메뉴 건너뛰기




Volumn 2005, Issue , 2005, Pages 327-338

On the survivability of routing protocols in ad hoc wireless networks

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER WORMS; NETWORK PROTOCOLS; PUBLIC KEY CRYPTOGRAPHY; ROUTERS; TELECOMMUNICATION NETWORKS; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 33847279913     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SECURECOMM.2005.30     Document Type: Conference Paper
Times cited : (39)

References (25)
  • 1
    • 33847265771 scopus 로고    scopus 로고
    • CSI/FBI computer crime and security survey
    • "CSI/FBI computer crime and security survey," CSI Computer Security Institute, vol. 8, 2003.
    • (2003) CSI Computer Security Institute , vol.8
  • 2
    • 33847250396 scopus 로고    scopus 로고
    • L. Lamport, R. Shostak, and M. Pease, The Byzantine generals problem, in Advances in Ultra-Dependable Distributed Systems, N. Suri, C. J. Walter, and M. M. Hugue (Eds.), IEEE Computer Society Press, 1995.
    • L. Lamport, R. Shostak, and M. Pease, "The Byzantine generals problem," in Advances in Ultra-Dependable Distributed Systems, N. Suri, C. J. Walter, and M. M. Hugue (Eds.), IEEE Computer Society Press, 1995.
  • 7
    • 84977898401 scopus 로고    scopus 로고
    • Using directional antennas to prevent wormhole attacks
    • L. Hu and D. Evans, "Using directional antennas to prevent wormhole attacks," in NDSS 2004, 2004.
    • (2004) NDSS 2004
    • Hu, L.1    Evans, D.2
  • 9
    • 0042610449 scopus 로고    scopus 로고
    • The network simulator - ns2
    • "The network simulator - ns2." http://www.isi.edu/nsnam/ns/.
  • 20
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • R. L. Rivest, A. Shamir, and L. M. Adleman, "A method for obtaining digital signatures and public-key cryptosystems," Communications ACM, vol. 21, no. 2, pp. 120-126, 1978.
    • (1978) Communications ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.M.3
  • 21
    • 0003508558 scopus 로고    scopus 로고
    • No. FIPS 197, National Institute for Standards and Technology NIST
    • Advanced Encryption Standard (AES). No. FIPS 197, National Institute for Standards and Technology (NIST), 2001. http://csrc.nist.gov/ encryption/aes/.
    • (2001) Advanced Encryption Standard (AES)
  • 22
    • 0013091373 scopus 로고    scopus 로고
    • No. FIPS 198, National Institute for Standards and Technology NIST
    • The Keyed-Hash Message Authentication Code (HMAC). No. FIPS 198, National Institute for Standards and Technology (NIST), 2002. http://csrc.nist.gov/publications/fips/index.html.
    • (2002) The Keyed-Hash Message Authentication Code (HMAC)
  • 25
    • 0042014530 scopus 로고    scopus 로고
    • Random waypoint considered harmful
    • San Francisco, CA, April
    • J. Yoon, M. Liu, and B. D. Noble, "Random waypoint considered harmful," in INFOCOM '03, (San Francisco, CA), April 2003.
    • (2003) INFOCOM '03
    • Yoon, J.1    Liu, M.2    Noble, B.D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.