-
2
-
-
0033357103
-
Securing Ad Hoc Networks
-
November/December
-
Lidong Zhou and Zygmunt J. Haas, "Securing Ad Hoc Networks", IEEE Network 13(6):24-30, November/December 1999.
-
(1999)
IEEE Network
, vol.13
, Issue.6
, pp. 24-30
-
-
Zhou, L.1
Haas, Z.J.2
-
4
-
-
0031375570
-
Optimal resilience proactive public-key cryptosystems
-
Yair Frankel, Peter Gemmell, Philip MachKenzie, and Moti Yung, "Optimal resilience proactive public-key cryptosystems", in Proceedings of the 38th Symposium on Foundations of Computer Science, 1997.
-
(1997)
Proceedings of the 38th Symposium on Foundations of Computer Science
-
-
Frankel, Y.1
Gemmell, P.2
MachKenzie, P.3
Yung, M.4
-
5
-
-
0030646698
-
Proactive public-key and signature schemes
-
ACM
-
Amir Herzberg, Markus Jakobsson, Stanislaw Jarecki, Hugo Krawczyk, and Moti Yung, "Proactive public-key and signature schemes," in Proceedings of the Fourth Annual Conference on Computer Communications Security, pages 100-110, ACM, 1997.
-
(1997)
Proceedings of the Fourth Annual Conference on Computer Communications Security
, pp. 100-110
-
-
Herzberg, A.1
Jakobsson, M.2
Jarecki, S.3
Krawczyk, H.4
Yung, M.5
-
8
-
-
0034546898
-
Intrusion Detection Techniques for Mobile Wireless Networks, in
-
Yongguang Zhang, Wenke Lee, and Yi-An Huang, "Intrusion Detection Techniques for Mobile Wireless Networks", in Mobile Computing and Networking, pages 275-283, 2000.
-
(2000)
Mobile Computing and Networking
, pp. 275-283
-
-
Zhang, Y.1
Lee, W.2
Huang, Y.3
-
9
-
-
0042933944
-
Sprite: A Simple, Cheat-Proof, Credit-Based System for Mobile Ad-Hoc Networks
-
San Francisco, CA, April
-
Sheng Zhong, Jiang Chen, and Yang Richard Yang, "Sprite: A Simple, Cheat-Proof, Credit-Based System for Mobile Ad-Hoc Networks", in Proceedings of IEEE Infocom '03, San Francisco, CA, April 2003.
-
(2003)
Proceedings of IEEE Infocom '03
-
-
Zhong, S.1
Chen, J.2
Richard Yang, Y.3
-
10
-
-
34047144581
-
Advanced Detection of Selfish or Malicious Nodes in Ad Hoc Networks
-
Proceedings of 1st European Workshop on Security in Ad-Hoc and Sensor Networks ESAS 2004, Heidelberg, Sept
-
Frank Kargl, Andreas Klenk, Stefan Schlott, and Michael Weber, "Advanced Detection of Selfish or Malicious Nodes in Ad Hoc Networks", In Proceedings of 1st European Workshop on Security in Ad-Hoc and Sensor Networks (ESAS 2004), Springer Lecture Notes in Computer Science, Heidelberg, Sept. 2004
-
(2004)
Springer Lecture Notes in Computer Science
-
-
Kargl, F.1
Klenk, A.2
Schlott, S.3
Weber, M.4
-
11
-
-
84954161437
-
Enforcing service availability in mobile ad-hoc WANs
-
MobiHOC, Boston, MA, August
-
Levente Buttyan and Jean-Pierre Hubaux, "Enforcing service availability in mobile ad-hoc WANs", in IEEE/ACM Workshop on Mobile Ad Hoc Networking and Computing (MobiHOC), Boston, MA, August 2000.
-
(2000)
IEEE/ACM Workshop on Mobile Ad Hoc Networking and Computing
-
-
Buttyan, L.1
Hubaux, J.2
-
12
-
-
4143141932
-
-
Farooq Anjum, Dhanant Subhadrabandhu, and Saswati Sarkar, Signature based Intrusion Detection for Wireless Ad-Hoc Networks: A Comparative study of various routing protocols, In proceedings of Vehicular Technology Conference 2003, Wireless Security Symposium, Orlando, Florida, 2003.
-
Farooq Anjum, Dhanant Subhadrabandhu, and Saswati Sarkar, "Signature based Intrusion Detection for Wireless Ad-Hoc Networks: A Comparative study of various routing protocols", In proceedings of Vehicular Technology Conference 2003, Wireless Security Symposium, Orlando, Florida, 2003.
-
-
-
-
13
-
-
0035789229
-
-
Jean-Pierre Hubaux, Levente Buttyan, and Srdan Capkun, The quest for security in mobile ad hoc networks, In Proceedings of the ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC 2001), 2001.
-
Jean-Pierre Hubaux, Levente Buttyan, and Srdan Capkun, "The quest for security in mobile ad hoc networks", In Proceedings of the ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC 2001), 2001.
-
-
-
-
14
-
-
84883869163
-
Self-securing ad hoc wireless networks
-
Haiyun Luo, Petras Zefros, Jiejun Kong, Songwu Lu, and Lixia Zhang, "Self-securing ad hoc wireless networks," in Seventh IEEE Symposium on Computers and Communications (ISCC '02), 2002.
-
(2002)
Seventh IEEE Symposium on Computers and Communications (ISCC '02)
-
-
Luo, H.1
Zefros, P.2
Kong, J.3
Lu, S.4
Zhang, L.5
-
15
-
-
84904904836
-
A secure routing protocol for ad-hoc networks
-
Kimaya Sanzgiri, Bridget Dahill, Brain Neil Levine, Clay Shields, and Elizabeth M. Belding Royer, "A secure routing protocol for ad-hoc networks", in Proceedings of the 10th IEEE International conference on Network Protocols (ICNP), 2002.
-
(2002)
Proceedings of the 10th IEEE International conference on Network Protocols (ICNP)
-
-
Sanzgiri, K.1
Dahill, B.2
Neil Levine, B.3
Shields, C.4
Belding Royer, E.M.5
-
18
-
-
34047191534
-
-
Y. Yu, R. Govindan, and D. Estrin, Geographical and energy aware routing: a recursive data dissemination protocol for wireless sensor networks, UCLA Computer Science Department Technical Report UCLA/CSD-TR-01-0023, May 2001.
-
Y. Yu, R. Govindan, and D. Estrin, "Geographical and energy aware routing: a recursive data dissemination protocol for wireless sensor networks", UCLA Computer Science Department Technical Report UCLA/CSD-TR-01-0023, May 2001.
-
-
-
-
19
-
-
34047128295
-
-
Xuefei Li and Laurie Cuthbert, On-demand Node-Disjoint Multipath Routing in Wireless Ad hoc Networks, In proceedings of the 29th Annual IEEE International Conference on Local Computer Networks, 2004.
-
Xuefei Li and Laurie Cuthbert, "On-demand Node-Disjoint Multipath Routing in Wireless Ad hoc Networks", In proceedings of the 29th Annual IEEE International Conference on Local Computer Networks, 2004.
-
-
-
-
20
-
-
0034590189
-
-
Sung-Ju Lee and Mario Gerla, AODV-BR: Backup Routing in Ad hoc Networks, In proceedings of IEEE WCNC 2000, Chicago, IL, Sep. 2000.
-
Sung-Ju Lee and Mario Gerla, "AODV-BR: Backup Routing in Ad hoc Networks", In proceedings of IEEE WCNC 2000, Chicago, IL, Sep. 2000.
-
-
-
|