-
1
-
-
0003711765
-
Self organized terminode routing
-
Technical Report DSC/2000/040, Swiss Federal Institute of Technology
-
BLAZEVIG, L., GIORDANO, S., AND BOUDEC, J. L. Self organized terminode routing. Technical Report DSC/2000/040, Swiss Federal Institute of Technology, 2000.
-
(2000)
-
-
BLAZEVIG, L.1
GIORDANO, S.2
BOUDEC, J.L.3
-
2
-
-
34247377838
-
-
C2C-CC. Car2Car Communication Consortium
-
C2C-CC. Car2Car Communication Consortium, http://www.car-to-car.org/.
-
-
-
-
3
-
-
34247325663
-
-
CARTALK 2000. CarTalk 2000. http://nv.cartalk2000.net, 2004.
-
(2000)
CarTalk 2000
-
-
CARTALK1
-
4
-
-
0006974768
-
Location proxies and intermediate node forwarding for practical geographic forwarding
-
Tech. Rep. MIT-LCS-TR-824, MIT Laboratory for Computer Science, June
-
COUTO, D. S. J. D., AND MORRIS, R. Location proxies and intermediate node forwarding for practical geographic forwarding. Tech. Rep. MIT-LCS-TR-824, MIT Laboratory for Computer Science, June 2001.
-
(2001)
-
-
COUTO, D.S.J.D.1
MORRIS, R.2
-
5
-
-
34247393740
-
FleetNet: Platform for Inter-Vehicle Communications
-
Hamburg, Germany, Mar
-
FRANZ, W., WAGNER, C., MAIHÖFER, C., AND HARTENSTEIN, H. FleetNet: Platform for Inter-Vehicle Communications. In Procedings of 1st International Workshop on Intelligent Transportatin. (WIT'04) (Hamburg, Germany, Mar. 2004).
-
(2004)
Procedings of 1st International Workshop on Intelligent Transportatin. (WIT'04)
-
-
FRANZ, W.1
WAGNER, C.2
MAIHÖFER, C.3
HARTENSTEIN, H.4
-
6
-
-
84860929869
-
Position based routing algorithms for ad hoc networks: A taxonomy
-
July
-
GIORDANO, S., STOJMENOVIC, I., AND BLAZEVIE, L. Position based routing algorithms for ad hoc networks: a taxonomy. IEEE Communications Magazine 40, 7 (July 2001), 128-134.
-
(2001)
IEEE Communications Magazine
, vol.40
, Issue.7
, pp. 128-134
-
-
GIORDANO, S.1
STOJMENOVIC, I.2
BLAZEVIE, L.3
-
7
-
-
0022489112
-
Transmission Range Control in Multihop Packet Radio Networks
-
Jan
-
HOU, T.-C., AND LI, V. Transmission Range Control in Multihop Packet Radio Networks. IEEE Transactions on Communications 34, 1 (Jan. 1986), 38-44.
-
(1986)
IEEE Transactions on Communications
, vol.34
, Issue.1
, pp. 38-44
-
-
HOU, T.-C.1
LI, V.2
-
8
-
-
1542317831
-
Rushing attacks and defense in wireless ad hoc network routing protocols
-
San Diego, CA, USA
-
HU, Y.-C., PERRIG, A., AND JOHNSON, D. B. Rushing attacks and defense in wireless ad hoc network routing protocols. In Proceedings of the ACM Workshop on Wireless security (WISE) (San Diego, CA, USA, 2003), pp. 30-40.
-
(2003)
Proceedings of the ACM Workshop on Wireless security (WISE)
, pp. 30-40
-
-
HU, Y.-C.1
PERRIG, A.2
JOHNSON, D.B.3
-
9
-
-
3042594839
-
The Security and Privacy of Smart Vehicles
-
HUBAUX, J.-P., C̈APKUN, S., AND LUO, J. The Security and Privacy of Smart Vehicles. IEEE Security and Privacy 4, 3 (2004), 49-55.
-
(2004)
IEEE Security and Privacy
, vol.4
, Issue.3
, pp. 49-55
-
-
HUBAUX, J.-P.1
C̈APKUN, S.2
LUO, J.3
-
10
-
-
23944483569
-
Advanced Detection of Selfish or Malicious Nodes in Ad Hoc Networks
-
Sept., Springer Verlag, pp
-
KARGL, F., KLENK, A., SCHLOTT, S., AND WEBER, M. Advanced Detection of Selfish or Malicious Nodes in Ad Hoc Networks. In Proceedings of 1st European Workshop on Security in Ad-Hoc and Sensor Networks (ESAS 2004) (Sept. 2004), Springer Verlag, pp. 152-165.
-
(2004)
Proceedings of 1st European Workshop on Security in Ad-Hoc and Sensor Networks (ESAS 2004)
, pp. 152-165
-
-
KARGL, F.1
KLENK, A.2
SCHLOTT, S.3
WEBER, M.4
-
11
-
-
0034547115
-
Greedy Perimeter Stateless Routing for Wireless Networks
-
Boston, USA, Aug
-
KARP, B., AND KUNG, H. Greedy Perimeter Stateless Routing for Wireless Networks. In Proceedings of the Sixth ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom 2000) (Boston, USA, Aug. 2000), pp. 243-254.
