-
1
-
-
0035789267
-
Secure pebblenets
-
ACM Press
-
Stefano Basagni, Kris Herrin, Danilo Bruschi, and Emilia Rosti. Secure pebblenets. In MobiHoc '01: Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing, pages 156-163. ACM Press, 2001.
-
(2001)
MobiHoc '01: Proceedings of the 2nd ACM International Symposium on Mobile Ad Hoc Networking & Computing
, pp. 156-163
-
-
Basagni, S.1
Herrin, K.2
Bruschi, D.3
Rosti, E.4
-
2
-
-
0003208878
-
Amroute: Adhoc multicast routing protocol
-
IETF, draft-talpade-manet-amroute-00.txt, August 6
-
E. Bommaiah, A. McAuley, R. Talpade, and M. Liu. Amroute: Adhoc multicast routing protocol. IETF, Internet Draft, draft-talpade-manet-amroute-00.txt, August 6, 1998.
-
(1998)
Internet Draft
-
-
Bommaiah, E.1
McAuley, A.2
Talpade, R.3
Liu, M.4
-
3
-
-
0036929565
-
Secure multicast in wireless networks of mobile hosts: Protocols and issues
-
Danilo Bruschi and Emilia Rosti. Secure multicast in wireless networks of mobile hosts: protocols and issues. Mobile Networks and Applications, 7(6):503-511, 2002.
-
(2002)
Mobile Networks and Applications
, vol.7
, Issue.6
, pp. 503-511
-
-
Bruschi, D.1
Rosti, E.2
-
5
-
-
0037250696
-
Multicast over wireless mobile ad hoc networks: Present and future direction
-
jan/feb
-
C. Cordeiro, H. Gossain, and Dharma P. Agrawal. Multicast over wireless mobile ad hoc networks: Present and future direction. In IEEE Network, special issue on Multicasting: An Enabling Technology, volume 17, pages 52-59, jan/feb 2003.
-
(2003)
IEEE Network, Special Issue on Multicasting: An Enabling Technology
, vol.17
, pp. 52-59
-
-
Cordeiro, C.1
Gossain, H.2
Agrawal, D.P.3
-
6
-
-
13244276488
-
Secure routing in mobile wireless ad hoc networks
-
S. Gupte and M. Singhal. Secure routing in mobile wireless ad hoc networks. Ad Hoc Networks, 1:151-174, 2003.
-
(2003)
Ad Hoc Networks
, vol.1
, pp. 151-174
-
-
Gupte, S.1
Singhal, M.2
-
7
-
-
11244269535
-
Sead: Secure efficient distance vector routing for mobile wireless ad hoc networks
-
Yih-Chun Hu, David B. Johnson, and Adrian Perrig. Sead: Secure efficient distance vector routing for mobile wireless ad hoc networks. Ad Hoc Networks, 1(1):175-192, 2003.
-
(2003)
Ad Hoc Networks
, vol.1
, Issue.1
, pp. 175-192
-
-
Hu, Y.-C.1
Johnson, D.B.2
Perrig, A.3
-
9
-
-
0041973497
-
Packet leashes: A defense against wormhole attacks in wireless networks
-
April
-
Yih-Chun Hu, Adrian Perrig, and David B. Johnson. Packet leashes: A defense against wormhole attacks in wireless networks. In Proceedings of IEEE Infocomm 2003, April 2003.
-
(2003)
Proceedings of IEEE Infocomm 2003
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
11
-
-
0035000419
-
Differential destination multicast - A manet multicast routing protocol for small groups
-
L. Ji and M. S. Corson. Differential destination multicast - a manet multicast routing protocol for small groups. In Proceedings of INFOCOM, pages 1192-02, 2001.
-
(2001)
Proceedings of INFOCOM
, pp. 1192-1202
-
-
Ji, L.1
Corson, M.S.2
-
12
-
-
0000629443
-
Dynamic source routing in ad hoc wireless networks
-
Kluwer Academic Publishers
-
David B Johnson and David A Maltz. Dynamic source routing in ad hoc wireless networks. In Mobile Computing, volume 353. Kluwer Academic Publishers, 1996.
