-
1
-
-
0033357103
-
Securing ad hoc networks
-
Nov./Dec.
-
L. Zhou and Z. Haas, "Securing Ad Hoc Networks," IEEE Network Magazine, vol. 13, no. 6, pp. Nov./Dec., 1999.
-
(1999)
IEEE Network Magazine
, vol.13
, Issue.6
-
-
Zhou, L.1
Haas, Z.2
-
2
-
-
0034546898
-
Intrusion detection in wireless ad-hoc networks
-
Boston, MA, USA, August
-
Y. Zhang and W. Lee, "Intrusion Detection in Wireless Ad-Hoc Networks," in MobiCom, Boston, MA, USA, August 2000.
-
(2000)
MobiCom
-
-
Zhang, Y.1
Lee, W.2
-
3
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
Boston, MA, USA, August
-
S. Marti, T. J. Giuli, K. Lai, and M. Baker, "Mitigating Routing Misbehavior in Mobile Ad Hoc Networks," in MobiCom, Boston, MA, USA, August 2000.
-
(2000)
MobiCom
-
-
Marti, S.1
Giuli, T.J.2
Lai, K.3
Baker, M.4
-
4
-
-
0035789229
-
The quest for security in mobile ad hoc networks
-
May
-
J. P. Hubaux, L. Buttyan, and S. Capkun, "The Quest for Security in Mobile Ad Hoc Networks," in MobiHOC, May 2001.
-
(2001)
MobiHOC
-
-
Hubaux, J.P.1
Buttyan, L.2
Capkun, S.3
-
5
-
-
0036957315
-
Ariadne: A secure on-demand routing protocol for ad hoc networks
-
Atlanta, GA, USA, Sep.
-
Y.-C. Hu, A. Perrig, and D. B. Johnson, "Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks," in MobiCom, Atlanta, GA, USA, Sep. 2002.
-
(2002)
MobiCom
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
6
-
-
1542317831
-
Rushing attacks and defense in wireless ad hoc network routing protocols
-
San Diego, CA, USA, Sep.
-
Y.-C. Hu, A. Perrig, and D. B. Johnson, "Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols," in WiSe, San Diego, CA, USA, Sep. 2003.
-
(2003)
WiSe
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
7
-
-
0003938947
-
Optimized link state routing protocol
-
draft-ietf-manet-olsr-06.txt, Sep.
-
T. Clausen, P. Jacquet, A. Laouiti, P. Minet, P. Muhlethaler, A. Qayyumn, and L. Viennot, "Optimized Link State Routing Protocol," Internet-Draft, draft-ietf-manet-olsr-06.txt, Sep. 2001.
-
(2001)
Internet-draft
-
-
Clausen, T.1
Jacquet, P.2
Laouiti, A.3
Minet, P.4
Muhlethaler, P.5
Qayyumn, A.6
Viennot, L.7
-
8
-
-
0003843664
-
Ad Hoc on Demand Distance Vector (AODV) routing
-
draft-ietf-manet-olsr-10.txt, Jan.
-
C. E. Perkins, E. M. Belding-Royer, and S. R. Das, "Ad Hoc On Demand Distance Vector (AODV) Routing," Internet-Draft, draft-ietf-manet-olsr-10. txt, Jan. 2002.
-
(2002)
Internet-draft
-
-
Perkins, C.E.1
Belding-Royer, E.M.2
Das, S.R.3
-
9
-
-
1542356506
-
The Dynamic Source Routing protocol for mobile ad hoc networks (DSR)
-
draft-ietf-manet-dsr-07.txt, Feb.
-
D. B. Johnson, D. A. Maltz, Y. C. Hu, and J. G. Jetcheva, "The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks (DSR)," Internet-Draft, draft-ietf-manet-dsr-07.txt, Feb. 2002.
-
(2002)
Internet-draft
-
-
Johnson, D.B.1
Maltz, D.A.2
Hu, Y.C.3
Jetcheva, J.G.4
-
10
-
-
7244251119
-
Topology Broadcast Based on Reverse-Path Forwarding (TBRPF)
-
draft-ietf-manet-tbrpf-05.txt, Mar. Work in progress
-
R. G. Ogier, F. L. Templin, B. Bellur, and M. G. Lewis, "Topology Broadcast Based on Reverse-Path Forwarding (TBRPF)," Internet-Draft, draft-ietf-manet-tbrpf-05.txt, Mar. 2002. Work in progress.
-
(2002)
Internet-draft
-
-
Ogier, R.G.1
Templin, F.L.2
Bellur, B.3
Lewis, M.G.4
-
12
-
-
0842283101
-
A secure routing protocol for ad hoc networks
-
Nov.
-
K. Sanzgiri, B. Dahill, B. N. Levine, C. Shields, and E. M. Belding-Royer, "A Secure Routing Protocol for Ad Hoc Networks," in Proceedings of ICNP, Nov. 2002.
-
(2002)
Proceedings of ICNP
-
-
Sanzgiri, K.1
Dahill, B.2
Levine, B.N.3
Shields, C.4
Belding-Royer, E.M.5
-
13
-
-
0036980294
-
Securing ad hoc routing protocols
-
Sep.
