-
1
-
-
0013138682
-
Secure routing for mobile ad hoc networks
-
San Antonio, IX, Jan. 27-31
-
P. Papadimitratos and Z. J. Haas, "Secure routing for mobile ad hoc networks," in Proc. SCS CNDS, San Antonio, IX, Jan. 27-31, 2002, pp. 193-204.
-
(2002)
Proc. SCS CNDS
, pp. 193-204
-
-
Papadimitratos, P.1
Haas, Z.J.2
-
2
-
-
0036980294
-
Securing ad hoc routing protocols
-
Atlanta, GA, Sep.
-
M. G. Zapata and N. Asokan, "Securing ad hoc routing protocols," in Proc. ACM WiSe, Atlanta, GA, Sep. 2002, pp. 1-10.
-
(2002)
Proc. ACM WiSe
, pp. 1-10
-
-
Zapata, M.G.1
Asokan, N.2
-
3
-
-
0036957315
-
Ariadne: A secure on-demand routing protocol for ad hoc networks
-
Atlanta, GA, Sep.
-
Y. Hu, A. Perrig, and D. B. Johnson, "Ariadne: A secure on-demand routing protocol for ad hoc networks," in Proc. 8th ACM MobiCom, Atlanta, GA, Sep. 2002, pp. 12-23.
-
(2002)
Proc. 8th ACM MobiCom
, pp. 12-23
-
-
Hu, Y.1
Perrig, A.2
Johnson, D.B.3
-
4
-
-
84904904836
-
"A secure routing protocol for ad hoc networks
-
Nov.
-
K. Sanzgiri et al., "A secure routing protocol for ad hoc networks," in Proc. ICNP, Nov. 2002, pp. 78-87.
-
(2002)
Proc. ICNP
, pp. 78-87
-
-
Sanzgiri, K.1
-
5
-
-
84943745348
-
Secure link state routing for mobile ad hoc networks
-
Orlando, FL, Jan.
-
P. Papadimitratos and Z. J. Haas, "Secure link state routing for mobile ad hoc networks," in Proc. IEEE CS Workshop on Security and Assumnce. in ad hoc Netw., Orlando, FL, Jan. 2003, pp. 379-383.
-
(2003)
Proc. IEEE CS Workshop on Security and Assumnce. in Ad Hoc Netw.
, pp. 379-383
-
-
Papadimitratos, P.1
Haas, Z.J.2
-
6
-
-
11244269535
-
Secure efficient distance vector routing for mobile wireless ad hoc networks
-
, Jul.
-
Y. Hu, A. Perrig, and D. B. Johnson, "Secure efficient distance vector routing for mobile wireless ad hoc networks," Ad Hoc Networks, vol. 1, no. 1, pp. 175-190, Jul. 2003.
-
(2003)
Ad Hoc Networks
, vol.1
, Issue.1
, pp. 175-190
-
-
Hu, Y.1
Perrig, A.2
Johnson, D.B.3
-
7
-
-
33144468829
-
Secure QoS-aware route discovery in ad hoc networks
-
Princeton, NJ, Apr.
-
P. Papadimitratos and Z. J. Haas, "Secure QoS-aware route discovery in ad hoc networks," in Proc. 2005 IEEE Sarnoff Symp., Princeton, NJ, Apr. 2005, pp. 176-179.
-
(2005)
Proc. 2005 IEEE Sarnoff Symp.
, pp. 176-179
-
-
Papadimitratos, P.1
Haas, Z.J.2
-
8
-
-
33746592166
-
Secure on-demand distance-vector routing in ad hoc networks
-
Princeton, NJ, Apr.
-
_, "Secure on-demand distance-vector routing in ad hoc networks," in Proc. 2005 IEEE Sarnoff Symp., Princeton, NJ, Apr. 2005, pp. 168-171.
-
(2005)
Proc. 2005 IEEE Sarnoff Symp.
, pp. 168-171
-
-
-
9
-
-
0003068282
-
Security architecture for the Internet protocol
-
IETF, Nov.
-
S. Kent and R. Atkinson, "Security architecture for the Internet protocol," IETF, RFC 2401, Nov. 1998.
-
(1998)
RFC
, vol.2401
-
-
Kent, S.1
Atkinson, R.2
-
10
-
-
0003254362
-
IP authentication header
-
IETF, Nov.
-
_, "IP authentication header," IETF, RFC 2402, Nov. 1998.
