-
1
-
-
0032621035
-
A review of current routing protocols for ad-hoc mobile wireless networks
-
E.M. Royer and C.K. Toh, "A Review of Current Routing Protocols for Ad-Hoc Mobile Wireless Networks", IEEE Personal Communications Magazine, Vol. 6, No. 2, pp. 46-55, 1999.
-
(1999)
IEEE Personal Communications Magazine
, vol.6
, Issue.2
, pp. 46-55
-
-
Royer, E.M.1
Toh, C.K.2
-
2
-
-
0036986441
-
An on-demand secure routing protocol resilient to byzantine failures
-
B. Awerbuch, D. Holmer, C. Nita-Rotaru, and H. Rubens, "An On-Demand Secure Routing Protocol Resilient to Byzantine Failures", Proceedings of the ACM Workshop on Wireless Security (WiSe), 2002.
-
(2002)
Proceedings of the ACM Workshop on Wireless Security (WiSe)
-
-
Awerbuch, B.1
Holmer, D.2
Nita-Rotaru, C.3
Rubens, H.4
-
5
-
-
0042495505
-
An integrative model of organizational trust
-
R.C. Mayer, J.H. Davis, and F.D. Schoorman, "An Integrative Model of Organizational Trust", Proceedings of the Sixth annual ACM/IEEE International Conference on Mobile Computing and Networking, Vol. 20, No. 3, pp. 709-734, 1995.
-
(1995)
Proceedings of the Sixth Annual ACM/IEEE International Conference on Mobile Computing and Networking
, vol.20
, Issue.3
, pp. 709-734
-
-
Mayer, R.C.1
Davis, J.H.2
Schoorman, F.D.3
-
8
-
-
0036957315
-
Ariadne: A secure on-demand routing protocol for ad-hoc networks
-
Y.C. Hu, A. Perrig, and D.B. Johnson, "Ariadne: A Secure On-Demand Routing Protocol for Ad-Hoc Networks", Proceedings of the Eighth Annual International Conference on Mobile Computing and Networking (MobiCom), pp. 12-23, 2002.
-
(2002)
Proceedings of the Eighth Annual International Conference on Mobile Computing and Networking (MobiCom)
, pp. 12-23
-
-
Hu, Y.C.1
Perrig, A.2
Johnson, D.B.3
-
9
-
-
84904904836
-
A secure routing protocol for ad-hoc networks
-
B. Dahill, B.N. Levine, E. Royer, and C. Shields, "A Secure Routing Protocol for Ad-Hoc Networks", Proceedings of the International Conference on Network Protocols (ICNP) pp. 78-87, 2002.
-
(2002)
Proceedings of the International Conference on Network Protocols (ICNP)
, pp. 78-87
-
-
Dahill, B.1
Levine, B.N.2
Royer, E.3
Shields, C.4
-
10
-
-
7744238188
-
Wormhole protection in wireless ad-hoc networks
-
Department of Computer Science, Rice University
-
A. Perrig, Y.C. Hu, and D.B. Johnson, "Wormhole Protection in Wireless Ad-Hoc Networks", Technical Report TR01-384, Department of Computer Science, Rice University, 2001.
-
(2001)
Technical Report
, vol.TR01-384
-
-
Perrig, A.1
Hu, Y.C.2
Johnson, D.B.3
-
11
-
-
1542317831
-
Rushing attacks and defense in wireless Ad-Hoc network routing protocols
-
Y.-C. Hu, A. Perrig, and D.B. Johnson, "Rushing attacks and defense in wireless Ad-Hoc network routing protocols", Proceedings of the 2003 ACM workshop on Wireless Security, pp. 30-40, 2003.
-
(2003)
Proceedings of the 2003 ACM Workshop on Wireless Security
, pp. 30-40
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
13
-
-
0033357103
-
Securing ad-hoc networks
-
L. Zhou and Z.J. Haas, "Securing Ad-Hoc Networks", IEEE Network Magazine, Vol. 13, No. 6, pp. 24-30, 1999.
-
(1999)
IEEE Network Magazine
, vol.13
, Issue.6
, pp. 24-30
-
-
Zhou, L.1
Haas, Z.J.2
-
15
-
-
0035789229
-
The quest for security in mobile ad-hoc networks
-
J.P. Hubaux, L. Buttyan, and S. Capkun, "The Quest for Security in Mobile Ad-Hoc Networks", Proceedings of the ACM Symposium on Mobile Ad-Hoc Networking and Computing (MobiHoc), pp. 146-155, 2001.
-
(2001)
Proceedings of the ACM Symposium on Mobile Ad-hoc Networking and Computing (MobiHoc)
, pp. 146-155
-
-
Hubaux, J.P.1
Buttyan, L.2
Capkun, S.3
-
18
-
-
20844449427
-
Trustworthy routing with the AODV protocol
-
A.A. Pirzada, A. Datta, and C. McDonald, "Trustworthy Routing with the AODV Protocol", Proceedings of the International Networking and Communications Conference (INCC), pp. 19-24, 2004.
-
(2004)
Proceedings of the International Networking and Communications Conference (INCC)
, pp. 19-24
-
-
Pirzada, A.A.1
Datta, A.2
McDonald, C.3
-
19
-
-
28244448922
-
The Dynamic Source Routing protocol for mobile ad-hoc networks (DSR)
-
Work in Progress
-
D.B. Johnson, D.A. Maltz, and Y. Hu, "The Dynamic Source Routing Protocol for Mobile Ad-Hoc Networks (DSR)", IETF MANET, Internet Draft (Work in Progress), 2003.