-
M. G. Zapata and N. Asokan, "Securing Ad Hoc Routing Protocols," in WiSe, Sep. 2002.
-
(2002)
WiSe
-
-
Zapata, M.G.1
Asokan, N.2
-
14
-
-
0041973497
-
Packet leashes: A defense against wormhole attacks in wireless networks
-
Y.-C. Hu, A. Perrig, and D. B. Johnson, "Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks," in IEEE INFOCOM, 2003.
-
(2003)
IEEE INFOCOM
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
15
-
-
11244269535
-
SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks
-
Y.-C. Hu, D. B. Johnson, and A. Perrig, "SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks," Ad Hoc Networks Journal, vol. 1, pp. 175-192, 2003.
-
(2003)
Ad Hoc Networks Journal
, vol.1
, pp. 175-192
-
-
Hu, Y.-C.1
Johnson, D.B.2
Perrig, A.3
-
16
-
-
0242696192
-
Performance analysis of the CONFIDANT protocol
-
S. Buchegger and J.-Y. Le Boudec, "Performance Analysis of the CONFIDANT Protocol," in Mobihoc, 2002, pp. 226-236.
-
(2002)
Mobihoc
, pp. 226-236
-
-
Buchegger, S.1
Le Boudec, J.-Y.2
-
17
-
-
0042660545
-
Stimulating cooperation in self-organizing mobile ad hoc networks
-
Oct.
-
L. B. and J.-P. Hubaux, "Stimulating Cooperation in Self-organizing Mobile Ad Hoc Networks," Mobile Networks and Applications, vol. 8, no. 5, pp. 579 - 592, Oct. 2003.
-
(2003)
Mobile Networks and Applications
, vol.8
, Issue.5
, pp. 579-592
-
-
B., L.1
Hubaux, J.-P.2
-
18
-
-
0042933944
-
Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks
-
S. Zhong, J. Chen, and Y. R. Yang, "Sprite: A Simple, Cheat-Proof, Credit-Based System for Mobile Ad-Hoc Networks," in IEEE INFOCOM, 2003.
-
(2003)
IEEE INFOCOM
-
-
Zhong, S.1
Chen, J.2
Yang, Y.R.3
-
19
-
-
0041939831
-
Cooperation in wireless ad hoc networks
-
V. Srinivasan, P. Nuggehalli, C. F. Chiasserini, and R. R. Rao, "Cooperation in Wireless Ad Hoc Networks," in IEEE INFOCOM, 2003.
-
(2003)
IEEE INFOCOM
-
-
Srinivasan, V.1
Nuggehalli, P.2
Chiasserini, C.F.3
Rao, R.R.4
-
20
-
-
1542317847
-
BISS: Building secure routing out of an incomplete set of security associations
-
San Diego, CA, USA, Sep.
-
S. Capkun and J.-P. Hubaux, "BISS: Building Secure Routing out of an Incomplete Set of Security Associations," in WiSe, San Diego, CA, USA, Sep. 2003.
-
(2003)
WiSe
-
-
Capkun, S.1
Hubaux, J.-P.2
-
22
-
-
0000629443
-
Dynamic source routing in ad hoc wireless networks, mobile computing
-
edited by Tomasz Imielinski and Hank Korth, chapter 5, Kluwer Academic Publishers
-
D. B. Johnson and D. A. Maltz, "Dynamic Source Routing in Ad Hoc Wireless Networks, Mobile Computing," In Moible Computing, edited by Tomasz Imielinski and Hank Korth, chapter 5, pages 153-181, Kluwer Academic Publishers, 1996.
-
(1996)
Moible Computing
, pp. 153-181
-
-
Johnson, D.B.1
Maltz, D.A.2
-
25
-
-
1642324009
-
Statiscially Unique and Cryptographically Verifiable (SUCV) identifiers and addresses
-
G. Montenegro and C. Castelluccis, "Statiscially Unique and Cryptographically Verifiable (SUCV) Identifiers and Addresses," in Proceedings of NDSS, 2002.
-
(2002)
Proceedings of NDSS
-
-
Montenegro, G.1
Castelluccis, C.2
-
27
-
-
0035425905
-
Performance of multipath routing for on-demand protocols in ad hoc networks
-
R. Castaneda A. Nasipuri and S. R. Das, "Performance of Multipath Routing for On-Demand Protocols in Ad Hoc Networks," ACM/Kluwer Mobile Networks and Applications (MONET) Journal, vol. 6, no. 4, pp. 339-349, 2001.
-
(2001)
ACM/Kluwer Mobile Networks and Applications (MONET) Journal
, vol.6
, Issue.4
, pp. 339-349
-
-
Castaneda, R.1
Nasipuri, A.2
Das, S.R.3
-
28
-
-
0347458171
-
Path set selection in mobile ad hoc networks
-
EPFL Lausanne, Switzerland, June
-
P. Papadimitratos, Z. J. Haas, and E. G. Sirer, "Path Set Selection in Mobile Ad Hoc Networks," in MobiHOC, EPFL Lausanne, Switzerland, June 2002.
-
(2002)
MobiHOC
-
-
Papadimitratos, P.1
Haas, Z.J.2
Sirer, E.G.3
|