-
2
-
-
0035178273
-
Security enhancements in AODV protocol for wireless ad hoc networks
-
2001
-
Bhargava S, Agrawal DP. Security enhancements in AODV protocol for wireless ad hoc networks. In: Vehicular technology conference, 2001, vol. 4; 2001. p. 2143-7.
-
(2001)
Vehicular Technology Conference
, vol.4
, pp. 2143-2147
-
-
Bhargava, S.1
Agrawal, D.P.2
-
3
-
-
0035365149
-
Self-organization in mobile ad-hoc networks: The approach of terminodes
-
L. Blazevic, L. Buttyan, S. Tapkun, S. Giordano, J.P. Hubaux, and J.Y. Le Boudec Self-organization in mobile ad-hoc networks: the approach of terminodes IEEE Communications Magazine June 2001
-
(2001)
IEEE Communications Magazine
-
-
Blazevic, L.1
Buttyan, L.2
Tapkun, S.3
Giordano, S.4
Hubaux, J.P.5
Le Boudec, J.Y.6
-
4
-
-
1842794475
-
Intercepting mobile communications: The insecurity of 802.11
-
Borisov N, Goldberg I, Wagner D. Intercepting mobile communications: the insecurity of 802.11. In: ACM MOBICON; 2001.
-
(2001)
ACM MOBICON
-
-
Borisov, N.1
Goldberg, I.2
Wagner, D.3
-
7
-
-
33644746750
-
Ariadne: A secure on-demand routing protocol for ad hoc networks
-
Hu Y, Perrig A, Johnson D. Ariadne: a secure on-demand routing protocol for ad hoc networks. In: ACM WiSe; 2002a.
-
(2002)
ACM WiSe
-
-
Hu, Y.1
Perrig, A.2
Johnson, D.3
-
8
-
-
1842693650
-
Packet leashes: A defence against wormhole attacks in wireless networks
-
Hu Y, Perrig A, Johnson D. Packet leashes: a defence against wormhole attacks in wireless networks. In: IEEE INFOCOM; 2002b.
-
(2002)
IEEE INFOCOM
-
-
Hu, Y.1
Perrig, A.2
Johnson, D.3
-
9
-
-
1842643244
-
Sead: Secure efficient distance vector routing for mobile wireless ad hoc networks
-
Hu Y, Johnson D, Perrig A. Sead: secure efficient distance vector routing for mobile wireless ad hoc networks. In: IEEE WMCSA; 2002c.
-
(2002)
IEEE WMCSA
-
-
Hu, Y.1
Johnson, D.2
Perrig, A.3
-
13
-
-
1842643245
-
Providing robust and ubiquitous security support for mobile ad hoc networks
-
Riverside, USA
-
Kong J, Zerfos P, Luo H, Lu S, Zhang L. Providing robust and ubiquitous security support for mobile ad hoc networks. In: IEEE ICNP. Riverside, USA; 2001.
-
(2001)
IEEE ICNP
-
-
Kong, J.1
Zerfos, P.2
Luo, H.3
Lu, S.4
Zhang, L.5
-
15
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
Boston, Massachusetts, United States
-
Marti S, Giuli TJ, Lai K, Baker M. Mitigating routing misbehavior in mobile ad hoc networks. In: Proceedings of the sixth annual international conference on mobile computing and networking. Boston, Massachusetts, United States; 2000. p. 255-65.
-
(2000)
Proceedings of the Sixth Annual International Conference on Mobile Computing and Networking
, pp. 255-265
-
-
Marti, S.1
Giuli, T.J.2
Lai, K.3
Baker, M.4
-
21
-
-
0742292815
-
Ad hoc on-demand distance-vector routing (AODV)
-
Perkins CE, Royer EM. Ad hoc on-demand distance-vector routing (AODV). IETF draft; 2001.
-
(2001)
IETF Draft
-
-
Perkins, C.E.1
Royer, E.M.2
-
22
-
-
0032621035
-
A review of current routing protocols for ad-hoc mobile wireless networks
-
E.M. Royer, and C.-K. Toh A review of current routing protocols for ad-hoc mobile wireless networks IEEE Personal Communications Magazine 1999 p. 46-55
-
(1999)
IEEE Personal Communications Magazine
-
-
Royer, E.M.1
Toh, C.-K.2
-
26
-
-
84889956484
-
Using the Fluhrer, Martin, and Shamir attack to break WEP
-
Stubblefield A, Ioannidis J, Rubin A. Using the Fluhrer, Martin, and Shamir attack to break WEP. In: NDSS; 2002.
-
(2002)
NDSS
-
-
Stubblefield, A.1
Ioannidis, J.2
Rubin, A.3
|