-
1
-
-
0003247337
-
Mobile Ad hoc Networking (MANET): Routing protocol performance issues and evaluation considerations
-
January
-
S. Corson,J. Macker,Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations.RFC 2501,January 1999
-
(1999)
RFC
, vol.2501
-
-
Corson, S.1
Macker, J.2
-
2
-
-
0030715989
-
Analysis of a denial of service attack on TCP
-
C. Schuba, I. Krsul, M. Kuhn, E. Spafford, A. Sundaram, D. Zamboni, Analysis of a Denial of Service Attack on TCP, Proceedings of the 1997 IEEE Symposium on Security and Privacy.
-
Proceedings of the 1997 IEEE Symposium on Security and Privacy
-
-
Schuba, C.1
Krsul, I.2
Kuhn, M.3
Spafford, E.4
Sundaram, A.5
Zamboni, D.6
-
4
-
-
24744468900
-
Taming IP packet flooding attacks
-
Karthik Lakshminarayanan, Daniel Adkins, Adrian Perrig, Ion Stoica, Taming IP packet flooding attacks, Computer Communication Review 34(1): 45-50 (2004)
-
(2004)
Computer Communication Review
, vol.34
, Issue.1
, pp. 45-50
-
-
Lakshminarayanan, K.1
Adkins, D.2
Perrig, A.3
Stoica, I.4
-
6
-
-
0242678584
-
Self-organized public-key Management for mobile ad hoc networks
-
January-March
-
Srdjan Capkun, Levente Nuttyan, Jean-Pierre Hubaux, Self-organized public-key Management for mobile ad hoc networks, IEEE Transactions on mobile computing, Vol.2, No.1, January-March, 2003
-
(2003)
IEEE Transactions on Mobile Computing
, vol.2
, Issue.1
-
-
Capkun, S.1
Nuttyan, L.2
Hubaux, J.-P.3
-
8
-
-
0013138682
-
Secure routing for mobile ad hoc networks
-
San Antonio, TX, January 27-31
-
P.Papadimitratos, Z.Haas, Secure routing for mobile ad hoc networks, in Proceedings of the SCS communication Networks and Distributed Systems Modeling and Simulation Conference, San Antonio, TX, January 27-31, 2002
-
(2002)
Proceedings of the SCS Communication Networks and Distributed Systems Modeling and Simulation Conference
-
-
Papadimitratos, P.1
Haas, Z.2
-
9
-
-
0036957315
-
Ariadne: A secure on-demand routing protocol for ad hoc networks
-
September 23-28, Atlanta, Georgia, USA
-
Yih-Chun Hu, Adrian Perrig, David B. Johnson. Ariadne: A secure On-Demand Routing Protocol for Ad hoc Networks, in Proceedings of the MobiCom 2002, September 23-28, 2002, Atlanta, Georgia, USA
-
(2002)
Proceedings of the MobiCom 2002
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
10
-
-
84904904836
-
A secure routing protocol for ad hoc networks
-
November
-
Kimaya Sanzgiri, Bridget Dahill, Brian Neil Levine, Clay Shields, Elizabeth M. Belding-Royer. A Secure Routing Protocol for Ad Hoc Networks, In Proceedings of 2002 IEEE International Conference on Network Protocols (ICNP), November 2002
-
(2002)
Proceedings of 2002 IEEE International Conference on Network Protocols (ICNP)
-
-
Sanzgiri, K.1
Dahill, B.2
Levine, B.N.3
Shields, C.4
Belding-Royer, E.M.5
-
11
-
-
84961572484
-
SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks
-
IEEE, Calicoon, NY, June
-
Yih-Chun Hu, David B. Johnson, and Adrian Perrig, SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks,in Proceedings of the 4th IEEE Workshop on Mobile Computing Systems & Applications (WMCSA 2002), pp. 3-13, IEEE, Calicoon, NY, June 2002
-
(2002)
Proceedings of the 4th IEEE Workshop on Mobile Computing Systems & Applications (WMCSA 2002)
, pp. 3-13
-
-
Hu, Y.-C.1
Johnson, D.B.2
Perrig, A.3
-
12
-
-
24744436723
-
Intrusion detection techniques for mobile wireless networks
-
Yongguang Zhang & Wenke Lee, Intrusion Detection Techniques for Mobile Wireless Networks, Mobile Networks and Applications, 2003
-
(2003)
Mobile Networks and Applications
-
-
Zhang, Y.1
Lee, W.2
-
13
-
-
0003336855
-
Network ingress filtering: Defeating denial of service attacks which employ IP source address spoofing
-
January
-
P. Ferguson, D. Senie, Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing, RFC 2267, January 1998
-
(1998)
RFC
, vol.2267
-
-
Ferguson, P.1
Senie, D.2
-
14
-
-
24744471287
-
H-02: SUN's TCP SYN flooding solutions
-
October
-
CIAC, H-02: SUN's TCP SYN Flooding Solutions, Information Bulletin, October 1996
-
(1996)
Information Bulletin
-
-
-
15
-
-
0005966913
-
Stateless connections
-
Proc. of 1st International Conference of Information and Communication Security (ICICS97), November 1997, Springer
-
T. Aura, P. Nikander, Stateless Connections, Proc. of 1st International Conference of Information and Communication Security (ICICS97), Lecture Notes in Computer Science 1334, November 1997, P. 87-97, Springer 1997
-
(1997)
Lecture Notes in Computer Science
, vol.1334
, pp. 87-97
-
-
Aura, T.1
Nikander, P.2
-
16
-
-
0003597247
-
The dynamic source routing protocol for mobile ad hoc networks (DSR)
-
draft-ietf-manet-dsr-09.txt, 15 April
-
David B. Johnson, David A. Maltz, Yih-Chun Hu, The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks (DSR), Internet-Draft, draft-ietf-manet- dsr-09.txt, 15 April 2003, http://www.ietf.org/internet-drafts/draft-ietf-manet- dsr-09.txt
-
(2003)
Internet-draft
-
-
Johnson, D.B.1
Maltz, D.A.2
Hu, Y.-C.3
-
17
-
-
0742292815
-
Ad hoc On-Demand Distance Vector (AODV) routing
-
July
-
Charles E. Perkins, Elizabeth M. Belding-Royer, and Samir R. Das, Ad hoc On-Demand Distance Vector (AODV) Routing,RFC 3561,July 2003, http://www.ietf.org/rfc/rfc3561.txt
-
(2003)
RFC
, vol.3561
-
-
Perkins, C.E.1
Belding-Royer, E.M.2
Das, S.R.3
-
19
-
-
2442582716
-
Secure ad hoc on-demand distance vector routing
-
July
-
Manel Guerrero Zapata, Secure Ad hoc On-Demand Distance Vector Routing. ACM Mobile Computing and Communications Review (MC2R), Vol 6.No. 3, pp. 106-107, July 2002
-
(2002)
ACM Mobile Computing and Communications Review (MC2R)
, vol.6
, Issue.3
, pp. 106-107
-
-
Zapata, M.G.1
-
21
-
-
24744448547
-
-
http://www.isi.edu/nsnam/ns/index.html
-
-
-
|