-
1
-
-
0004192381
-
-
CRC Press, Inc., USA
-
Menezes A.J., Vanstone S.A., and Van Oorschot P.C. Handbook of Applied Cryptography (2001), CRC Press, Inc., USA
-
(2001)
Handbook of Applied Cryptography
-
-
Menezes, A.J.1
Vanstone, S.A.2
Van Oorschot, P.C.3
-
3
-
-
0035728669
-
-
B. DeCleene et al., Secure group communications for wireless networks, in: IEEE Military Communications Conference (MILCOM), Virginia, USA, October 2001.
-
-
-
-
5
-
-
0742294233
-
Mobile ad hoc networking: imperatives and challenges
-
Chlamtac C.M., and Liu J.J.-N. Mobile ad hoc networking: imperatives and challenges. Ad Hoc Networks 1 July (2003) 13-64
-
(2003)
Ad Hoc Networks
, vol.1
, Issue.July
, pp. 13-64
-
-
Chlamtac, C.M.1
Liu, J.J.-N.2
-
6
-
-
33845866514
-
-
C. Perkins, Ad hoc on-demand distance-vector routing (AODV), IETF draft, 2001.
-
-
-
-
7
-
-
4544267132
-
-
D. Watkins, C. Scott, Methodology for evaluating the effectiveness of intrusion detection in tactical mobile ad-hoc networks, in: IEEE Wireless Communications and Networking Conference (WCNC), vol. 1, 21-25 March 2004, pp. 622-627.
-
-
-
-
8
-
-
11244256574
-
-
E.C.H. Ngai, M.R. Lyu, R.T. Chin, An authentication service against dishonest users in mobile ad hoc networks, in: IEEE Proceedings on Aerospace Conference, vol. 2, March 2004, pp. 1275-1285.
-
-
-
-
9
-
-
3042598885
-
-
E.C.H. Ngai, M.R. Lyu, Trust- and clustering-based authentication services in mobile ad hoc networks, in: 24th International Conference on Distributed Computing Systems Workshops, June 2004, pp. 582-587.
-
-
-
-
10
-
-
1842815887
-
Security in Mobile Ad Hoc networks: challenges and solutions
-
Yang H., Luo H.Y., Ye F., Lu S.W., and Zhang L. Security in Mobile Ad Hoc networks: challenges and solutions. IEEE Wireless Communications 11 February (2004) 38-47
-
(2004)
IEEE Wireless Communications
, vol.11
, Issue.February
, pp. 38-47
-
-
Yang, H.1
Luo, H.Y.2
Ye, F.3
Lu, S.W.4
Zhang, L.5
-
11
-
-
0035789229
-
-
J. Hubaux, L. Buttyán, S. Capkun, The quest for security in mobile ad hoc networks, in: Proceedings of the 2nd ACM International Symposium on Mobile Ad Hoc Networking and Computing, Long Beach, CA, USA, October 2001.
-
-
-
-
12
-
-
33845884225
-
-
J. Kong et al., Adaptive security for multi-layer ad-hoc networks, Special Issue of Wireless Communications and Mobile Computing, John Wiley InterScience Press, 2002.
-
-
-
-
13
-
-
33845902957
-
-
J. Kong et al., Providing robust and ubiquitous security support for mobile ad hoc networks, in: IEEE ICNP, Riverside, USA, 2001.
-
-
-
-
14
-
-
0035365149
-
Self-organization in mobile ad-hoc networks: the approach of terminodes
-
Blazevic L., et al. Self-organization in mobile ad-hoc networks: the approach of terminodes. IEEE Communications Magazine June (2001) 166-173
-
(2001)
IEEE Communications Magazine
, Issue.June
, pp. 166-173
-
-
Blazevic, L.1
-
15
-
-
84954161437
-
-
L. Buttyán, J. Hubaux, Enforcing service availability in mobile ad-hoc WANs, in: Proceedings of the 1st ACM International Symposium on Mobile Ad Hoc Networking and Computing, Boston, MA, August 2000.