-
(1996)
Mobile Computing
, vol.353
-
-
Johnson, D.B.1
Maltz, D.A.2
-
13
-
-
4544326206
-
Secure multicast groups on ad hoc networks
-
ACM Press
-
T. Kaya, G. Lin, G. Noubir, and A. Yilmaz. Secure multicast groups on ad hoc networks. In SASN '03: Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks, pages 94-102. ACM Press, 2003.
-
(2003)
SASN '03: Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks
, pp. 94-102
-
-
Kaya, T.1
Lin, G.2
Noubir, G.3
Yilmaz, A.4
-
17
-
-
33845475210
-
Robust membership management for ad-hoc groups
-
Reykjavik, Iceland, October
-
Silja Mäki, Tuomas Aura, and Maarit Hietalahti. Robust membership management for ad-hoc groups. In Proc. 5th Nordic Workshop on Secure IT Systems (NORDSEC 2000), Reykjavik, Iceland, October 2000.
-
(2000)
Proc. 5th Nordic Workshop on Secure IT Systems (NORDSEC 2000)
-
-
Mäki, S.1
Aura, T.2
Hietalahti, M.3
-
18
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
Sergio Marti, T. J. Giuli, Kevin Lai, and Mary Baker. Mitigating routing misbehavior in mobile ad hoc networks. In Mobile Computing and Networking, pages 255-265, 2000.
-
(2000)
Mobile Computing and Networking
, pp. 255-265
-
-
Marti, S.1
Giuli, T.J.2
Lai, K.3
Baker, M.4
-
19
-
-
1342323825
-
Group communications in mobile ad hoc networks
-
Prasant Mohapatra, Chao Gui, and Jian Li. Group communications in mobile ad hoc networks. IEEE Computer, 37(2):52-59, 2004.
-
(2004)
IEEE Computer
, vol.37
, Issue.2
, pp. 52-59
-
-
Mohapatra, P.1
Chao, G.2
Jian, L.3
-
20
-
-
84903836776
-
How to misuse aodv: A case study of insider attacks against mobile adhoc routing protocols
-
West Point, June
-
Peng Ning and Kun Sun. How to misuse aodv: A case study of insider attacks against mobile adhoc routing protocols. In Proceedings of the 4th Annual IEEE Information Assurance Workshop, pages 60-67, West Point, June 2003.
-
(2003)
Proceedings of the 4th Annual IEEE Information Assurance Workshop
, pp. 60-67
-
-
Peng, N.1
Kun, S.2
-
23
-
-
15744368857
-
Efficient and secure source authentication for multicast
-
February
-
Adrian Perrig, Ran Canetti, Dawn Song, and J. D. Tygar. Efficient and secure source authentication for multicast. In Network and Distributed System Security Symposium, NDSS '01, pages 35-46, February 2001.
-
(2001)
Network and Distributed System Security Symposium, NDSS '01
, pp. 35-46
-
-
Perrig, A.1
Canetti, R.2
Song, D.3
Tygar, J.D.4
-
25
-
-
0012843946
-
Multicast ad hoc on demand distance vector (maodv) routing
-
draft-ietf-manet-maodv-00.txt, July
-
Elizabeth M. Royer and Charles E. Perkins. Multicast ad hoc on demand distance vector (maodv) routing. IETF Internet Draft, draft-ietf-manet-maodv-00. txt, July, 2000.
-
(2000)
IETF Internet Draft
-
-
Royer, E.M.1
Perkins, C.E.2
-
26
-
-
85056059061
-
Multicast operation of the ad-hoc on-demand distance vector routing protocol
-
Elizabeth M. Royer and Charles E. Perkins. Multicast operation of the ad-hoc on-demand distance vector routing protocol. In Mobile Computing and Networking, pages 207-218, 1999.
-
(1999)
Mobile Computing and Networking
, pp. 207-218
-
-
Royer, E.M.1
Perkins, C.E.2
-
27
-
-
84904904836
-
A secure routing protocol for ad hoc networks
-
K. Sanzgiri, B. Dahill, B. N. Levine, C. Shields, and E. M. Belding-Royer. A secure routing protocol for ad hoc networks. In Proceedings of 2002 IEEE International Conference on Network Protocols (ICNP), 2002.
