-
1
-
-
1342306709
-
Security for cluster based ad hoc networks
-
Mar
-
V. Varadharajan, R. Shankaran, and M. Hitchens, "Security for cluster based ad hoc networks," in Elsevier Computer Communications, vol. 27(5), pp.488-501, Mar 2004.
-
(2004)
Elsevier Computer Communications
, vol.27
, Issue.5
, pp. 488-501
-
-
Varadharajan, V.1
Shankaran, R.2
Hitchens, M.3
-
2
-
-
0041973497
-
Packet leashes: A defense against wormhole attacks in wireless networks
-
Apr
-
Y. C. Hu, A. Perrig, and D. B. Johnson, "Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks," presented at IEEE INFOCOM 2003, vol. 3, pp. 1976-1986, Apr 2003.
-
(2003)
IEEE INFOCOM 2003
, vol.3
, pp. 1976-1986
-
-
Hu, Y.C.1
Perrig, A.2
Johnson, D.B.3
-
3
-
-
0036957315
-
Ariadne:: A secure on-demand routing protocol for ad hoc networks
-
Atlanta, Georgia, USA
-
Y. C. Hu, A. Perrig, and D. B. Johnson, "Ariadne:: A Secure On-demand Routing Protocol for Ad Hoc Networks," presented at Proceedings of the 8th annual international conference on Mobile computing and networking, Atlanta, Georgia, USA, pp. 12-23, 2002.
-
(2002)
Proceedings of the 8th Annual International Conference on Mobile Computing and Networking
, pp. 12-23
-
-
Hu, Y.C.1
Perrig, A.2
Johnson, D.B.3
-
5
-
-
0036980294
-
Securing Ad hoc routing protocols
-
Atlanta, GA, USA, Sep
-
M. G. Zapata and N. Asokan, "Securing Ad hoc Routing Protocols," presented at International Conference on Mobile Computing and Networking. Proceedings of the ACM workshop on Wireless security, Atlanta, GA, USA, pp. 1-10, Sep 2002.
-
(2002)
International Conference on Mobile Computing and Networking. Proceedings of the ACM Workshop on Wireless Security
, pp. 1-10
-
-
Zapata, M.G.1
Asokan, N.2
-
6
-
-
84904904836
-
A secure routing protocol for ad hoc networks
-
Paris, France, Nov
-
K. Sanzgiri, B. Dahill, B. N. Levine, C. Shields, and E. M. Belding-Royer, "A Secure Routing Protocol for Ad Hoc Networks," presented at 10th IEEE International Conference on Network Protocols (ICNP'02), Paris, France, pp. 78-87, Nov 2002.
-
(2002)
10th IEEE International Conference on Network Protocols (ICNP'02)
, pp. 78-87
-
-
Sanzgiri, K.1
Dahill, B.2
Levine, B.N.3
Shields, C.4
Belding-Royer, E.M.5
-
7
-
-
0036804761
-
Routing security in wireless ad hoc networks
-
Oct
-
H. Deng, W. Li, and D. P.Agrawal, "Routing Security in Wireless Ad Hoc Networks," in IEEE Communications Magazine, vol. 40(10), pp. 70- 75, Oct 2002.
-
(2002)
IEEE Communications Magazine
, vol.40
, Issue.10
, pp. 70-75
-
-
Deng, H.1
Li, W.2
Agrawal, D.P.3
-
8
-
-
0035789243
-
Security-aware ad hoc routing for wireless networks
-
Long Beach, CA, USA
-
S. Yi, P. Naldurg, and R. Kravets, "Security-aware ad hoc routing for wireless networks," presented at Proceedings of the 2nd ACM International Symposium on Mobile Ad hoc Networking & Computing, Long Beach, CA, USA, pp. 299-302, 2001.
-
(2001)
Proceedings of the 2nd ACM International Symposium on Mobile Ad Hoc Networking & Computing
, pp. 299-302
-
-
Yi, S.1
Naldurg, P.2
Kravets, R.3
-
9
-
-
0242696192
-
Performance analysis of the CONFIDANT protocol
-
Lausanne, Switzerland, Jun
-
S. Buchegger and J. Y. L. Boudec, "Performance analysis of the CONFIDANT protocol," presented at Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing, Lausanne, Switzerland, pp. 226-236, Jun 2002.
-
(2002)
Proceedings of the 3rd ACM International Symposium on Mobile Ad Hoc Networking & Computing
, pp. 226-236
-
-
Buchegger, S.1
Boudec, J.Y.L.2
-
10
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
Boston, Massachusetts, United States
-
S. Marti, T. J. Giuli, K. Lai, and M. Baker, "Mitigating Routing Misbehavior in Mobile Ad Hoc Networks," presented at Proceedings of the 6th annual international conference on Mobile Computing and Networking (MOBICOM), Boston, Massachusetts, United States, pp. 255-265, 2000.
