-
3
-
-
0035015898
-
Investigating the Energy Consumption of a Wireless Network Interface in an Ad Hoc Networking Environment
-
L.M. Feeney and M. Nilsson, "Investigating the Energy Consumption of a Wireless Network Interface in an Ad Hoc Networking Environment," Proc. IEEE INFOCOM, 2001.
-
(2001)
Proc. IEEE INFOCOM
-
-
Feeney, L.M.1
Nilsson, M.2
-
4
-
-
0034541756
-
Mitigating Routing Misbehavior in Mobile Ad Hoc Networks
-
Aug
-
S. Marti, T. Giuli, K. Lai, and M. Baker, "Mitigating Routing Misbehavior in Mobile Ad Hoc Networks," Proc. MobiCom, Aug. 2000.
-
(2000)
Proc. MobiCom
-
-
Marti, S.1
Giuli, T.2
Lai, K.3
Baker, M.4
-
5
-
-
84954161437
-
Enforcing Service Availability in Mobile Ad-Hoc WANs
-
Aug
-
L. Buttyan and J.-P. Hubaux, "Enforcing Service Availability in Mobile Ad-Hoc WANs," Proc. MobiHoc, Aug. 2000.
-
(2000)
Proc. MobiHoc
-
-
Buttyan, L.1
Hubaux, J.-P.2
-
6
-
-
0035101078
-
Toward Self-Organized Mobile Ad Hoc Networks: The Terminodes Project
-
Jan
-
J.-P. Hubaux, T. Gross, J.-Y. LeBoudec, and M. Vetterli, "Toward Self-Organized Mobile Ad Hoc Networks: The Terminodes Project," IEEE Comm. Magazine, Jan. 2001.
-
(2001)
IEEE Comm. Magazine
-
-
Hubaux, J.-P.1
Gross, T.2
LeBoudec, J.-Y.3
Vetterli, M.4
-
7
-
-
2642586050
-
Performance Analysis of the CONFIDANT Protocol: Cooperation of Nodes, Fairness in Dynamic Ad-Hoc Networks
-
June
-
S. Buchegger and J.-Y. Le Boudec, "Performance Analysis of the CONFIDANT Protocol: Cooperation of Nodes, Fairness in Dynamic Ad-Hoc Networks," Proc. MobiHoc, June 2002.
-
(2002)
Proc. MobiHoc
-
-
Buchegger, S.1
Le Boudec, J.-Y.2
-
8
-
-
0042933944
-
Sprite: A Simple, Cheat-Proof, Credit-Based System for Mobile Ad-Hoc Networks
-
Mar.-Apr
-
S. Zhong, J. Chen, and Y.R. Yang, "Sprite: A Simple, Cheat-Proof, Credit-Based System for Mobile Ad-Hoc Networks," Proc. INFOCOM, Mar.-Apr. 2003.
-
(2003)
Proc. INFOCOM
-
-
Zhong, S.1
Chen, J.2
Yang, Y.R.3
-
10
-
-
0003597247
-
-
Internet draft, Feb
-
D. Johnson, D. Maltz, Y.C. Hu, and J. Jetcheva, "The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks (DSR)," Internet draft, Feb. 2002.
-
(2002)
The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks (DSR)
-
-
Johnson, D.1
Maltz, D.2
Hu, Y.C.3
Jetcheva, J.4
-
11
-
-
0033357103
-
Securing Ad Hoc Networks
-
Nov./Dec
-
L. Zhou and Z.J. Haas, "Securing Ad Hoc Networks," IEEE Network Magazine, vol. 13, no. 6, Nov./Dec. 1999.
-
(1999)
IEEE Network Magazine
, vol.13
, Issue.6
-
-
Zhou, L.1
Haas, Z.J.2
-
13
-
-
0035704362
-
Providing Robust and Ubiquitous Security Support for Mobile Ad-Hoc Networks
-
J. Kong, P. Zerfos, H. Luo, S. Lu, and L. Zhang, "Providing Robust and Ubiquitous Security Support for Mobile Ad-Hoc Networks," Proc. IEEE Int'l Conf. Network Protocols (ICNP '01), 2001.
-
(2001)
Proc. IEEE Int'l Conf. Network Protocols (ICNP '01)
-
-
Kong, J.1
Zerfos, P.2
Luo, H.3
Lu, S.4
Zhang, L.5
-
16
-
-
2342630172
-
Secure Traceroute to Detect Faulty or Malicious Routing
-
Jan
-
V.-N. Padmanabhan and D.-R. Simon, "Secure Traceroute to Detect Faulty or Malicious Routing," SIGCOMM Computer Comm. Rev., vol. 33, no. 1, Jan. 2003.
-
(2003)
SIGCOMM Computer Comm. Rev
, vol.33
, Issue.1
-
-
Padmanabhan, V.-N.1
Simon, D.-R.2
-
17
-
-
0036986441
-
An On-Demand Secure Routing Protocol Resilient to Byzantine Failures
-
Sept
-
B. Awerbuch, D. Holmer, C.-N. Rotaru, and H. Rubens, "An On-Demand Secure Routing Protocol Resilient to Byzantine Failures," Proc. ACM Workshop Wireless Security (WiSe), Sept. 2002.