-
-
-
-
16
-
-
0034590150
-
-
L. Venkatraman, D.P. Agrawal, A novel authentication scheme for ad hoc networks, in: 2nd IEEE Wireless Communications and Networking Conference, Chicago, 2000.
-
-
-
-
18
-
-
33845875349
-
-
N. Komninos, Security architecture for future communication systems, PhD thesis, Lancaster University, 2003.
-
-
-
-
19
-
-
1542360013
-
-
P. Kyasanur, N. Vaidya, Detection and handling of MAC layer misbehavior in wireless networks, in: International Conference on Dependable Systems and Networks (DSN'03), San Francisco, CA, June 2003, pp. 173-182.
-
-
-
-
20
-
-
0242527360
-
-
P. Papadimitratos, Z.J. Haas, E.G. Sirer, Path set selection in mobile ad hoc networks, in: Proceedings of the 3rd ACM International Symposium on Mobile Ad Hoc Networking and Computing, Lausanne, Switzerland, 2002, pp. 1-11.
-
-
-
-
21
-
-
0141763764
-
-
Q. Xue, J. Sun, Z. Wei, TJIDS: an intrusion detection architecture for distributed network, in: IEEE Canadian Conference on Electrical and Computer Engineering (CCECE), vol. 2, 4-7 May 2003, pp. 709-712.
-
-
-
-
22
-
-
18144421528
-
-
S. Bo, W. Kui, U.W. Pooch, Towards adaptive intrusion detection in mobile ad hoc networks, in: IEEE Global Telecommunications Conference (GLOBECOM), vol. 6, 29 November-3 December 2004, pp. 3551-3555.
-
-
-
-
23
-
-
20344362166
-
-
X. Gang, L. Iftode, Locality driven key management architecture for mobile ad-hoc networks, in: IEEE International Conference on Mobile Ad-hoc and Sensor Systems, 25-27 October 2004, pp. 436-446.
-
-
-
-
24
-
-
6344287668
-
-
X. Yan, L. Ren-Fa, L. Ken-Li, Intrusion detection using mobile agent in ad-hoc networks, in: Proceedings of International Conference on Machine Learning and Cybernetics, vol. 6, 26-29 August 2004, pp. 3383-3388.
-
-
-
-
25
-
-
2942644292
-
-
Y. Chou-Chen, C. Chia-Meng, C. Ting-Yi, A routing authentication mechanism for wireless ad hoc networks, in: IEEE International Conference on Networking, Sensing and Control, vol. 1, 21-23 March 2004, pp. 456-461.
-
-
-
-
26
-
-
85177190420
-
-
Y. Hu, A. Perrig, D. Johnson, Ariadne: a secure on-demand routing protocol for ad hoc networks, ACM MOBICOM, September 2002, Georgia, USA.
-
-
-
-
27
-
-
1842693650
-
Packet leashes: a defense against wormhole attacks in wireless networks
-
Hu Y., Perrig A., and Johnson D. Packet leashes: a defense against wormhole attacks in wireless networks. IEEE INFOCOM (2002)
-
(2002)
IEEE INFOCOM
-
-
Hu, Y.1
Perrig, A.2
Johnson, D.3
-
28
-
-
17144397587
-
-
Y.-R. Tsai, S.-J. Wang, Routing security and authentication mechanism for mobile ad hoc networks, in: IEEE 60th Vehicular Technology Conference (VTC2004), vol. 7, 26-29 September 2004, pp. 4716-4720.
-
-
-
-
29
-
-
85177498539
-
-
Y. Zhang, W. Lee, Intrusion detection in wireless ad-hoc networks, in: Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, Boston, MA, USA, 2000, pp. 275-283.
-
-
-
-
30
-
-
3142747076
-
-
W. Zhang, R. Rao, G. Cao, G. Kesidis, Secure routing in ad hoc networks and a related intrusion detection problem, in: IEEE Military Communications Conference (MILCOM), vol. 2, 13-16 October 2003, pp. 735- 740.
-
-
-
|