-
(2002)
Proceedings of 2002 IEEE International Conference on Network Protocols (ICNP)
-
-
Sanzgiri, K.1
Dahill, B.2
Levine, B.N.3
Shields, C.4
Belding-Royer, E.M.5
-
28
-
-
15244339622
-
Authenticated routing for ad hoc networks
-
K. Sanzgiri, D. LaFlamme, B. Dahill, B. N. Levine, C. Shields, and E. M. Belding-Royer. Authenticated routing for ad hoc networks. IEEE Journal on Selected Areas in Communications, 23(3):598-610, 2005.
-
(2005)
IEEE Journal on Selected Areas in Communications
, vol.23
, Issue.3
, pp. 598-610
-
-
Sanzgiri, K.1
LaFlamme, D.2
Dahill, B.3
Levine, B.N.4
Shields, C.5
Belding-Royer, E.M.6
-
30
-
-
21644441634
-
An intrusion detection tool for AODV-based ad hoc wireless networks
-
Tucson, AZ, December
-
G. Vigna, S. Gwalani, K. Srinivasan, E. Belding-Royer, and R. Kemmerer. An Intrusion Detection Tool for AODV-based Ad Hoc Wireless Networks. In Proceedings of the Annual Computer Security Applications Conference (ACSAC), pages 16-27, Tucson, AZ, December 2004.
-
(2004)
Proceedings of the Annual Computer Security Applications Conference (ACSAC)
, pp. 16-27
-
-
Vigna, G.1
Gwalani, S.2
Srinivasan, K.3
Belding-Royer, E.4
Kemmerer, R.5
-
31
-
-
0003357528
-
Ad hoc multicast routing protocol utilizing increasing id-numbers (amris) functional specification
-
Nov
-
C. W. Wu, Y. C. Tay, and C. K. Toh. Ad hoc multicast routing protocol utilizing increasing id-numbers (amris) functional specification. Internet Draft. Nov, 1998.
-
(1998)
Internet Draft
-
-
Wu, C.W.1
Tay, Y.C.2
Toh, C.K.3
-
32
-
-
0035789243
-
Security-aware ad hoc routing for wireless networks
-
Long Beach, CA, October
-
Seung Yi, Prasad Naldurg, and Robin Kravets. Security-aware ad hoc routing for wireless networks. In Proceedings of the ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC 2001), Long Beach, CA, October 2001.
-
(2001)
Proceedings of the ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC 2001)
-
-
Seung, Y.1
Naldurg, P.2
Kravets, R.3
-
33
-
-
0003456435
-
Secure ad hoc on-demand distance vector (saodv) routing
-
draft-guerrero-manet-saodv-00.txt, 12 August
-
Manel Guerrero Zapata. Secure ad hoc on-demand distance vector (saodv) routing. Mobile Ad Hoc Networking Working Group Internet Draft, draft-guerrero-manet-saodv-00.txt, 12 August 2001.
-
(2001)
Mobile Ad Hoc Networking Working Group Internet Draft
-
-
Zapata, M.G.1
-
35
-
-
0033357103
-
Securing ad hoc networks
-
Lidong Zhou and Zygmunt J. Haas. Securing ad hoc networks. IEEE Network, 13(6):24-30, 1999.
-
(1999)
IEEE Network
, vol.13
, Issue.6
, pp. 24-30
-
-
Lidong, Z.1
Haas, Z.J.2
-
36
-
-
13244275074
-
Gkmpan: An efficient group rekeying scheme for secure multicast in ad-hoc networks
-
Sencun Zhu, Sanjeev Setia, Shouhuai Xu, and Sushil Jajodia. Gkmpan: An efficient group rekeying scheme for secure multicast in ad-hoc networks. In 1st ACM International Conference on Mobile and Ubiquitous Systems (Mobiquitous'04), pages 42-51, 2004.
-
(2004)
1st ACM International Conference on Mobile and Ubiquitous Systems (Mobiquitous'04)
, pp. 42-51
-
-
Sencun, Z.1
Setia, S.2
Shouhuai, X.3
Jajodia, S.4
-
37
-
-
22944439961
-
-
Technical Report SCE-04-01, Systems and Computing Engineering, Carleton University, January
-
Y. Zhu and T. Kunz. Maodv implementation for ns-2.26. Technical Report SCE-04-01, Systems and Computing Engineering, Carleton University, January 2004.
-
(2004)
Maodv Implementation for Ns-2.26
-
-
Zhu, Y.1
Kunz, T.2
|