-
1
-
-
0032621035
-
A review of current routing protocols for ad hoc mobile wireless networks
-
E. M. Royer and C. K. Toh, "A review of current routing protocols for ad hoc mobile wireless networks," IEEE Personal Communications Magazine, vol. 6, no. 2, pp. 46-55, 1999.
-
(1999)
IEEE Personal Communications Magazine
, vol.6
, Issue.2
, pp. 46-55
-
-
Royer, E.M.1
Toh, C.K.2
-
2
-
-
0003247337
-
Mobile ad-hoc networking (manet): Routing protocol performance issues and evaluation considerations
-
S. Corson and J. Macker, "Mobile ad-hoc networking (manet): Routing protocol performance issues and evaluation considerations," IETF MANET, RFC 2501, 1999.
-
(1999)
IETF MANET, RFC
, vol.2501
-
-
Corson, S.1
Macker, J.2
-
3
-
-
0036957315
-
Ariadne: A secure on-demand routing protocol for ad hoc networks
-
Y. C. Hu, A. Perrig, and D. B. Johnson, "Ariadne: A secure on-demand routing protocol for ad hoc networks," Proceedings of the Eighth Annual International Conference on Mobile Computing and Networking (MobiCom), pp. 12-23, 2002.
-
(2002)
Proceedings of the Eighth Annual International Conference on Mobile Computing and Networking (MobiCom)
, pp. 12-23
-
-
Hu, Y.C.1
Perrig, A.2
Johnson, D.B.3
-
4
-
-
84904904836
-
A secure routing protocol for ad hoc networks
-
B. Dahill, B. N. Levine, E. Royer, and C. Shields, "A secure routing protocol for ad hoc networks," Proceedings of the International Conference on Network Protocols (ICNP), pp. 78-87, 2002.
-
(2002)
Proceedings of the International Conference on Network Protocols (ICNP)
, pp. 78-87
-
-
Dahill, B.1
Levine, B.N.2
Royer, E.3
Shields, C.4
-
5
-
-
4344576243
-
Establishing trust in pure ad-hoc networks
-
A. A. Pirzada and C. McDonald, "Establishing trust in pure ad-hoc networks," Proceedings of the 27th Australasian Computer Science Conference (ACSC), vol. 26, no. 1, pp. 47-54, 2004.
-
(2004)
Proceedings of the 27th Australasian Computer Science Conference (ACSC)
, vol.26
, Issue.1
, pp. 47-54
-
-
Pirzada, A.A.1
McDonald, C.2
-
6
-
-
33646421331
-
Secure routing protocols for mobile ad-hoc wireless networks
-
T. A. Wysocki, A. Dadej, and B. J. Wysocki, Eds. Springer
-
_, "Secure routing protocols for mobile ad-hoc wireless networks," in Advanced Wired and Wireless Networks, T. A. Wysocki, A. Dadej, and B. J. Wysocki, Eds. Springer, 2004.
-
(2004)
Advanced Wired and Wireless Networks
-
-
-
8
-
-
0742292815
-
Ad hoc on-demand distance vector (aodv) routing
-
C. Perkins, E. Belding-Royer, and S. Das, "Ad hoc on-demand distance vector (aodv) routing," IETF RFC 3591, 2003.
-
(2003)
IETF RFC
, vol.3591
-
-
Perkins, C.1
Belding-Royer, E.2
Das, S.3
-
9
-
-
70450243327
-
On vulnerability and protection of ad hoc on-demand distance vector protocol
-
W. Wang, Y. Lu, and B. Bhargava, "On vulnerability and protection of ad hoc on-demand distance vector protocol," Proceedings of the International Conference on Telecommunication (ICT), pp. 375-382, 2003.
-
(2003)
Proceedings of the International Conference on Telecommunication (ICT)
, pp. 375-382
-
-
Wang, W.1
Lu, Y.2
Bhargava, B.3
-
10
-
-
0033357103
-
Securing ad hoc networks
-
L. Zhou and Z. J. Haas, "Securing ad hoc networks," IEEE Network Magazine, vol. 13, no. 6, pp. 24-30, 1999.
-
(1999)
IEEE Network Magazine
, vol.13
, Issue.6
, pp. 24-30
-
-
Zhou, L.1
Haas, Z.J.2
-
11
-
-
4344567712
-
Kerberos assisted authentication in mobile ad-hoc networks
-
A. A. Pirzada and C. McDonald, "Kerberos assisted authentication in mobile ad-hoc networks," Proceedings of the 27th Australasian Computer Science Conference (ACSC), vol. 26, no. 1, pp. 41-46, 2004.
-
(2004)
Proceedings of the 27th Australasian Computer Science Conference (ACSC)
, vol.26
, Issue.1
, pp. 41-46
-
-
Pirzada, A.A.1
McDonald, C.2
-
12
-
-
0010461175
-
-
Technical Report 00-010, NAI Labs
-
D. Carman, P. Kruus, and B. Matt, "Constraints and approaches for distributed sensor network security," Technical Report 00-010, NAI Labs, 2000.
-
(2000)
Constraints and Approaches for Distributed Sensor Network Security
-
-
Carman, D.1
Kruus, P.2
Matt, B.3
|