메뉴 건너뛰기




Volumn 3813 LNCS, Issue , 2005, Pages 113-127

Provable security fof on-demand distance vector routing in wireless ad hoc networks

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER NETWORKS; COMPUTER SIMULATION; CRYPTOGRAPHY; MATHEMATICAL MODELS; NETWORK PROTOCOLS; ROUTERS; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 33745747748     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11601494_10     Document Type: Conference Paper
Times cited : (28)

References (15)
  • 1
    • 67649585369 scopus 로고    scopus 로고
    • Provably secure on-demand source routing in mobile ad hoc networks
    • Budapest University of Technology and Economics, March
    • G. Ács, L. Buttyán, and I. Vajda. Provably Secure On-demand Source Routing in Mobile Ad Hoc Networks. Technical Report, Budapest University of Technology and Economics, March 2005. Available on-line at: http://www.hit.bme.hu/~buttyan/publications.html
    • (2005) Technical Report
    • Ács, G.1    Buttyán, L.2    Vajda, I.3
  • 4
    • 33745738584 scopus 로고    scopus 로고
    • R. Focardi and R. Gorrieri (eds). LNCS 2171, Springer-Verlag
    • R. Focardi and R. Gorrieri (eds). Foundations of Security Analysis and Design. LNCS 2171, Springer-Verlag, 2000.
    • (2000) Foundations of Security Analysis and Design
  • 5
    • 0012841819 scopus 로고    scopus 로고
    • Security goals: Packet trajectories and strand spaces
    • edited by R. Focardi and R. Gorrieri, Springer LNCS 2171
    • J. Guttman. Security goals: packet trajectories and strand spaces. In Foundations of Security Analysis and Design, edited by R. Focardi and R. Gorrieri, Springer LNCS 2171, 2000.
    • (2000) Foundations of Security Analysis and Design
    • Guttman, J.1
  • 7
    • 3042647758 scopus 로고    scopus 로고
    • A survey of secure wireless ad hoc routing
    • May/June
    • Y.-C. Hu and A. Perrig. A survey of secure wireless ad hoc routing. IEEE Security and Privacy Magazine, 2(3):28-39, May/June 2004.
    • (2004) IEEE Security and Privacy Magazine , vol.2 , Issue.3 , pp. 28-39
    • Hu, Y.-C.1    Perrig, A.2
  • 8
    • 0000629443 scopus 로고    scopus 로고
    • Dynamic source routing in ad hoc wireless networks
    • edited by Tomasz Imielinski and Hank Korth, Chapter 5, pages 153-181. Kluwer Academic Publisher
    • D. Johnson and D. Maltz. Dynamic source routing in ad hoc wireless networks. In Mobile Computing, edited by Tomasz Imielinski and Hank Korth, Chapter 5, pages 153-181. Kluwer Academic Publisher, 1996.
    • (1996) Mobile Computing
    • Johnson, D.1    Maltz, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.