-
1
-
-
0033357103
-
Securing ad hoc networks
-
Nov./Dec
-
L. Zhou and Z. Haas, "Securing ad hoc networks," IEEE Netw. Mag., vol. 13, no. 6, pp. 24-30, Nov./Dec. 1999.
-
(1999)
IEEE Netw. Mag
, vol.13
, Issue.6
, pp. 24-30
-
-
Zhou, L.1
Haas, Z.2
-
2
-
-
0034546898
-
Intrusion detection in wireless ad-hoc networks
-
Boston, MA, Aug
-
Y. Zhang and W. Lee, "Intrusion detection in wireless ad-hoc networks," in Proc. 6th Annu. Int. Conf. Mobile Computing and Networking, Boston, MA, Aug. 2000, pp. 275-283.
-
(2000)
Proc. 6th Annu. Int. Conf. Mobile Computing and Networking
, pp. 275-283
-
-
Zhang, Y.1
Lee, W.2
-
3
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
Boston, MA, Aug
-
S. Marti, T. J. Giuli, K. Lai, and M. Baker, "Mitigating routing misbehavior in mobile ad hoc networks," in Proc. 6th Annu. Int. Conf. Mobile Computing and Networking (MobiCom), Boston, MA, Aug. 2000, pp. 255-265.
-
(2000)
Proc. 6th Annu. Int. Conf. Mobile Computing and Networking (MobiCom)
, pp. 255-265
-
-
Marti, S.1
Giuli, T.J.2
Lai, K.3
Baker, M.4
-
4
-
-
0035789229
-
The quest for security in mobile ad hoc networks
-
Long Beach, CA, May
-
J.-P. Hubaux, L. Buttyan, and S. Capkun, "The quest for security in mobile ad hoc networks," in Proc. 2nd ACM Int. Symp. Mobile Ad Hoc Networking Computing, Long Beach, CA, May 2001, pp. 146-155.
-
(2001)
Proc. 2nd ACM Int. Symp. Mobile Ad Hoc Networking Computing
, pp. 146-155
-
-
Hubaux, J.-P.1
Buttyan, L.2
Capkun, S.3
-
5
-
-
0036957315
-
Ariadne: A secure on-demand routing protocol for ad hoc networks
-
presented at the, Atlanta, GA, Sep
-
Y.-C. Hu, A. Perrig, and D. B. Johnson, "Ariadne: A secure on-demand routing protocol for ad hoc networks," presented at the 8th Annu. Int. Conf. Mobile Computing and Networking, Atlanta, GA, Sep. 2002.
-
(2002)
8th Annu. Int. Conf. Mobile Computing and Networking
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
6
-
-
1542317831
-
Rushing attacks and defense in wireless ad hoc network routing protocols
-
presented at the, San Diego, CA, Sep
-
Y.-C. Hu, A. Perrig, and D. B. Johnson, "Rushing attacks and defense in wireless ad hoc network routing protocols," presented at the ACM Workshop on Wireless Security, San Diego, CA, Sep. 2003.
-
(2003)
ACM Workshop on Wireless Security
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
7
-
-
11244252132
-
Denial of service resilience in ad hoc networks
-
Philadelphia, PA, Sep
-
I. Aad, J. P. Hubaux, and E. Knightly, "Denial of service resilience in ad hoc networks," in Proc. 10th Annu. Int. Conf. Mobile Computing and Networking, Philadelphia, PA, Sep. 2004, pp. 202-215.
-
(2004)
Proc. 10th Annu. Int. Conf. Mobile Computing and Networking
, pp. 202-215
-
-
Aad, I.1
Hubaux, J.P.2
Knightly, E.3
-
9
-
-
29144503110
-
Attack-resistant cooperation stimulation in autonomous ad hoc networks
-
Dec
-
W. Yu and K. J. R. Liu, "Attack-resistant cooperation stimulation in autonomous ad hoc networks," IEEE J. Selected Areas Commun. Special Issue Autonomic Commun. Syst., vol. 23, no. 12, pp. 2260-2271, Dec. 2005.
-
(2005)
IEEE J. Selected Areas Commun. Special Issue Autonomic Commun. Syst
, vol.23
, Issue.12
, pp. 2260-2271
-
-
Yu, W.1
Liu, K.J.R.2
-
11
-
-
0842283101
-
A secure routing protocol for ad hoc networks
-
presented at the, Nov
-
K. Sanzgiri, B. Dahill, B. N. Levine, C. Shields, and E. M. Belding-Royer, "A secure routing protocol for ad hoc networks," presented at the Int. Conf. Network Protocols, Nov. 2002.
-
(2002)
Int. Conf. Network Protocols
-
-
Sanzgiri, K.1
Dahill, B.2
Levine, B.N.3
Shields, C.4
Belding-Royer, E.M.5
-
13
-
-
0041973497
-
Packet leashes: A defense against wormhole attacks in wireless networks
-
presented at the
-
Y.-C. Hu, A. Perrig, and D. B. Johnson, "Packet leashes: A defense against wormhole attacks in wireless networks," presented at the IEEE Infocom, 2003.
