
    • Rennhard, M.1
  • 15
    • 0000629443 scopus 로고    scopus 로고
    • Dynamic source routing in ad hoc wireless networks
    • T. Imielinski and H. Korth, editors. Kluwer Academic
    • D. Johnson and D. Maltz: Dynamic source routing in ad hoc wireless networks. In T. Imielinski and H. Korth, editors, Mobile computing. Kluwer Academic, 1996.
    • (1996) Mobile Computing
    • Johnson, D.1    Maltz, D.2
  • 16
    • 0001341422 scopus 로고    scopus 로고
    • DSR: The Dynamic Source Routing protocol for multi-hop wireless ad hoc networks
    • ch. 5. Addison-Wesley
    • D. B. Johnson, D. A. Maltz, and J. Broch, DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks. In Ad Hoc Networking, ch. 5, pp. 139-172. Addison-Wesley, 2001.
    • (2001) Ad Hoc Networking , pp. 139-172
    • Johnson, D.B.1    Maltz, D.A.2    Broch, J.3
  • 19
    • 0037842963 scopus 로고    scopus 로고
    • Strategies for enhancing routing security in protocols for mobile ad hoc networks
    • (February), Special issue on Routing in mobile and wireless ad hoc networks, Year of Publication: 2003, ISSN:0743-7315
    • L. Venkatraman, D.P. Agrawal: Strategies for enhancing routing security in protocols for mobile ad hoc networks, in Journal of Parallel and Distributed Computing, Volume 63, Issue 2 (February 2003), Special issue on Routing in mobile and wireless ad hoc networks, Pages: 214-227, Year of Publication: 2003, ISSN:0743-7315
    • (2003) Journal of Parallel and Distributed Computing , vol.63 , Issue.2 , pp. 214-227
    • Venkatraman, L.1    Agrawal, D.P.2
  • 20
    • 0013145148 scopus 로고    scopus 로고
    • Ad hoc on demand distance vector (AODV) routing
    • C. E. Perkins and E. M. Royer: Ad hoc on demand distance vector (AODV) routing, http://www.ietf.org/internet-drafts/draft-ietf-manet-aodv-00.txt, 1997. IETF Internet Draft.
    • (1997) IETF Internet Draft
    • Perkins, C.E.1    Royer, E.M.2
  • 21
    • 15344339774 scopus 로고    scopus 로고
    • Secure routing protocols for mobile ad hoc networks
    • University of Ottawa
    • Boukerche, A., El-Khatib, K., and Xu, L. Secure Routing Protocols for mobile Ad Hoc Networks. Technical Report, TR-2004, University of Ottawa.
    • Technical Report , vol.TR-2004
    • Boukerche, A.1    El-Khatib, K.2    Xu, L.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.