-
1
-
-
11244252132
-
Denial of Service Resilience in Ad Hoc Networks
-
I. Aad, J.-P. Hubaux, and E. W. Knightly. Denial of Service Resilience in Ad Hoc Networks. In ACM MOBICOM, pages 202-215, 2004.
-
(2004)
ACM MOBICOM
, pp. 202-215
-
-
Aad, I.1
Hubaux, J.-P.2
Knightly, E.W.3
-
3
-
-
0036986441
-
An On-Demand Secure Routing Protocol Resilient to Byzantine Failures
-
B. Awerbuch, D. Holmer, C. Nita-Rotaru, and H. Rubens. An On-Demand Secure Routing Protocol Resilient to Byzantine Failures. In First ACM Workshop on Wireless Security (WiSe), pages 21-30, 2002.
-
(2002)
First ACM Workshop on Wireless Security (WiSe)
, pp. 21-30
-
-
Awerbuch, B.1
Holmer, D.2
Nita-Rotaru, C.3
Rubens, H.4
-
5
-
-
84976295016
-
Distance-Bounding Protocols (Extended Abstract)
-
T. Helleseth, editor, EUROCRYPT'93
-
S. Brands and D. Chaum. Distance-Bounding Protocols (Extended Abstract). In T. Helleseth, editor, EUROCRYPT'93, Lecture Notes in Computer Science 765, pages 344-359, 1993.
-
(1993)
Lecture Notes in Computer Science
, vol.765
, pp. 344-359
-
-
Brands, S.1
Chaum, D.2
-
6
-
-
85106319926
-
A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols
-
J. Broch, D. A. Maltz, D. B. Johnson, Y.-C. Hu, and J. Jetcheva. A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. In ACM MOBICOM, pages 85-97, 1998.
-
(1998)
ACM MOBICOM
, pp. 85-97
-
-
Broch, J.1
Maltz, D.A.2
Johnson, D.B.3
Hu, Y.-C.4
Jetcheva, J.5
-
9
-
-
0036957315
-
Ariadne: A Secure On-demand Routing Protocol for Ad Hoc Networks
-
Y.-C. Hu, A. Perrig, and D. B. Johnson. Ariadne: A Secure On-demand Routing Protocol for Ad Hoc Networks. In ACM MOBICOM, pages 12-23, 2002.
-
(2002)
ACM MOBICOM
, pp. 12-23
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
10
-
-
0041973497
-
Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks
-
Y.-C. Hu, A. Perrig, and D. B. Johnson. Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks. In IEEE INFOCOM, 2003.
-
(2003)
IEEE INFOCOM
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
12
-
-
34247389249
-
A Framework for Location Privacy in Wireless Networks
-
Y.-C. Hu and H. J. Wang. A Framework for Location Privacy in Wireless Networks. In ACM SIGCOMM Asia Workshop, 2005.
-
(2005)
ACM SIGCOMM Asia Workshop
-
-
Hu, Y.-C.1
Wang, H.J.2
-
13
-
-
0000629443
-
Dynamic Source Routing in Ad Hoc Wireless Networks
-
T. Imielinski and H. Korth, editors, Kluwer Academic Publishers
-
D. B. Johnson and D. A. Maltz. Dynamic Source Routing in Ad Hoc Wireless Networks. In T. Imielinski and H. Korth, editors, Mobile Computing, volume 353, pages 153-181. Kluwer Academic Publishers, 1996.
-
(1996)
Mobile Computing
, vol.353
, pp. 153-181
-
-
Johnson, D.B.1
Maltz, D.A.2
-
14
-
-
34247386384
-
GVG-RP: A Net-centric Negligibility-based Security Model for Self-organizing Networks
-
Technical Report 2006/140, IACR Cryptology ePrint Archive, April 2006
-
J. Kong. GVG-RP: A Net-centric Negligibility-based Security Model for Self-organizing Networks. Technical Report 2006/140, IACR Cryptology ePrint Archive, April 2006.
-
-
-
Kong, J.1
-
15
-
-
0242696170
-
ANODR: ANonymous On Demand Routing with Untraceable Routes for Mobile Ad-hoc Networks
-
J. Kong and X. Hong. ANODR: ANonymous On Demand Routing with Untraceable Routes for Mobile Ad-hoc Networks. In ACM MOBIHOC'03, pages 291-302, 2003.
