-
1
-
-
0003938947
-
Optimized Link State Routing protocol (OLSR)
-
T. Clausen, Ed., P. Jacquet, Ed., RFC 3626
-
T. Clausen, Ed., P. Jacquet, Ed., "Optimized Link State Routing Protocol (OLSR)", IETF INTERNET DRAFT, RFC 3626, 2003.
-
(2003)
IETF Internet Draft
-
-
-
2
-
-
0030261244
-
A survey of routing techniques for mobile communications networks
-
S. Ramanathan and M. Streenstrup, "A survey of routing techniques for mobile communications networks", Mobile networks and Applications, 1(2): 89-104, 1996.
-
(1996)
Mobile Networks and Applications
, vol.1
, Issue.2
, pp. 89-104
-
-
Ramanathan, S.1
Streenstrup, M.2
-
3
-
-
0032621035
-
A review of current routing protocols for ad hoc mobile wireless networks
-
Apr
-
E.M. Roy er and C.-K. Toh, "A review of current routing protocols for ad hoc mobile wireless networks", IEEE Personal Communications, pp 46-55, Apr,1999.
-
(1999)
IEEE Personal Communications
, pp. 46-55
-
-
Royer, E.M.1
Toh, C.-K.2
-
5
-
-
0036957315
-
Ariadne: A secure on-demand routing protocol for ad hoc networks
-
ACM Press
-
Y.-C. Hu, A. Perrig, and D.B. Johnson, "Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks", Proc. 8th Ann. Int'l Conf. Mobile Computing and Networking (MobiCom 2002), ACM Press, 2002, pp.12-23.
-
(2002)
Proc. 8th Ann. Int'l Conf. Mobile Computing and Networking (MobiCom 2002)
, pp. 12-23
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
8
-
-
0041973497
-
Packet leashes: A defense against wormhole attacks in wireless ad hoc networks
-
IEEE Press
-
Y.-C. Hu, A. Perrig, and D.B. Johnson, "Packet Leashes: A Defense against Wormhole Attacks in Wireless Ad Hoc Networks", Proc. 22nd Ann. Joint Conf. IEEE Computer and Communications Societies (INFOCOM 2003), IEEE Press, 2003, pp. 1976-1986.
-
(2003)
Proc. 22nd Ann. Joint Conf. IEEE Computer and Communications Societies (INFOCOM 2003)
, pp. 1976-1986
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
10
-
-
0033357103
-
Securing ad hoc networks
-
IEEE Press
-
L. Zhou and Z.J. Haas, "Securing Ad Hoc Networks", IEEE Network Magazine, IEEE Press, vol. 13, no. 6, 1999, pp. 24-30.
-
(1999)
IEEE Network Magazine
, vol.13
, Issue.6
, pp. 24-30
-
-
Zhou, L.1
Haas, Z.J.2
-
11
-
-
0242678584
-
Self-organized public-key management for mobile ad hoc networks
-
IEEE Press
-
S. Capkun, L. Buttyan and J.-P. Hubaux, "Self-Organized Public-Key Management for Mobile Ad Hoc Networks", IEEE Transactions On Mobile Computer, IEEE Press, vol.2, no.1, 2003, pp. 52-63.
-
(2003)
IEEE Transactions on Mobile Computer
, vol.2
, Issue.1
, pp. 52-63
-
-
Capkun, S.1
Buttyan, L.2
Hubaux, J.-P.3
-
12
-
-
0025386404
-
A logic of authentication
-
February
-
M. Burrows, M. Abadi, and R. Needham, "A Logic of Authentication", ACM Transactions on Computer System, vol.8, no. 1, February 1990, pp. 18-36.
-
(1990)
ACM Transactions on Computer System
, vol.8
, Issue.1
, pp. 18-36
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
13
-
-
0025023289
-
Reasoning about belief in cryptographic protocols
-
IEEE Computer Society Press
-
L. Gong, R. Needham, and Yahalom, "Reasoning about Belief in Cryptographic Protocols", Proceeding of the 1990 IEEE Symposium on Research in Security and Privacy, IEEE Computer Society Press, 1990, pp. 234-248.
-
(1990)
Proceeding of the 1990 IEEE Symposium on Research in Security and Privacy
, pp. 234-248
-
-
Gong, L.1
Needham, R.2
Yahalom3
|