메뉴 건너뛰기




Volumn 2006, Issue , 2006, Pages 135-140

TARP: Trust-aware routing protocol

Author keywords

Ad hoc; Aware routing; Encryption; Power; Trust

Indexed keywords

AD HOC NETWORKS; ADAPTIVE ALGORITHMS; ELECTRIC BATTERIES; NETWORK SECURITY; ROUTING ALGORITHMS; TELECOMMUNICATION TRAFFIC; COMPUTER SCIENCE; CRYPTOGRAPHY; MOBILE AD HOC NETWORKS; MOBILE TELECOMMUNICATION SYSTEMS; ROUTING PROTOCOLS; TELECOMMUNICATION LINKS; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 34247361702     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1143549.1143578     Document Type: Conference Paper
Times cited : (22)

References (17)
  • 1
    • 34247400659 scopus 로고
    • Ad Hoc Wireless Networks: Architectures and Protocols
    • Chapter 7
    • C. Siva Ram Murthy and B. S. Manoj, "Ad Hoc Wireless Networks: Architectures and Protocols," Prentice Hall, Chapter 7, 1994.
    • (1994) Prentice Hall
    • Siva, C.1    Murthy, R.2    Manoj, B.S.3
  • 2
    • 0000629443 scopus 로고    scopus 로고
    • Dynamic Sources Routing in ad Hoc Wireless Networks
    • D. B. Johnson and D. A. Maltz, "Dynamic Sources Routing in ad Hoc Wireless Networks," Mobile Computing, 1996
    • (1996) Mobile Computing
    • Johnson, D.B.1    Maltz, D.A.2
  • 3
    • 11244265545 scopus 로고    scopus 로고
    • Almost Hash Sequence Traversal
    • proceeding of the Fourth Conference on Financial Cryptography FC '02
    • Don Coppersmith and Markus Jakobsson, "Almost Hash Sequence Traversal," In proceeding of the Fourth Conference on Financial Cryptography (FC '02), Lecture Notes in computer Science, 2002.
    • (2002) Lecture Notes in computer Science
    • Coppersmith, D.1    Jakobsson, M.2
  • 4
    • 14844322260 scopus 로고    scopus 로고
    • Securing Quality-of-Service Route Discovery in On-Demand Routing for Ad Hoc Networks
    • Yih-Chun Hu and D. B. Johonson, "Securing Quality-of-Service Route Discovery in On-Demand Routing for Ad Hoc Networks," Proceedings of ACM SASN '04, October 20, 2004.
    • (2004) Proceedings of ACM SASN '04, October 20
    • Yih-Chun, H.1    Johonson, D.B.2
  • 5
    • 0036957315 scopus 로고    scopus 로고
    • Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks
    • September 23-26
    • Yih-Chun Hu, A. Perrig, and D. B. Johonson, "Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks," Proceedings of ACM MobiCom '02, September 23-26, 2002.
    • (2002) Proceedings of ACM MobiCom '02
    • Yih-Chun, H.1    Perrig, A.2    Johonson, D.B.3
  • 7
    • 4444237581 scopus 로고    scopus 로고
    • SPREAD: Enhancing Data Confidentiality in Mobile Ad Hoc Networks
    • W. Lou and W. Liu, and Y. Fang, "SPREAD: Enhancing Data Confidentiality in Mobile Ad Hoc Networks," Proceedings of IEEE INFOCOM 2004, 2004.
    • (2004) Proceedings of IEEE INFOCOM 2004
    • Lou, W.1    Liu, W.2    Fang, Y.3
  • 8
    • 0004118143 scopus 로고    scopus 로고
    • Proceedings of IEEE Network Protocols, 2002
    • November 12-515
    • K. Sanzgiri, B. Dahill, B. N. Levine, C. Shields, and E. M. Belding-Royer, "A Secure Routing Protocol for Ad Hoc Networks," Proceedings of IEEE Network Protocols, 2002, pp. 78-87, November 12-515, 2002.
    • (2002) , pp. 78-87
    • Sanzgiri, K.1    Dahill, B.2    Levine, B.N.3    Shields, C.4    Belding-Royer, E.M.5
  • 13
    • 0031353437 scopus 로고    scopus 로고
    • A Highly Adaptive Distributed Routing Algorithm for Mobile Wireless Networks
    • 97, pp
    • V. D. Park and M. S. Corson, "A Highly Adaptive Distributed Routing Algorithm for Mobile Wireless Networks," Proceedings of IEEE INFOCOM '97, pp. 1405-1413, 1997.
    • (1997) Proceedings of IEEE INFOCOM , pp. 1405-1413
    • Park, V.D.1    Corson, M.S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.