-
(2000)
Proceedings of the Sixth ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom 2000)
, pp. 243-254
-
-
KARP, B.1
KUNG, H.2
-
14
-
-
47649098860
-
Influence of Falsified Position Data on Geographic Ad-Hoc Routing
-
July
-
LEINMÜLLER, T., SCHOCK, E., KARGL, F., AND MAIHOFER, C. Influence of Falsified Position Data on Geographic Ad-Hoc Routing. In Proceedings of the second European Workshop on Security and Privacy in Ad hoc and Sensor Networks (ESAS SOUS) (July 2005).
-
(2005)
Proceedings of the second European Workshop on Security and Privacy in Ad hoc and Sensor Networks (ESAS SOUS)
-
-
LEINMÜLLER, T.1
SCHOCK, E.2
KARGL, F.3
MAIHOFER, C.4
-
15
-
-
35048898373
-
-
MAIHÖFER, C., EBERHARDT, R., AND SCHOCH, E. CGGC: Cached Greedy Geocast. In Proceedings of 2nd Intl. Conference Wired/Wireless Internet Communications (WWIC 2004) (Frankfurt (Oder), Germany, Feb. 2004), 2957 of Lecture Notes in Computer Science, Springer Verlag.
-
MAIHÖFER, C., EBERHARDT, R., AND SCHOCH, E. CGGC: Cached Greedy Geocast. In Proceedings of 2nd Intl. Conference Wired/Wireless Internet Communications (WWIC 2004) (Frankfurt (Oder), Germany, Feb. 2004), vol. 2957 of Lecture Notes in Computer Science, Springer Verlag.
-
-
-
-
16
-
-
85177497676
-
-
MARTI, S., GIULI, T. J., L I, K., AND BAKER, M. Mitigating routing misbehavior in mobile ad hoc networks. In Proceedings of the 6th annual international conference on Mobile computing and networking (2000), pp. 255-265.
-
MARTI, S., GIULI, T. J., L I, K., AND BAKER, M. Mitigating routing misbehavior in mobile ad hoc networks. In Proceedings of the 6th annual international conference on Mobile computing and networking (2000), pp. 255-265.
-
-
-
-
17
-
-
0035509489
-
Survey on Position-Based Routing in Mobile Ad-Hoc Networks
-
Dec
-
MAUVE, M., WIDMER, J., AND HARTENSTEIN, H. A Survey on Position-Based Routing in Mobile Ad-Hoc Networks. IEEE Network 1, 6 (Dec. 2001), 30-39.
-
(2001)
IEEE Network
, vol.1
, Issue.6
, pp. 30-39
-
-
MAUVE, M.1
WIDMER, J.2
HARTENSTEIN, H.A.3
-
18
-
-
34247357458
-
-
MICHIARDI, P., AND MOLVA, R. CORE: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In Proceedings of the IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security (Deventer, The Netherlands, The Netherlands, 2002), Kluwer, B.V., pp. 107-121.
-
MICHIARDI, P., AND MOLVA, R. CORE: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In Proceedings of the IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security (Deventer, The Netherlands, The Netherlands, 2002), Kluwer, B.V., pp. 107-121.
-
-
-
-
19
-
-
3042785862
-
The Sybil Attack in Sensor Networks: Analysis and Defenses
-
Apr
-
NEWSOME, J., SHI, R., SONG, D., AND PERRIG, A. The Sybil Attack in Sensor Networks: Analysis and Defenses. In Proceedings of IEEE International Conference on Information Processing in Sensor Networks (IPSN 2004) (Apr. 2004).
-
(2004)
Proceedings of IEEE International Conference on Information Processing in Sensor Networks (IPSN 2004)
-
-
NEWSOME, J.1
SHI, R.2
SONG, D.3
PERRIG, A.4
-
21
-
-
1542317849
-
Secure verification of location claims
-
ACM Press, pp
-
SASTRY, N., SHANKAR, U., AND WAGNER, D. Secure verification of location claims. In Proceedings of the 2003 ACM workshop on Wireless security (WiSe'OS) (2003), ACM Press, pp. 1-10.
-
(2003)
Proceedings of the 2003 ACM workshop on Wireless security (WiSe'OS)
, pp. 1-10
-
-
SASTRY, N.1
SHANKAR, U.2
WAGNER, D.3
-
22
-
-
0021386815
-
Optimal transmission ranges for randomly distributed packet radio terminals
-
Mar
-
TAKAGI, H., AND KLEINROCK, L. Optimal transmission ranges for randomly distributed packet radio terminals. IEEE Transactions on Communications 38, 3 (Mar. 1984), 246-257.
-
(1984)
IEEE Transactions on Communications
, vol.38
, Issue.3
, pp. 246-257
-
-
TAKAGI, H.1
KLEINROCK, L.2
-
23
-
-
4544259841
-
SECTOR: Secure tracking of node encounters in multi-hop wireless networks
-
ACM Press, pp
-
CAPKUN, S., BUTTYAN, L., AND HUBAUX, J.-P. SECTOR: secure tracking of node encounters in multi-hop wireless networks. In Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks (SASN 8003) (2003), ACM Press, pp. 21-32.
-
(2003)
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks (SASN 8003)
, pp. 21-32
-
-
CAPKUN, S.1
BUTTYAN, L.2
HUBAUX, J.-P.3
|