-
(1998)
RFC
, vol.2402
-
-
-
11
-
-
0003324496
-
"Stream control transmission protocol,"
-
IETF, Oct.
-
R. Stewart et al., "Stream control transmission protocol," IETF, RFC 2960, Oct. 2000.
-
(2000)
RFC
, vol.2960
-
-
Stewart, R.1
-
12
-
-
0242527360
-
Path set selection in mobile ad hoc networks
-
Lausanne, Switzerland, Jun.
-
P. Papadimitratos, Z. J. Haas, and E. G. Sirer, "Path set selection in mobile ad hoc networks," in Proc. 3rd. ACM MobiHoc, Lausanne, Switzerland, Jun. 2002, pp. 1-11.
-
(2002)
Proc. 3rd. ACM MobiHoc
, pp. 1-11
-
-
Papadimitratos, P.1
Haas, Z.J.2
Sirer, E.G.3
-
13
-
-
2342588224
-
Analysis of multipath routing, Part 1 : The effect on the packet delivery ratio
-
Jan.
-
A. Tsirigos and Z. J. Haas, "Analysis of multipath routing, Part 1 : The effect on the packet delivery ratio," IEEE Trans. Wireless Commun., vol. 3, no. 1, pp. 138-146, Jan. 2004.
-
(2004)
IEEE Trans. Wireless Commun.
, vol.3
, Issue.1
, pp. 138-146
-
-
Tsirigos, A.1
Haas, Z.J.2
-
14
-
-
2342625273
-
Analysis of multipath routing, Part 2: Mitigation of the effects of frequently changing network topologies
-
Mar.
-
_, "Analysis of multipath routing, Part 2: Mitigation of the effects of frequently changing network topologies," IEEE Trans. Wireless Commun., vol. 3, no. 2, pp. 500-511, Mar. 2004.
-
(2004)
IEEE Trans. Wireless Commun.
, vol.3
, Issue.2
, pp. 500-511
-
-
-
15
-
-
6344273537
-
Secure message transmission in mobile ad hoc networks
-
Jul.
-
P. Papadimitratos and Z. J. Haas, "Secure message transmission in mobile ad hoc networks," Elsevier Ad Hoc Netw. J., vol. 1, no. 1, pp. 193-209, Jul. 2003.
-
(2003)
Elsevier Ad Hoc Netw. J.
, vol.1
, Issue.1
, pp. 193-209
-
-
Papadimitratos, P.1
Haas, Z.J.2
-
16
-
-
4143090710
-
Secure message transmission in mobile ad hoc networks
-
San Diego, CA, Sep.
-
_, "Secure message transmission in mobile ad hoc networks," in Proc. ACM WiSe 2003, San Diego, CA, Sep. 2003, pp. 41-50.
-
(2003)
Proc. ACM WiSe 2003
, pp. 41-50
-
-
-
17
-
-
33144454316
-
-
Ph.D. dissertation, Cornell Univ., Ithaca, NY, Jan.
-
P. Papadimitratos, "Secure and fault-tolerant communication in mobile ad hoc networks," Ph.D. dissertation, Cornell Univ., Ithaca, NY, Jan. 2005.
-
(2005)
Secure and Fault-tolerant Communication in Mobile Ad Hoc Networks
-
-
Papadimitratos, P.1
-
19
-
-
0017018484
-
New directions in cryptography
-
Nov.
-
W. Diffie and M. E. Hellman, "New directions in cryptography," IEEE Trans. Inf. Theory, vol. IT-22, pp. 644-654, Nov. 1976.
-
(1976)
IEEE Trans. Inf. Theory
, vol.IT-22
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.E.2
-
20
-
-
0033357103
-
Securing ad hoc networks
-
Nov./Dec.
-
L. Zhou and Z. J. Haas, "Securing ad hoc networks," IEEE Netw. Mag., vol. 13, no. 6, pp. 24-30, Nov./Dec. 1999.
-
(1999)
IEEE Netw. Mag.
, vol.13
, Issue.6
, pp. 24-30
-
-
Zhou, L.1
Haas, Z.J.2
-
21
-
-
33144455091
-
Secure communication in adverse mobile ad hoc networks
-
D.-Z. Du, Ed. Norwell, MA: Kluwer, Nov.
