-
3
-
-
0005943436
-
Modeling security threats
-
December
-
Bruce Schneier. Modeling security threats. Dr Dobb's Journal, December 1999. also available as http://www.ddj.com/documents/s=896/ddj9912a/9912a.htm.
-
(1999)
Dr Dobb's Journal
-
-
Schneier, B.1
-
4
-
-
0036957315
-
Ariadne: A secure on-demand routing protocol for ad hoc networks
-
Atlanta, Georgia, USA, September
-
Yih-Chun Hu, Adrian Perrig, and David B. Johnson. Ariadne: A secure On-Demand Routing Protocol for Ad hoc Networks. In Proceedings of MobiCom 2002, Atlanta, Georgia, USA, September 2002.
-
(2002)
Proceedings of MobiCom 2002
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
6
-
-
1542451215
-
Secure routing for mobile ad hoc networks
-
Working Session on Security in Wireless Ad Hoc Networks, EPFL, (published in), June
-
Panagiotis Papadimitratos and Zygmunt J. Haas. Secure Routing for Mobile Ad Hoc Networks. Working Session on Security in Wireless Ad Hoc Networks, EPFL, (published in Mobile Computing and Communications Review, vol.6, no.4), June 2002.
-
(2002)
Mobile Computing and Communications Review
, vol.6
, Issue.4
-
-
Papadimitratos, P.1
Haas, Z.J.2
-
10
-
-
84904904836
-
A secure routing protocol for ad hoc networks
-
November
-
Kimaya Sanzgiri, Bridget Dahill, Brian Neil Levine, Clay Shields, and Elizabeth M. Belding-Royer. A Secure Routing Protocol for Ad Hoc Networks. In Proceedings of 2002 IEEE International Conference on Network Protocols (ICNP), November 2002. also available as http://signl.cs.umass.edu/pubs/aran.icnp02.ps.
-
(2002)
Proceedings of 2002 IEEE International Conference on Network Protocols (ICNP)
-
-
Sanzgiri, K.1
Dahill, B.2
Levine, B.N.3
Shields, C.4
Belding-Royer, E.M.5
-
11
-
-
2442582716
-
Secure ad hoc on-demand distance vector routing
-
July
-
Manel Guerrero Zapata. Secure Ad hoc On-Demand Distance Vector Routing. ACM Mobile Computing and Communications Review (MC2R), 6(3):106-107, July 2002. also available as http://doi.acm.org/10.1145/581291.581312.
-
(2002)
ACM Mobile Computing and Communications Review (MC2R)
, vol.6
, Issue.3
, pp. 106-107
-
-
Zapata, M.G.1
-
13
-
-
85106319926
-
A performance comparison of multi-hop wireless ad hoc network routing protocols
-
Josh Broch, David A. Maltz, David B. Johnson, Yih-Chun Hu, and Jorjeta Jetcheva. A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. In Mobile Computing and Networking, pages 85-97, 1998. also available as http://citeseer.nj.nec.com/broch98performance.html.
-
(1998)
Mobile Computing and Networking
, pp. 85-97
-
-
Broch, J.1
Maltz, D.A.2
Johnson, D.B.3
Hu, Y.-C.4
Jetcheva, J.5
-
14
-
-
0004118144
-
Nuglets: A virtual currency to stimulate cooperation in self-organized mobile ad hoc networks
-
EPFL-DI-ICA, January
-
Levente Buttyán and Jean-Pierre Hubaux. Nuglets: a Virtual Currency to Stimulate Cooperation in Self-Organized Mobile Ad Hoc Networks. Technical Report DSC/2001/001, EPFL-DI-ICA, January 2001.
-
(2001)
Technical Report
, vol.DSC-2001-001
-
-
Buttyán, L.1
Hubaux, J.-P.2
-
15
-
-
0042660545
-
Stimulating cooperation in self-organizing mobile ad hoc networks
-
October
-
Levente Buttyán and Jean-Pierre Hubaux. Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks. ACM/Kluwer Mobile Networks and Applications, 8(5), October 2003.
