-
1
-
-
0036986441
-
An on-demand secure routing protocol resilient to byzantine failures
-
B. Awerbuch, D. Holmer, C. Nita-Rotaru, and H. Rubens, "An on-demand secure routing protocol resilient to byzantine failures," in Proceedings of ACM Workshop on Wireless Security (WiSe), 2002, pp. 21-30.
-
(2002)
Proceedings of ACM Workshop on Wireless Security (WiSe)
, pp. 21-30
-
-
Awerbuch, B.1
Holmer, D.2
Nita-Rotaru, C.3
Rubens, H.4
-
2
-
-
0035024127
-
An adaptive distance vector routing algorithm for mobile, ad hoc networks
-
R. V. Boppana and S. P. Konduru, "An adaptive distance vector routing algorithm for mobile, ad hoc networks," in Proceedings of IEEE INFOCOM, 2001, pp. 1753-1762.
-
(2001)
Proceedings of IEEE INFOCOM
, pp. 1753-1762
-
-
Boppana, R.V.1
Konduru, S.P.2
-
7
-
-
0036957315
-
Ariadne: A secure on-demand routing protocol for ad hoc networks
-
Y.-C. Hu, A. Perrig, and D. B. Johnson., "Ariadne: A secure on-demand routing protocol for ad hoc networks," in Proceedings of ACM Int'l Conference on Mobile Computing and Networking (MobiCom), 2002, pp. 12-23.
-
(2002)
Proceedings of ACM Int'l Conference on Mobile Computing and Networking (MobiCom)
, pp. 12-23
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
8
-
-
1542317831
-
Rushing attacks and defense in wireless ad hoc network routing protocols
-
Y.-C. Hu, A. Perrig, and D. Johnson, "Rushing attacks and defense in wireless ad hoc network routing protocols," in Proceedings of ACM Workshop on Wireless Security (WiSe), 2003, pp. 30-40.
-
(2003)
Proceedings of ACM Workshop on Wireless Security (WiSe)
, pp. 30-40
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.3
-
9
-
-
0003597247
-
-
IETF Internet Draft, Online, Available
-
D. B. Johnson, D. A. Maltz, and Y.-C. Hu, The Dynamic Source Routing Protocol for Mobile Ad Hoc Netowrks (DSR), 2004, IETF Internet Draft. [Online]. Available: http://www.ietf.org/internet-drafts/draft-ietf-manet-dsr- 10.txt
-
(2004)
The Dynamic Source Routing Protocol for Mobile Ad Hoc Netowrks (DSR)
-
-
Johnson, D.B.1
Maltz, D.A.2
Hu, Y.-C.3
-
10
-
-
33845928486
-
-
Apr, Online, Available
-
L. Klein-Berndt, "Kernel aodv v2.2.2," Apr. 2004. [Online]. Available: http://w3.antd.nist.gov/wctg/aodv_kernel
-
(2004)
Kernel aodv v2.2.2
-
-
Klein-Berndt, L.1
-
12
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
S. Marti, T. J. Giuli, K. Lai, and M. Baker, "Mitigating routing misbehavior in mobile ad hoc networks," in Proceedings of ACM Int'l Conference on Mobile Computing and Networking (MobiCom), 2000, pp. 255-265.
-
(2000)
Proceedings of ACM Int'l Conference on Mobile Computing and Networking (MobiCom)
, pp. 255-265
-
-
Marti, S.1
Giuli, T.J.2
Lai, K.3
Baker, M.4
-
13
-
-
7244251119
-
-
IETF RFC 3684, Online, Available
-
R. Ogier, F. Templin, and M. Lewis, Topology Dissemination Based on Reverse-Path Forwarding (TBRPF), 2004, IETF RFC 3684. [Online]. Available: http://www.ietf.org/rfc/rfc3684.txt
-
(2004)
Topology Dissemination Based on Reverse-Path Forwarding (TBRPF)
-
-
Ogier, R.1
Templin, F.2
Lewis, M.3
-
14
-
-
33845923650
-
-
OpenWRT Team, Sept, Online, Available
-
OpenWRT Team, "OpenWRT: Experimental release," Sept. 2004. [Online]. Available: http://downloads.openwrt.org
-
(2004)
OpenWRT: Experimental release
-
-
-
15
-
-
0003843664
-
-
July, IETF RFC 3561, Online, Available
-
C. E. Perkins, E. M. Belding-Royer, and S. R. Das, Ad Hoc On Demand Distance Vector (AODV) Routing, July 2003, IETF RFC 3561. [Online]. Available: http://www.ietf.org/rfc/rfc3561.txt?number=3561
-
(2003)
Ad Hoc On Demand Distance Vector (AODV) Routing
-
-
Perkins, C.E.1
Belding-Royer, E.M.2
Das, S.R.3
-
17
-
-
33845944379
-
-
Seattle Wireless Group, Online, Available
-
Seattle Wireless Group, "Seattle Wireless Project." [Online]. Available: http://www.seattlewireless.net
-
Seattle Wireless Project
-
-
-
18
-
-
0000859754
-
TCP/IP Illustrated
-
Addison-Wesley
-
W. R. Stevens, TCP/IP Illustrated, Volume 1: The Protocols. Addison-Wesley, 1994.
-
(1994)
The Protocols
, vol.1
-
-
Stevens, W.R.1
-
20
-
-
24744451603
-
Resisting flooding attacks in ad hoc networks
-
Apr
-
P. Yi, Z. Dai, Y. Zhong, and S. Zhang, "Resisting flooding attacks in ad hoc networks," in Information Technology: Coding and Computing (ITCC), vol. 2, Apr 2005.
-
(2005)
Information Technology: Coding and Computing (ITCC)
, vol.2
-
-
Yi, P.1
Dai, Z.2
Zhong, Y.3
Zhang, S.4
|