-
P. Papadimitratos and Z. J. Haas, "Secure communication in adverse mobile ad hoc networks," in Ad Hoc Wireless Networking, D.-Z. Du, Ed. Norwell, MA: Kluwer, Nov. 2003.
-
(2003)
Ad Hoc Wireless Networking
-
-
Papadimitratos, P.1
Haas, Z.J.2
-
23
-
-
0024641589
-
Efficient dispersal of information for security, load balancing, and fault tolerance
-
Apr.
-
M. O. Rabin, "Efficient dispersal of information for security, load balancing, and fault tolerance," J. ACM, vol. 36, no. 2, pp. 335-348, Apr. 1989.
-
(1989)
J. ACM
, vol.36
, Issue.2
, pp. 335-348
-
-
Rabin, M.O.1
-
24
-
-
0003196107
-
HMAC: Keyed-hashing for message authentication
-
IETF, Feb.
-
H. Krawczyk, M. Bellare, and R. Canetti, HMAC: Keyed-hashing for message authentication, IETF, RFC 2104, Feb. 1997.
-
(1997)
RFC
, vol.2104
-
-
Krawczyk, H.1
Bellare, M.2
Canetti, R.3
-
30
-
-
0021506074
-
Computing k-out-of-n system reliability
-
R. E. Barlow and K. D. Heidtmann, "Computing k-out-of-n system reliability," IEEE Trans. Reliab., vol. R-33, pp. 322-323, 1984.
-
(1984)
IEEE Trans. Reliab.
, vol.R-33
, pp. 322-323
-
-
Barlow, R.E.1
Heidtmann, K.D.2
-
31
-
-
0022865215
-
Utilization of symmetric switching functions in the computation of k-out-of-n system reliability
-
A.M. Rushdi, "Utilization of symmetric switching functions in the computation of k-out-of-n system reliability," Microelectron. Reliab., vol. 26, no. 5, pp. 973-987, 1986.
-
(1986)
Microelectron. Reliab.
, vol.26
, Issue.5
, pp. 973-987
-
-
Rushdi, A.M.1
-
32
-
-
0026140443
-
Comment on: An efficient nonrecursive algorithm for computing the reliability of k-out-of-n systems
-
_, "Comment on: An efficient nonrecursive algorithm for computing the reliability of k-out-of-n systems," IEEE Trans. Reliab., vol. R-40, no. 1, pp. 60-61, 1991.
-
(1991)
IEEE Trans. Reliab.
, vol.R-40
, Issue.1
, pp. 60-61
-
-
-
33
-
-
0242696202
-
On the minimum node degree and connectivity of a wireless multihop network
-
Lausanne, Switzerland, Jun.
-
C. Bettstetter, "On the minimum node degree and connectivity of a wireless multihop network," in Proc. 3rd ACM MobiHoc, Lausanne, Switzerland, Jun. 2002, pp. 80-91.
-
(2002)
Proc. 3rd ACM MobiHoc
, pp. 80-91
-
-
Bettstetter, C.1
-
34
-
-
85106319926
-
A performance comparison of multi-hop wireless ad hoc network routing protocols
-
Dallas, TX, Oct.
-
J. Broch et al., "A performance comparison of multi-hop wireless ad hoc network routing protocols," in Proc. 4th ACM MobiCom, Dallas, TX, Oct. 1998, pp. 85-97.
-
(1998)
Proc. 4th ACM MobiCom
, pp. 85-97
-
-
Broch, J.1
-
35
-
-
0042014530
-
Random-waypoint mobility considered harmful
-
San Francisco, CA, Apr.
-
J. Yoon, M. Liu, and B. Noble, "Random-waypoint mobility considered harmful," in Proc. of IEEE INFOCOM, San Francisco, CA, Apr. 2003, pp. 1312-1321.
-
(2003)
Proc. of IEEE INFOCOM
, pp. 1312-1321
-
-
Yoon, J.1
Liu, M.2
Noble, B.3
-
36
-
-
0742292815
-
Ad hoc on-demand distance vector (AODV) routing
-
IETF, Jul.
-
C. Perkins, E. Belding-Royer, and S. Das, "Ad hoc on-demand distance vector (AODV) routing," IETF, RFC 3561, Jul. 2002.
-
(2002)
RFC
, vol.3561
-
-
Perkins, C.1
Belding-Royer, E.2
Das, S.3
-
37
-
-
1542356511
-
The dynamic source routing protocol for mobile ad hoc networks (DSR)
-
draft-ietf-manet-dsr-09.txt, Apr.
