-
2
-
-
85106319926
-
A performance comparison of multi-hop wireless ad hoc network routing protocols
-
Broch J, Maltz DA, Johnson DB, Hu Y-C, Jetcheva J. A performance comparison of multi-hop wireless ad hoc network routing protocols. In ACM MOBICOM, 1998; 85-97.
-
(1998)
ACM MOBICOM
, pp. 85-97
-
-
Broch, J.1
Maltz, D.A.2
Johnson, D.B.3
Hu, Y.-C.4
Jetcheva, J.5
-
3
-
-
2442551009
-
Optimized link state routing protocol(OLSR)
-
March
-
Clausen T, Jacquet P. Optimized link state routing protocol(OLSR). Internet RFC 3626, http://www.ietf.org/rfc/rfc3626.txt, March 2005.
-
(2005)
Internet RFC
, vol.3626
-
-
Clausen, T.1
Jacquet, P.2
-
4
-
-
4444282195
-
Topology dissemination based on reverse-path forwarding (TBRPF)
-
March
-
Ogier R, Templin F, Lewis M. Topology dissemination based on reverse-path forwarding (TBRPF). Internet RFC 3684, http://www.ietf.org/rfc/rfc3684.txt, March 2005.
-
(2005)
Internet RFC
, vol.3684
-
-
Ogier, R.1
Templin, F.2
Lewis, M.3
-
5
-
-
85031307530
-
Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers
-
Perkins CE, Bhagwat P. Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers. In ACM SIGCOMM 1994; 234-244.
-
(1994)
ACM SIGCOMM
, pp. 234-244
-
-
Perkins, C.E.1
Bhagwat, P.2
-
6
-
-
34347349933
-
Ad-hoc on-demand distance vector routing
-
Perkins CE, Royer EM. Ad-hoc on-demand distance vector routing. In IEEE WMCSA'99 1999; 90-100.
-
(1999)
IEEE WMCSA'99
, pp. 90-100
-
-
Perkins, C.E.1
Royer, E.M.2
-
7
-
-
0000629443
-
Dynamic source routing in ad hoc wireless networks
-
Imielinski T, Korth H (eds). Kluwer Academic Publishers: Dordrecht, The Netherlands
-
Johnson DB, Maltz DA. Dynamic source routing in ad hoc wireless networks. In Mobile Computing, Vol. 353, Imielinski T, Korth H (eds). Kluwer Academic Publishers: Dordrecht, The Netherlands, 1996; 153-181.
-
(1996)
Mobile Computing
, vol.353
, pp. 153-181
-
-
Johnson, D.B.1
Maltz, D.A.2
-
9
-
-
0036957315
-
Ariadne: A secure on-demand routing protocol for ad hoc networks
-
Hu Y-C, Perrig A, Johnson DB. Ariadne: a secure on-demand routing protocol for ad hoc networks. In ACM MOBICOM 2002; 12-23.
-
(2002)
ACM MOBICOM
, pp. 12-23
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
10
-
-
0842283101
-
A secure routing protocol for ad hoc networks
-
Sanzgiri K, Dahill B, Levine BN, Shields C, Royer E. A secure routing protocol for ad hoc networks. In 10th International Conference on Network Protocols (IEEE ICNP'02), 2002.
-
(2002)
10th International Conference on Network Protocols (IEEE ICNP'02)
-
-
Sanzgiri, K.1
Dahill, B.2
Levine, B.N.3
Shields, C.4
Royer, E.5
-
13
-
-
0023861309
-
The dining cryptographers problem: Unconditional sender and recipient untraceability
-
Chaum DL. The dining cryptographers problem: unconditional sender and recipient untraceability. Journal of Cryptology 1988; 1(1): 65-75.
-
(1988)
Journal of Cryptology
, vol.1
, Issue.1
, pp. 65-75
-
-
Chaum, D.L.1
-
14
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
Chaum DL. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM 1981; 24(2): 84-88.
-
(1981)
Communications of the ACM
, vol.24
, Issue.2
, pp. 84-88
-
-
Chaum, D.L.1
-
21
-
-
0010275933
-
-
Dai W. PipeNet 1.1. http://www.eskimo.com/~weidai/pipenet.txt, 2004.
-
(2004)
PipeNet 1.1
-
-
Dai, W.1
-
23
-
-
85018204196
-
Anonymous usage of location-based services through spatial and temporal cloaking
-
Gruteser M, Grunwald D. Anonymous usage of location-based services through spatial and temporal cloaking. In MobiSys03, 2003.
-
(2003)
MobiSys03
-
-
Gruteser, M.1
Grunwald, D.2
-
25
-
-
2542616812
-
Quest for personal control over mobile location privacy
-
He Q, Wu D, Khosla P. Quest for personal control over mobile location privacy. IEEE Communications Magazine 2004; 42(5): 130-136.
-
(2004)
IEEE Communications Magazine
, vol.42
, Issue.5
, pp. 130-136
-
-
He, Q.1
Wu, D.2
Khosla, P.3
-
29
-
-
0242696170
-
ANODR: Anonymous on demand routing with untraceable routes for mobile ad-hoc networks
-
Kong J, Hong X. ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks. In ACM MOBIHOC'03 2003; 291-302.
-
(2003)
ACM MOBIHOC'03
, pp. 291-302
-
-
Kong, J.1
Hong, X.2
-
31
-
-
25844443821
-
Anonymous communications in mobile ad hoc networks
-
Zhang Y, Liu W, Lou W. Anonymous communications in mobile ad hoc networks. In IEEE INFOCOM'05, 2005.
-
(2005)
IEEE INFOCOM'05
-
-
Zhang, Y.1
Liu, W.2
Lou, W.3
-
33
-
-
85116486060
-
Location-aided routing (LAR) in mobile ad hoc networks
-
Ko Y-B, Vaidya N. Location-aided routing (LAR) in mobile ad hoc networks. In ACM MOBICOM 1998; 66-75.
-
(1998)
ACM MOBICOM
, pp. 66-75
-
-
Ko, Y.-B.1
Vaidya, N.2
-
34
-
-
0034548432
-
A scalable location service for geographic ad hoc Routing
-
Li J, Jannotti J, De Couto D, Karger D, Morris R. A scalable location service for geographic ad hoc Routing. In ACM MOBICOM 2000; 120-130.
-
(2000)
ACM MOBICOM
, pp. 120-130
-
-
Li, J.1
Jannotti, J.2
De Couto, D.3
Karger, D.4
Morris, R.5
-
38
-
-
33646851032
-
A new set of passive routing attacks in mobile ad hoc networks
-
Hong X, Kong J, Gerla M. A new set of passive routing attacks in mobile ad hoc networks. In IEEE MILCOM, 2003.
-
(2003)
IEEE MILCOM
-
-
Hong, X.1
Kong, J.2
Gerla, M.3
-
40
-
-
0031353437
-
A highly adaptive distributed routing algorithm for mobile wireless networks
-
Park VD, Corson MS. A highly adaptive distributed routing algorithm for mobile wireless networks. In IEEE INFOCOM 1997; 1405-1413.
-
(1997)
IEEE INFOCOM
, pp. 1405-1413
-
-
Park, V.D.1
Corson, M.S.2
-
42
-
-
0041973497
-
Packet leashes: A defense against wormhole attacks in wireless networks
-
Hu Y-C, Perrig A, Johnson DB. Packet leashes: a defense against wormhole attacks in wireless networks. In IEEE INFOCOM 2003.
-
(2003)
IEEE INFOCOM
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
|