-
(2000)
Proceedings of the 6th Annual International Conference on Mobile Computing and Networking (MOBICOM)
, pp. 255-265
-
-
Marti, S.1
Giuli, T.J.2
Lai, K.3
Baker, M.4
-
12
-
-
3042647758
-
A survey of secure wireless ad hoc routing
-
May
-
Y. C. Hu and A. Perrig, "A Survey of Secure Wireless Ad Hoc Routing," in IEEE Security and Privacy, vol. 2(3), pp. 28 - 39, May 2004.
-
(2004)
IEEE Security and Privacy
, vol.2
, Issue.3
, pp. 28-39
-
-
Hu, Y.C.1
Perrig, A.2
-
13
-
-
10744229755
-
Routing and security in mobile ad hoc networks
-
Feb
-
N. Milanovic, M. Malek, A. Davidson, and V. Milutinovic, "Routing and Security in Mobile Ad Hoc Networks," in IEEE Computer, vol. 37(2), pp. 61- 65, Feb 2004.
-
(2004)
IEEE Computer
, vol.37
, Issue.2
, pp. 61-65
-
-
Milanovic, N.1
Malek, M.2
Davidson, A.3
Milutinovic, V.4
-
14
-
-
1842815887
-
Security in mobile ad hoc networks: Challenges and solutions
-
Feb
-
H. Yang, H. Luo, F. Ye, S. Lu, and L. Zhang, "Security in Mobile Ad Hoc Networks: Challenges and Solutions," in IEEE Wireless Communications, vol. 11(1), pp. 38- 47, Feb 2004.
-
(2004)
IEEE Wireless Communications
, vol.11
, Issue.1
, pp. 38-47
-
-
Yang, H.1
Luo, H.2
Ye, F.3
Lu, S.4
Zhang, L.5
-
15
-
-
33751068221
-
Collaborative trust-based secure routing in multihop ad hoc networks
-
Athens, Greece
-
N. Pissinou, T. Ghosh, and K. Makki, "Collaborative Trust-Based Secure Routing in Multihop Ad Hoc Networks," presented at Third International IFIP-TC6 Networking Conference, Athens, Greece, 2004.
-
(2004)
Third International IFIP-TC6 Networking Conference
-
-
Pissinou, N.1
Ghosh, T.2
Makki, K.3
-
17
-
-
0001341422
-
DSR: The dynamic source routing protocol for multihop wireless ad hoc networks
-
C. E.Perkins, Ed.: Addison-Wesley Longman Publishing Co., Inc. Boston, MA, USA
-
D. B. Johnson, D. A. Maltz, and J. Broch, "DSR: the dynamic source routing protocol for multihop wireless ad hoc networks," in Ad hoc Networking, C. E.Perkins, Ed.: Addison-Wesley Longman Publishing Co., Inc. Boston, MA, USA, 2001, pp. 139-172
-
(2001)
Ad Hoc Networking
, pp. 139-172
-
-
Johnson, D.B.1
Maltz, D.A.2
Broch, J.3
-
18
-
-
0035249889
-
Performance comparison of two on-demand routing protocols for ad hoc networks
-
Feb
-
C. E. Perkins, E. M. Royer, S. R. Das, and M. K. Marina, "Performance Comparison of two On-demand Routing Protocols for Ad hoc Networks," IEEE Personal Communications, vol. 8(1), pp. 16 - 28, Feb 2001.
-
(2001)
IEEE Personal Communications
, vol.8
, Issue.1
, pp. 16-28
-
-
Perkins, C.E.1
Royer, E.M.2
Das, S.R.3
Marina, M.K.4
-
19
-
-
0032621035
-
A review of current routing protocols for ad hoc mobile wireless networks
-
Apr
-
E. M. Royer and C. K. Toh, "A review of current routing protocols for ad hoc mobile wireless networks," IEEE Personal Communications, vol. 6(2), pp. 46 - 55, Apr 1999.
-
(1999)
IEEE Personal Communications
, vol.6
, Issue.2
, pp. 46-55
-
-
Royer, E.M.1
Toh, C.K.2
-
20
-
-
0036793924
-
Denial of service in sensor networks
-
Oct
-
A. D. Wood and J. A. Stankovic, "Denial of Service in Sensor Networks," in IEEE Computer, vol. 35(10), pp. 54-62, Oct 2002.
-
(2002)
IEEE Computer
, vol.35
, Issue.10
, pp. 54-62
-
-
Wood, A.D.1
Stankovic, J.A.2
-
21
-
-
15744368857
-
Efficient and secure source authentication for multicast
-
Feb
-
A.Perrig, R.Canetti, D.Song, and J. D. Tygar. "Efficient and Secure Source Authentication for Multicast", In Network and Distributed System Security Symposium, NDSS '01, pages 35-46, Feb 2001.
-
(2001)
Network and Distributed System Security Symposium, NDSS '01
, pp. 35-46
-
-
Perrig, A.1
Canetti, R.2
Song, D.3
Tygar, J.D.4
-
22
-
-
0003839495
-
-
Ph.D. Thesis. Department of Computer Science, University of Stirling
-
Marsh S., Formalizing Trust as a Computational Concept. Ph.D. Thesis. Department of Computer Science, University of Stirling, 1994.
-
(1994)
Formalizing Trust As A Computational Concept
-
-
Marsh, S.1
|