-
(2003)
IEEE Infocom
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
14
-
-
11244269535
-
SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks
-
Y.-C. Hu, A. Perrig, and D. B. Johnson, "SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks," Ad Hoc Netw. J., vol. 1, pp. 175-192, 2003.
-
(2003)
Ad Hoc Netw. J
, vol.1
, pp. 175-192
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
15
-
-
4444314479
-
Mobility helps security in ad hoc networks
-
Annapolis, MD, Jun
-
S. Capkun, J.-P. Hubaux, and L. Buttyan, "Mobility helps security in ad hoc networks," in Proc. MobiHOC, Annapolis, MD, Jun. 2003.
-
(2003)
Proc. MobiHOC
-
-
Capkun, S.1
Hubaux, J.-P.2
Buttyan, L.3
-
16
-
-
34249335345
-
-
S. Capkun and J.-P. Hubaux, BISS: Building secure routing out of an incomplete set of security associations, presented at the WiSe, San Diego, CA, Sep. 2003.
-
S. Capkun and J.-P. Hubaux, "BISS: Building secure routing out of an incomplete set of security associations," presented at the WiSe, San Diego, CA, Sep. 2003.
-
-
-
-
17
-
-
0242696192
-
Performance analysis of the CONFIDANT protocol
-
S. Buchegger and J.-Y. Le Boudec, "Performance analysis of the CONFIDANT protocol," in Mobihoc, 2002, pp. 226-236.
-
(2002)
Mobihoc
, pp. 226-236
-
-
Buchegger, S.1
Le Boudec, J.-Y.2
-
18
-
-
0042660545
-
Stimulating cooperation in self-organizing mobile ad hoc networks
-
Oct
-
L. Buttyán and J.-P. Hubaux, "Stimulating cooperation in self-organizing mobile ad hoc networks," Mobile Netw. Appl., vol. 8, no. 5, pp. 579-592, Oct. 2003.
-
(2003)
Mobile Netw. Appl
, vol.8
, Issue.5
, pp. 579-592
-
-
Buttyán, L.1
Hubaux, J.-P.2
-
19
-
-
0042933944
-
Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks
-
presented at the
-
S. Zhong, J. Chen, and Y. R. Yang, "Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks," presented at the IEEE INFOCOM, 2003.
-
(2003)
IEEE INFOCOM
-
-
Zhong, S.1
Chen, J.2
Yang, Y.R.3
-
20
-
-
0041939831
-
Cooperation in wireless ad hoc networks
-
presented at the
-
V. Srinivasan, P. Nuggehalli, C. F. Chiasserini, and R. R. Rao, "Cooperation in wireless ad hoc networks," presented at the IEEE INFOCOM, 2003.
-
(2003)
IEEE INFOCOM
-
-
Srinivasan, V.1
Nuggehalli, P.2
Chiasserini, C.F.3
Rao, R.R.4
-
21
-
-
85113133621
-
Core: A COllaborative REputation mechanism to enforce node cooperation in mobile ad hoc networks
-
presented at the
-
P. Michiardi and R. Molva, "Core: A COllaborative REputation mechanism to enforce node cooperation in mobile ad hoc networks," presented at the IFIP Commun. Multimedia Security Conf., 2002.
-
(2002)
IFIP Commun. Multimedia Security Conf
-
-
Michiardi, P.1
Molva, R.2
-
23
-
-
0003807773
-
-
Upper Saddle River, NJ: Prentice-Hall
-
S. Haykin, Adaptive Filter Theory. Upper Saddle River, NJ: Prentice-Hall, 2001.
-
(2001)
Adaptive Filter Theory
-
-
Haykin, S.1
-
24
-
-
0000629443
-
Dynamic source routing in ad hoc wireless networks, mobile computing
-
T. Imielinski and H. Korth, Eds. Norwell, MA: Kluwer, ch. 5, pp
-
D. B. Johnson and D. A. Maltz, "Dynamic source routing in ad hoc wireless networks, mobile computing," in Mobile Computing, T. Imielinski and H. Korth, Eds. Norwell, MA: Kluwer, 1996, ch. 5, pp. 153-181.
-
(1996)
Mobile Computing
, pp. 153-181
-
-
Johnson, D.B.1
Maltz, D.A.2
-
25
-
-
0003629991
-
-
Federal Inf. Process. Std. Publ. 180-1
-
Secure Hash Standard, 1995, Federal Inf. Process. Std. Publ. 180-1.
-
(1995)
Secure Hash Standard
-
-
-
26
-
-
85177207285
-
-
J. Yoon, M. Liu, and B. Noble, Sound mobility models, presented at the MobiCom, San Diego, CA, Sep. 2003.
-
J. Yoon, M. Liu, and B. Noble, "Sound mobility models," presented at the MobiCom, San Diego, CA, Sep. 2003.
-
-
-
-
27
-
-
34249315450
-
-
Wireless LAN medium access control (MAC) and physical layer (PHY) specifications, IEEE Std. 802.11-1007, IEEE Comput. Soc. LAN MAN Standards Committee, Inst. Elect. Elect. Eng.
-
Wireless LAN medium access control (MAC) and physical layer (PHY) specifications, IEEE Std. 802.11-1007, IEEE Comput. Soc. LAN MAN Standards Committee, Inst. Elect. Elect. Eng.
-
-
-
|