-
4
-
-
0000629443
-
Dynamic source routing in ad hoc wireless networks
-
Imielinski T, Korth H (eds). Kluwer Academic Publishers: Boston
-
Johnson DB, Maltz DA. Dynamic source routing in ad hoc wireless networks. In Mobile Computing, Imielinski T, Korth H (eds). Kluwer Academic Publishers: Boston, 1996; 153-181.
-
(1996)
Mobile Computing
, pp. 153-181
-
-
Johnson, D.B.1
Maltz, D.A.2
-
5
-
-
0031353437
-
A highly adaptive distributed routing algorithm for mobile wireless networks
-
April
-
Park VD, Corson MS. A highly adaptive distributed routing algorithm for mobile wireless networks. In Proceedings of IEEE INFOCOM'97, April 1997.
-
(1997)
Proceedings of IEEE INFOCOM'97
-
-
Park, V.D.1
Corson, M.S.2
-
10
-
-
0012575586
-
Packet leashes: A defense against wormhole attacks in wireless ad hoc networks
-
Department of Computer Science, Rice University, December
-
Hu YC, Perrig A, Johnson DB. Packet leashes: A defense against wormhole attacks in wireless ad hoc networks. Technical Report TR01-384, Department of Computer Science, Rice University, December 2001.
-
(2001)
Technical Report TR01-384
-
-
Hu, Y.C.1
Perrig, A.2
Johnson, D.B.3
-
13
-
-
0033357103
-
Securing ad hoc networks
-
Zhou L, Haas Z. Securing ad hoc networks. IEEE Network 1999; 13(6): 24-30.
-
(1999)
IEEE Network
, vol.13
, Issue.6
, pp. 24-30
-
-
Zhou, L.1
Haas, Z.2
-
14
-
-
0018545449
-
How to share a secret
-
Shamir A. How to share a secret. Communications of the ACM 1979; 22(11): 612-613.
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
18
-
-
33646852748
-
BISS: Building secure routing out of an incomplete set of security associations
-
September
-
Capkun S, Hubaux JP. BISS: building secure routing out of an incomplete set of security associations. In Proceedings of ACM WiSe2003, September 2003.
-
(2003)
Proceedings of ACM WiSe2003
-
-
Capkun, S.1
Hubaux, J.P.2
-
21
-
-
15344348312
-
Secure routing with tamper resistant module for mobile ad hoc networks
-
June
-
Song JH, Wong H, Leung V, et al. Secure routing with tamper resistant module for mobile ad hoc networks. In Proceedings of ACM MobiHoc2003, June 2003.
-
(2003)
Proceedings of ACM MobiHoc2003
-
-
Song, J.H.1
Wong, H.2
Leung, V.3
-
22
-
-
33646840438
-
The secure routing protocol (SRP) for ad hoc networks
-
Work in progress, December
-
Papadimitratos P, Haas ZJ, Samar P. The secure routing protocol (SRP) for ad hoc networks. IETF Internet Draft, Work in progress, December 2002.
-
(2002)
IETF Internet Draft
-
-
Papadimitratos, P.1
Haas, Z.J.2
Samar, P.3
-
27
-
-
11244250305
-
The effect of rumour spreading in reputation systems for mobile ad-hoc networks
-
March
-
Buchegger S, Le Boudec JY. The effect of rumour spreading in reputation systems for mobile ad-hoc networks. In Proceedings of WiOpt03, March 2003.
-
(2003)
Proceedings of WiOpt03
-
-
Buchegger, S.1
Le Boudec, J.Y.2
-
28
-
-
14844335451
-
Coping with false accusations in misbehavior reputation systems for mobile ad-hoc networks
-
Ecole Polytechnique Federale de Lausanne, May
-
Buchegger S, Le Boudec JY. Coping with false accusations in misbehavior reputation systems for mobile ad-hoc networks. Technical Report IC/2003/31, Ecole Polytechnique Federale de Lausanne, May 2003.
-
(2003)
Technical Report IC/2003/31
-
-
Buchegger, S.1
Le Boudec, J.Y.2
-
31
-
-
4544308674
-
Observation-based cooperation enforcement in ad-hoc networks
-
Stanford University
-
Bansal S, Baker M. Observation-based cooperation enforcement in ad-hoc networks. Techical Report, Stanford University, 2003.
-
(2003)
Techical Report
-
-
Bansal, S.1
Baker, M.2
-
32
-
-
4544283175
-
SORI: A secure and objective reputation-based incentive scheme for ad-hoc networks
-
March
-
He Q, Wu D, Khosla P. SORI: a secure and objective reputation-based incentive scheme for ad-hoc networks. In Proceedings of IEEE WCNC2004, March 2004.
-
(2004)
Proceedings of IEEE WCNC2004
-
-
He, Q.1
Wu, D.2
Khosla, P.3
-
35
-
-
0042933944
-
Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks
-
April
-
Zhong S, Chen J, Yang R. Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks. In Proceedings of IEEE INFOCOM2003, April 2003.
-
(2003)
Proceedings of IEEE INFOCOM2003
-
-
Zhong, S.1
Chen, J.2
Yang, R.3
-
36
-
-
1842693647
-
Self-organized network-layer security in mobile ad hoc networks
-
September
-
Yang H, Meng X, Lu S. Self-organized network-layer security in mobile ad hoc networks. In Proceedings of ACM WiSe02, September 2002.
-
(2002)
Proceedings of ACM WiSe02
-
-
Yang, H.1
Meng, X.2
Lu, S.3
-
40
-
-
0004118144
-
Nuglets: A virtual currency to stimulate cooperation in self-organized mobile ad hoc networks
-
EPFL, January
-
Buttyan L, Hubaux JP. Nuglets: a virtual currency to stimulate cooperation in self-organized mobile ad hoc networks. Technical Report No. DSC/2001/001, EPFL, January 2001.
-
(2001)
Technical Report No. DSC/2001/001
-
-
Buttyan, L.1
Hubaux, J.P.2
-
41
-
-
0031078841
-
Trusting mobile user devices and security modules
-
February
-
Pfitzmann A, Pfitzmann B, Waidner M. Trusting mobile user devices and security modules. IEEE Computer, February 1997, 61-68.
-
(1997)
IEEE Computer
, pp. 61-68
-
-
Pfitzmann, A.1
Pfitzmann, B.2
Waidner, M.3
|