-
(2003)
IETF MANET, Internet Draft
-
-
Johnson, D.B.1
Maltz, D.A.2
Hu, Y.3
-
20
-
-
0742292815
-
Ad-hoc On-demand Distance Vector (AODV) routing
-
C. Perkins, E. Belding-Royer, and S. Das, "Ad-Hoc On-Demand Distance Vector (AODV) Routing", IETF RFC 3591, 2003.
-
(2003)
IETF RFC
, vol.3591
-
-
Perkins, C.1
Belding-Royer, E.2
Das, S.3
-
21
-
-
85031307530
-
Dynamic Destination-sequenced Distance-Vector Routing (DSDV) for mobile computers
-
C.E. Perkins and P. Bhagwat, "Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for Mobile Computers", Proceedings of the SIGCOMM Conference on Communications, Architectures, Protocols and Applications, pp. 234-244, 1994.
-
(1994)
Proceedings of the SIGCOMM Conference on Communications, Architectures, Protocols and Applications
, pp. 234-244
-
-
Perkins, C.E.1
Bhagwat, P.2
-
22
-
-
0003485243
-
Temporally Ordered Routing Algorithm (TORA) version 1 functional specification
-
Work in Progress
-
V. Park and S. Corson, "Temporally Ordered Routing Algorithm (TORA) Version 1 Functional Specification", IETF MANET, Internet Draft (work in progress), 2001.
-
(2001)
IETF MANET, Internet Draft
-
-
Park, V.1
Corson, S.2
-
23
-
-
0019516256
-
Distributed algorithms for generating loop-free routes in networks with frequently changing topology
-
E. Gafni and D. Bertsekas, "Distributed Algorithms for Generating Loop-Free Routes in Networks with Frequently Changing Topology", IEEE Transactions on Communications, Vol. 29, No. 1, pp. 11-18, 1981.
-
(1981)
IEEE Transactions on Communications
, vol.29
, Issue.1
, pp. 11-18
-
-
Gafni, E.1
Bertsekas, D.2
-
24
-
-
4544279563
-
Lightweight Mobile Routing protocol (LMR), a distributed routing algorithm for mobile wireless networks
-
M.S. Corson and A. Ephremides: "Lightweight Mobile Routing Protocol (LMR), A Distributed Routing Algorithm for Mobile Wireless Networks", Wireless Networks, 1995.
-
(1995)
Wireless Networks
-
-
Corson, M.S.1
Ephremides, A.2
-
25
-
-
0003882901
-
Internet MANET Encapsulation Protocol (IMEP) specification
-
Work in Progress
-
S. Corson, S. Papademetriou, P. Papadopoulos, V. Park, and A. Qayyum, "Internet MANET Encapsulation Protocol (IMEP) specification", IETF MANET, Internet Draft (work in progress), 1999.
-
(1999)
IETF MANET, Internet Draft
-
-
Corson, S.1
Papademetriou, S.2
Papadopoulos, P.3
Park, V.4
Qayyum, A.5
-
28
-
-
33744930499
-
Reliable routing in ad-hoc networks using direct trust mechanisms (to appear)
-
D.Z. Du and G. Xue (eds.), Springer
-
A.A. Pirzada and C. McDonald, "Reliable Routing in Ad-hoc Networks Using Direct Trust Mechanisms (to appear)", In: D.Z. Du and G. Xue (eds.), Advances in Wireless Networks and Mobile Computing, Springer, 2005.
-
(2005)
Advances in Wireless Networks and Mobile Computing
-
-
Pirzada, A.A.1
McDonald, C.2
-
29
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad-hoc networks
-
S. Marti, T. Giuli, K. Lai, and M. Baker, "Mitigating Routing Misbehavior in Mobile Ad-Hoc Networks", Proceedings of the Sixth Annual International Conference on Mobile Computing and Networking (MobiCom), pp. 255-265, 2000.
-
(2000)
Proceedings of the Sixth Annual International Conference on Mobile Computing and Networking (MobiCom)
, pp. 255-265
-
-
Marti, S.1
Giuli, T.2
Lai, K.3
Baker, M.4
-
30
-
-
33646571009
-
An address assignment for the automatic configuration of mobile ad-hoc networks
-
A.P. Tayal and L.M. Patnaik, "An Address Assignment for the Automatic Configuration of Mobile Ad-Hoc Networks", Personal and Ubiquitous Computing, Vol. 8, No. 1, pp. 47-54, 2004.
-
(2004)
Personal and Ubiquitous Computing
, vol.8
, Issue.1
, pp. 47-54
-
-
Tayal, A.P.1
Patnaik, L.M.2
-
31
-
-
34047233240
-
Security, privacy and trust in mobile systems and applications
-
M. Pagani (ed.). IRM Press
-
M. Cremonini, E. Damiani, S.D.C.D. Vimercati, and P. Samarati, "Security, Privacy and Trust in Mobile Systems and Applications", In: M. Pagani (ed.): Mobile and Wireless Systems beyond 3G: Managing New Business Opportunities. IRM Press, 2005.
-
(2005)
Mobile and Wireless Systems beyond 3G: Managing New Business Opportunities
-
-
Cremonini, M.1
Damiani, E.2
Vimercati, S.D.C.D.3
Samarati, P.4
-
32
-
-
4544308674
-
Observation-based cooperation enforcement in ad-hoc networks
-
Stanford University
-
S. Bansal and M. Baker, "Observation-based Cooperation Enforcement in Ad-Hoc Networks", Technical report, Stanford University, 2003.
-
(2003)
Technical Report
-
-
Bansal, S.1
Baker, M.2
|