-
(2003)
ACM MOBIHOC'03
, pp. 291-302
-
-
Kong, J.1
Hong, X.2
-
16
-
-
29844455972
-
L'Hospital: Self-healing Secure Routing for Mobile Ad-hoc Networks
-
Technical Report CSD-TR040055, Dept. of Computer Science, UCLA, January
-
J. Kong, X. Hong, J.-S. Park, Y. Yi, and M. Gerla. L'Hospital: Self-healing Secure Routing for Mobile Ad-hoc Networks. Technical Report CSD-TR040055, Dept. of Computer Science, UCLA, January 2005.
-
(2005)
-
-
Kong, J.1
Hong, X.2
Park, J.-S.3
Yi, Y.4
Gerla, M.5
-
17
-
-
29844454971
-
A Secure Ad-hoc Routing Approach using Localized Self-healing Communities
-
J. Kong, X. Hong, Y. Yi, J.-S. Park, J. Liu, and M. Gerla. A Secure Ad-hoc Routing Approach using Localized Self-healing Communities. In ACM MOBIHOC'05, pages 254-265, 2005.
-
(2005)
ACM MOBIHOC'05
, pp. 254-265
-
-
Kong, J.1
Hong, X.2
Yi, Y.3
Park, J.-S.4
Liu, J.5
Gerla, M.6
-
18
-
-
33745971800
-
Mobile Traffic Sensor Network versus Motion-MIX: Tracing and Protecting Mobile Wireless Nodes
-
J. Kong, D. Wu, X. Hong, and M. Gerla. Mobile Traffic Sensor Network versus Motion-MIX: Tracing and Protecting Mobile Wireless Nodes. In ACM SASN'05 in conjunction with CCS'06, pages 97-106, 2005.
-
(2005)
ACM SASN'05 in conjunction with CCS'06
, pp. 97-106
-
-
Kong, J.1
Wu, D.2
Hong, X.3
Gerla, M.4
-
19
-
-
0035703920
-
Ad Hoc On-demand Multipath Distance Vector Routing
-
M. K. Marina and S. R. Das. Ad Hoc On-demand Multipath Distance Vector Routing. In IEEE ICNP, pages 14-23, 2001.
-
(2001)
IEEE ICNP
, pp. 14-23
-
-
Marina, M.K.1
Das, S.R.2
-
22
-
-
34347349933
-
Ad-Hoc On-Demand Distance Vector Routing
-
C. E. Perkins and E. M. Royer. Ad-Hoc On-Demand Distance Vector Routing. In IEEE WMCSA'99, pages 90-100, 1999.
-
(1999)
IEEE WMCSA'99
, pp. 90-100
-
-
Perkins, C.E.1
Royer, E.M.2
-
23
-
-
0242426103
-
The TESLA Broadcast Authentication Protocol
-
A. Perrig, R. Canetti, D. Tygar, and D. Song. The TESLA Broadcast Authentication Protocol. RSA CryptoBytes, 5(2):2-13, 2002.
-
(2002)
RSA CryptoBytes
, vol.5
, Issue.2
, pp. 2-13
-
-
Perrig, A.1
Canetti, R.2
Tygar, D.3
Song, D.4
-
25
-
-
84904904836
-
A Secure Routing Protocol for Ad Hoc Networks
-
K. Sanzgiri, B. Dahill, B. N. Levine, C. Shields, and E. Royer. A Secure Routing Protocol for Ad Hoc Networks. In 10th International Conference on Network Protocols (IEEEICNP'02), 2002.
-
(2002)
10th International Conference on Network Protocols (IEEEICNP'02)
-
-
Sanzgiri, K.1
Dahill, B.2
Levine, B.N.3
Shields, C.4
Royer, E.5
-
26
-
-
33750338032
-
Bypass Routing: An On-Demand Local Recovery Protocol for Ad Hoc Networks
-
C. Sengul and R. Kravets. Bypass Routing: An On-Demand Local Recovery Protocol for Ad Hoc Networks. In Med-Hoc-Net, 2004.
-
(2004)
Med-Hoc-Net
-
-
Sengul, C.1
Kravets, R.2
|