-
(2002)
Proc. ACM Workshop Wireless Security (WiSe)
-
-
Awerbuch, B.1
Holmer, D.2
Rotaru, C.-N.3
Rubens, H.4
-
18
-
-
9144231402
-
Providing Fault-Tolerant Ad-Hoc Routing Service in Adversarial Environments
-
Y. Xue and K. Nahrstedt, "Providing Fault-Tolerant Ad-Hoc Routing Service in Adversarial Environments," Wireless Personal Comm., vol. 29, nos. 3-4, pp. 367-388, 2004.
-
(2004)
Wireless Personal Comm
, vol.29
, Issue.3-4
, pp. 367-388
-
-
Xue, Y.1
Nahrstedt, K.2
-
20
-
-
0036957315
-
Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks
-
Sept
-
Y. Hu, A. Perrig, and D.B. Johnson, "Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks," Proc. MobiCom, Sept. 2002.
-
(2002)
Proc. MobiCom
-
-
Hu, Y.1
Perrig, A.2
Johnson, D.B.3
-
21
-
-
0041939831
-
Cooperation in Wireless Ad Hoc Networks
-
Mar.-Apr
-
V. Srinivasan, P. Nuggehalli, C.F. Chiasserini, and R.R. Rao, "Cooperation in Wireless Ad Hoc Networks," Proc. INFOCOM, Mar.-Apr. 2003.
-
(2003)
Proc. INFOCOM
-
-
Srinivasan, V.1
Nuggehalli, P.2
Chiasserini, C.F.3
Rao, R.R.4
-
22
-
-
80051768284
-
Sustaining Cooperation in Multi-Hop Wireless Networks
-
Apr
-
R. Mahajan, M. Rodrig, D. Wetherall, and J. Zahorjan, "Sustaining Cooperation in Multi-Hop Wireless Networks," Proc. Second Symp. Networked Systems Design and Implementation, Apr. 2005.
-
(2005)
Proc. Second Symp. Networked Systems Design and Implementation
-
-
Mahajan, R.1
Rodrig, M.2
Wetherall, D.3
Zahorjan, J.4
-
24
-
-
0003424562
-
RFC 2018 - TCP Selective Acknowledgement Options
-
PSC, LBNL, Sun Microsystems, Oct
-
M. Mathis, J. Mahdavi, S. Floyd, and A. Romanow, "RFC 2018 - TCP Selective Acknowledgement Options," technical report, PSC, LBNL, Sun Microsystems, Oct. 1996.
-
(1996)
technical report
-
-
Mathis, M.1
Mahdavi, J.2
Floyd, S.3
Romanow, A.4
-
25
-
-
33947637016
-
ECC, Future Resiliency and High Security Systems
-
white paper, Certicom, Mar
-
D.B. Johnson, "ECC, Future Resiliency and High Security Systems," white paper, Certicom, www.certicom.com, Mar. 1999.
-
(1999)
-
-
Johnson, D.B.1
-
26
-
-
11244269535
-
SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks
-
Y. Hu, D.B. Johnson, and A. Perrig, "SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks," Ad Hoc Networks, vol. 1, no. 1, pp. 175-192, 2003.
-
(2003)
Ad Hoc Networks
, vol.1
, Issue.1
, pp. 175-192
-
-
Hu, Y.1
Johnson, D.B.2
Perrig, A.3
-
27
-
-
0019634370
-
Password Authentication with Insecure Communication
-
Nov
-
L. Lamport, "Password Authentication with Insecure Communication," Comm. ACM, vol. 24, no. 11, pp. 770-772, Nov. 1981.
-
(1981)
Comm. ACM
, vol.24
, Issue.11
, pp. 770-772
-
-
Lamport, L.1
-
29
-
-
0003602325
-
RFC 1321 - The MD5 Message-Digest Algorithm
-
MIT Laboratory for Computer Science and RSa Data Security, Inc, Apr
-
R.L. Rivest, "RFC 1321 - The MD5 Message-Digest Algorithm," technical report, MIT Laboratory for Computer Science and RSa Data Security, Inc., Apr. 1992.
-
(1992)
technical report
-
-
Rivest, R.L.1
-
30
-
-
4544222189
-
RFC 3174 - US Secure Hash Algorithm 1 (SHA1)
-
Motorola and Cisco Systems, Sept
-
D. Eastlake and P. Jones, "RFC 3174 - US Secure Hash Algorithm 1 (SHA1)," technical report, Motorola and Cisco Systems, Sept. 2001.
-
(2001)
technical report
-
-
Eastlake, D.1
Jones, P.2
-
31
-
-
26644463857
-
The Network Simulator (ns-2)
-
"The Network Simulator (ns-2)," http://www.isi.edu/nsnam/ns/, 2005.
-
(2005)
-
-
-
32
-
-
25644450392
-
Perfect Simulation and Stationarity of a Class of Mobility Models
-
Mar
-
J.Y. Le Boudec and M. Vojnović, "Perfect Simulation and Stationarity of a Class of Mobility Models," Proc. INFOCOM, Mar. 2005.
-
(2005)
Proc. INFOCOM
-
-
Le Boudec, J.Y.1
Vojnović, M.2
|