-
D. B. Johnson et al., 'The dynamic source routing protocol for mobile ad hoc networks (DSR)," Internet Draft, draft-ietf-manet-dsr-09.txt, Apr. 2003.
-
(2003)
Internet Draft
-
-
Johnson, D.B.1
-
38
-
-
0035415758
-
The performance of query control schemes for the zone routing protocol
-
Aug.
-
Z. J. Haas and M. R. Pearlman, "The performance of query control schemes for the zone routing protocol," ACM/IEEE Trans. Netw., vol. 9, no. 4, pp. 427-438, Aug. 2001.
-
(2001)
ACM/IEEE Trans. Netw.
, vol.9
, Issue.4
, pp. 427-438
-
-
Haas, Z.J.1
Pearlman, M.R.2
-
39
-
-
84866985446
-
Securing the OLSR protocol
-
Jun.
-
T. H. Clausen et al., "Securing the OLSR protocol," in Proc. IFIP MedHoc-Net. 2003, Jun. 2003, pp. 25-35.
-
(2003)
Proc. IFIP MedHoc-Net. 2003
, pp. 25-35
-
-
Clausen, T.H.1
-
40
-
-
2442551009
-
Optimized link state routing protocol (OLSR)
-
IETF, Oct.
-
T. H. Clausen and P. Jacquet, "Optimized link state routing protocol (OLSR)," IETF, RFC 3626, Oct. 2003.
-
(2003)
RFC
, vol.3626
-
-
Clausen, T.H.1
Jacquet, P.2
-
41
-
-
0242453865
-
An on-demand secure routing protocol resilient to Byzantine failures
-
Atlanta, GA, Sep.
-
B. Awerbuch et al., "An on-demand secure routing protocol resilient to Byzantine failures," in Proc. ACM WiSe 2002, Atlanta, GA, Sep. 2002, pp. 21-31.
-
(2002)
Proc. ACM WiSe 2002
, pp. 21-31
-
-
Awerbuch, B.1
-
42
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
Boston, MA, Aug.
-
S. Marti et al., "Mitigating routing misbehavior in mobile ad hoc networks," in Proc. 6th MobiCom, Boston, MA, Aug. 2000, pp. 255-265.
-
(2000)
Proc. 6th MobiCom
, pp. 255-265
-
-
Marti, S.1
-
43
-
-
0242696192
-
Performance evaluation of the CONFIDANT protocol
-
Lausanne, Switzerland, Jun.
-
S. Buchegger and J. Y. LeBoudec, "Performance evaluation of the CONFIDANT protocol," in Proc. 3rd ACM MobiHoc, Lausanne, Switzerland, Jun. 2002, pp. 226-236.
-
(2002)
Proc. 3rd ACM MobiHoc
, pp. 226-236
-
-
Buchegger, S.1
Leboudec, J.Y.2
-
44
-
-
1542326337
-
A charging and rewarding scheme for packet forwarding
-
Annapolis, MD, Jun.
-
N. Ben Salem et al., "A charging and rewarding scheme for packet forwarding," in Proc. 4th ACM MobiHoc, Annapolis, MD, Jun. 2003, pp. 13-24.
-
(2003)
Proc. 4th ACM MobiHoc
, pp. 13-24
-
-
Ben Salem, N.1
-
45
-
-
5044238739
-
CORE: A collaborative reputation mechanism to enforce node cooperation
-
Sep.
-
P. Macciardi and R. Molva, "CORE: A collaborative reputation mechanism to enforce node cooperation," in Proc. 6th IFIP CMS Conf., Sep. 2002, pp. 102-121.
-
(2002)
Proc. 6th IFIP CMS Conf.
, pp. 102-121
-
-
Macciardi, P.1
Molva, R.2
-
46
-
-
0031352149
-
TCP-Boston: A fragmentation-tolerant TCP protocol for ATM networks
-
Kobe, Japan, Apr.
-
A. Bestavros and G. Kim, 'TCP-Boston: A fragmentation-tolerant TCP protocol for ATM networks," in Proc. IEEE INFOCOM, Kobe, Japan, Apr. 1997, pp. 1210-1217.
-
(1997)
Proc. IEEE INFOCOM
, pp. 1210-1217
-
-
Bestavros, A.1
Kim, G.2
|