-
(2003)
ACM/Kluwer Mobile Networks and Applications
, vol.8
, Issue.5
-
-
Buttyán, L.1
Hubaux, J.-P.2
-
18
-
-
0042933944
-
Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks
-
San Francisco, CA, April
-
Sheng Zhong, Jiang Chen, and Yang Richard Yang. Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks. In Proceedings of IEEE Infocom '03, San Francisco, CA, April 2003.
-
(2003)
Proceedings of IEEE Infocom '03
-
-
Zhong, S.1
Chen, J.2
Yang Richard Yang3
-
19
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
Sergio Marti, T. J. Giuli, Kevin Lai, and Mary Baker. Mitigating routing misbehavior in mobile ad hoc networks. In Mobile Computing and Networking, pages 255-265, 2000. also available as http://citeseer.nj.nec.com/marti00mitigating. html.
-
(2000)
Mobile Computing and Networking
, pp. 255-265
-
-
Marti, S.1
Giuli, T.J.2
Lai, K.3
Baker, M.4
-
20
-
-
0034546898
-
Intrusion detection in wireless ad-hoc networks
-
Yongguang Zhang and Wenke Lee. Intrusion detection in wireless ad-hoc networks. In Mobile Computing and Networking, pages 275-283, 2000. also available as http://citeseer.nj.nec.com/zhang00intrusion.html.
-
(2000)
Mobile Computing and Networking
, pp. 275-283
-
-
Zhang, Y.1
Lee, W.2
-
21
-
-
0041473688
-
Intrusion detection techniques for mobile wireless networks
-
to appear in
-
Yongguang Zhang, Wenke Lee, and Yi-An Huang. Intrusion Detection Techniques for Mobile Wireless Networks. to appear in ACM Wireless Networks (WINET), 9, 2003. also available as http://www.wins.hrl.com/people/ygz/papers/ winet03.pdf.
-
(2003)
ACM Wireless Networks (WINET)
, vol.9
-
-
Zhang, Y.1
Lee, W.2
Huang, Y.-A.3
-
24
-
-
0037885580
-
Nodes bearing grudges: Towards routing security, fairness, and robustness in mobile ad hoc networks
-
Canary Islands, Spain, January. IEEE Computer Society
-
Sonja Buchegger and Jean-Yves Le Boudec. Nodes Bearing Grudges: Towards Routing Security, Fairness, and Robustness in Mobile Ad Hoc Networks. In Proceedings of the Tenth Euromicro Workshop on Parallel, Distributed and Network-based Processing, pages 403-410, Canary Islands, Spain, January 2002. IEEE Computer Society, http://citeseer.nj.nec.com/article/buchegger02nodes.html.
-
(2002)
Proceedings of the Tenth Euromicro Workshop on Parallel, Distributed and Network-based Processing
, pp. 403-410
-
-
Buchegger, S.1
Le Boudec, J.-Y.2
-
26
-
-
11844293124
-
-
PhD thesis, University of Ulm, Ulm, Germany
-
Frank Kargl. Sicherheit in Mobilen Ad hoc Netzwerken. PhD thesis, University of Ulm, Ulm, Germany, 2003. also available as http://medien. informatik.uni-ulm.de/~frank/research/dissertation.pdf.
-
(2003)
Sicherheit in Mobilen Ad Hoc Netzwerken
-
-
Kargl, F.1
-
27
-
-
0036986441
-
An on-demand secure routing protocol resilient to byzantine failures
-
Atlanta, Georgia, September
-
Baruch Awerbuch, David Holmer, Cristina Nita-Rotaru, and Herbert Rubens. An On-Demand Secure Routing Protocol Resilient to Byzantine Failures. In ACM Workshop on Wireless Security (WiSe), Atlanta, Georgia, September 2002. also available as http://citeseer.nj.nec.com/article/awerbuch02demand.html.
-
(2002)
ACM Workshop on Wireless Security (WiSe)
-
-
Awerbuch, B.1
Holmer, D.2
Nita-Rotaru, C.3
Rubens, H.4
|