메뉴 건너뛰기




Volumn 3907 LNCS, Issue , 2006, Pages 243-254

BeeHiveGuard: A step towards secure nature inspired routing algorithms

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER CRIME; COSTS; CRYPTOGRAPHY; NETWORK PROTOCOLS; SECURITY OF DATA;

EID: 33745781835     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11732242_22     Document Type: Conference Paper
Times cited : (8)

References (16)
  • 1
    • 0000873984 scopus 로고    scopus 로고
    • AntNet: Distributed stigmergetic control for communication networks
    • December
    • G. Di Caro and M. Dorigo. AntNet: Distributed stigmergetic control for communication networks. Journal of Artificial Intelligence Research, 9:317-365, December 1998.
    • (1998) Journal of Artificial Intelligence Research , vol.9 , pp. 317-365
    • Di Caro, G.1    Dorigo, M.2
  • 6
    • 17444426121 scopus 로고    scopus 로고
    • Ariadne: A secure on-demand routing protocol for ad hoc networks
    • Yih-Chun Hu, Adrian Perrig, and David B. Johnson. Ariadne: A secure on-demand routing protocol for ad hoc networks. Wireless Networks, 11(1-2):21-38, 2005.
    • (2005) Wireless Networks , vol.11 , Issue.1-2 , pp. 21-38
    • Hu, Y.-C.1    Perrig, A.2    Johnson, D.B.3
  • 9
    • 0003828107 scopus 로고    scopus 로고
    • Network layer protocols with byzantine robustness
    • phd thesis, Department of Electrical Engineering and Computer Science, Massachusetts Institute of Technolog
    • R. Perlman. Network layer protocols with byzantine robustness, phd thesis. Technical report, Department of Electrical Engineering and Computer Science, Massachusetts Institute of Technolog, 1998.
    • (1998) Technical Report
    • Perlman, R.1
  • 10
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • Ronald L. Rivest, Adi Shamir, and Leonard M. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM, 21(2):120-126, 1978.
    • (1978) Commun. ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.M.3
  • 14
    • 24644436040 scopus 로고    scopus 로고
    • A performance evaluation framework for nature inspired routing algorithms
    • Springer Verlag, March
    • H. F. Wedde and M. Farooq. A performance evaluation framework for nature inspired routing algorithms. In Applications of Evolutionary Computing, LNCS 3449, pages 136-146. Springer Verlag, March 2005.
    • (2005) Applications of Evolutionary Computing, LNCS , vol.3449 , pp. 136-146
    • Wedde, H.F.1    Farooq, M.2
  • 15
    • 77049105442 scopus 로고    scopus 로고
    • BeeHive: An efficient fault-tolerant routing algorithm inspired by honey bee behavior
    • Springer Verlag, Sept
    • H. F. Wedde, M. Farooq, and Y. Zhang. BeeHive: An efficient fault-tolerant routing algorithm inspired by honey bee behavior. In Ant Colony Optimization and Swarm Intelligence, LNCS 3172, pages 83-94. Springer Verlag, Sept 2004.
    • (2004) Ant Colony Optimization and Swarm Intelligence, LNCS , vol.3172 , pp. 83-94
    • Wedde, H.F.1    Farooq, M.2    Zhang, Y.3
  • 16
    • 5044250232 scopus 로고    scopus 로고
    • When ants attack: Security issues for stigmergic systems
    • Department of Computer Science, University of Virginina, CS-2002-3
    • W. Zhong and D. Evans. When ants attack: Security issues for stigmergic systems. Technical report, Department of Computer Science, University of Virginina, CS-2002-3, 2002.
    • (2002) Technical Report
    • Zhong, W.1    Evans, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.