-
1
-
-
33747395930
-
-
S. Corson, J. Macker, Mobile Ad-hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations, IETF MANET, RFC 2501, 1999.
-
-
-
-
2
-
-
0032621035
-
A review of current routing protocols for ad hoc mobile wireless networks
-
Royer E.M., and Toh C.K. A review of current routing protocols for ad hoc mobile wireless networks. IEEE Personal Communications Magazine 6 2 (1999) 46-55
-
(1999)
IEEE Personal Communications Magazine
, vol.6
, Issue.2
, pp. 46-55
-
-
Royer, E.M.1
Toh, C.K.2
-
4
-
-
85177163402
-
-
Y.C. Hu, A. Perrig, D.B. Johnson, Ariadne: A secure on-demand routing protocol for ad hoc networks, Proceedings of the Eighth Annual International Conference on Mobile Computing and Networking (MobiCom) (2002) 12-23.
-
-
-
-
5
-
-
84904904836
-
-
B. Dahill, B.N. Levine, E. Royer, C. Shields, A secure routing protocol for ad hoc networks, Proceedings of the International Conference on Network Protocols (ICNP) (2002) 78-87.
-
-
-
-
6
-
-
33646421331
-
Secure routing protocols for mobile ad-hoc wireless networks
-
Wysocki T.A., Dadej A., and Wysocki B.J. (Eds), Springer
-
Pirzada A.A., and McDonald C. Secure routing protocols for mobile ad-hoc wireless networks. In: Wysocki T.A., Dadej A., and Wysocki B.J. (Eds). Advanced Wired and Wireless Networks (2004), Springer
-
(2004)
Advanced Wired and Wireless Networks
-
-
Pirzada, A.A.1
McDonald, C.2
-
8
-
-
85177502300
-
-
S. Marti, T. Giuli, K. Lai, M. Baker, Mitigating routing misbehavior in mobile ad hoc networks, Proceedings of the Sixth Annual International Conference on Mobile Computing and Networking (MobiCom) (2000) 255-265.
-
-
-
-
10
-
-
0242696192
-
-
S. Buchegger, J. Boudec, Performance analysis of the confidant protocol: Cooperation of nodes - fairness in distributed ad-hoc networks, Proceedings of the IEEE/ACM Workshop on Mobile Ad Hoc Networking and Computing (MobiHOC) (2002) 226-236.
-
-
-
-
11
-
-
33747391691
-
-
F. Stajano, R. Anderson, The resurrecting duckling: Security issues for ad hoc wireless networks, Proceedings of the 7th International Workshop on Security Protocols (1999) 172-194.
-
-
-
-
13
-
-
84944881532
-
-
A. Nasipuri, S. Das, On-demand multipath routing for mobile ad hoc networks, Proceedings of the Eight International Conference on Computer Communications and Networks (1999) 64-70.
-
-
-
-
14
-
-
85177499606
-
-
Y.C. Hu, D.B. Johnson, Caching strategies in on-demand routing protocols for wireless ad hoc networks, Proceedings of the 6th Annual International Conference on Mobile Computing and Networking (MobiCom) (2000) 231-242.
-
-
-
-
16
-
-
33744930499
-
Reliable routing in ad-hoc networks using direct trust mechanisms (to appear)
-
Du D.Z., and Xue G. (Eds), Springer
-
Pirzada A.A., and McDonald C. Reliable routing in ad-hoc networks using direct trust mechanisms (to appear). In: Du D.Z., and Xue G. (Eds). Advances in Wireless Networks and Mobile Computing (2005), Springer
-
(2005)
Advances in Wireless Networks and Mobile Computing
-
-
Pirzada, A.A.1
McDonald, C.2
-
17
-
-
33747421133
-
-
A.A. Pirzada, A. Datta, C. McDonald, Propagating trust in ad-hoc networks for reliable routing, Proceedings of the International Workshop on Wireless Ad-hoc Networks (IWWAN)(2004).
-
-
-
-
18
-
-
33747403170
-
-
T. Beth, M. Borcherding, B. Klein, Valuation of trust in open networks, Proceedings of the Third European Symposium on Research in Computer Security (ESORICS) (1994) 3-18.
-
-
-
-
20
-
-
84994155710
-
-
A.A. Rahman, S. Hailes, A distributed trust model, Proceedings of the ACM New Security Paradigms Workshop (1997) 48-60.
-
-
-
-
21
-
-
0001591557
-
A note on two problems in connection with graphs
-
Dijkstra E.W. A note on two problems in connection with graphs. Numerische Mathematik (1959) 83-89
-
(1959)
Numerische Mathematik
, pp. 83-89
-
-
Dijkstra, E.W.1
-
22
-
-
33747425691
-
-
NS, The network simulator, http://www.isi.edu/nsnam/ns/, 1989.
-
-
-
-
23
-
-
0036998591
-
Inter-relationships of performance metrics and system parameters in mobile ad hoc networks
-
Yuen W.H., and Yates R.D. Inter-relationships of performance metrics and system parameters in mobile ad hoc networks. Proceedings of the IEEE MILCOM (2002) 519-524
-
(2002)
Proceedings of the IEEE MILCOM
, pp. 519-524
-
-
Yuen, W.H.1
Yates, R.D.2
-
24
-
-
0035360627
-
An energy consumption model for performance analysis of routing protocols for mobile ad hoc networks
-
Feeney L. An energy consumption model for performance analysis of routing protocols for mobile ad hoc networks. Mobile Networks and Applications 6 3 (2001) 239-249
-
(2001)
Mobile Networks and Applications
, vol.6
, Issue.3
, pp. 239-249
-
-
Feeney, L.1
-
26
-
-
11244252132
-
-
I. Aad, J.-P. Hubaux, E.W. Knightly, Denial of service resilience in ad hoc networks, Proceedings of the 10th Annual International Conference on Mobile Computing and Networking (MobiCom) (2004) 202-215.
-
-
-
-
27
-
-
85177499613
-
-
Y. Zhang, W. Lee, Intrusion detection in wireless ad hoc networks, Proceedings of the Sixth Annual International Conference on Mobile Computing and Networking (MobiCom) (2000) 275-283.
-
-
-
-
28
-
-
84950162203
-
-
O. Kachirski, R. Guha, Intrusion detection using mobile agents in wireless ad hoc networks, Proceedings of the IEEE Workshop on Knowledge Media Networking (KMN) (2002) 153-158.
-
-
-
|