-
1
-
-
0027693935
-
Diversity Coding for Transparent Self-Healing and Fault-Tolerant Communication Networks
-
Nov
-
E. Ayanoglu,I. Chih-Lin, R.D. Gitlin and J.E. Mazo. Diversity Coding for Transparent Self-Healing and Fault-Tolerant Communication Networks, Communications, IEEE Transactions on, Vol. 41, Issue 11, pp. 1677-1686, Nov. 1993.
-
(1993)
Communications, IEEE Transactions on
, vol.41
, Issue.11
, pp. 1677-1686
-
-
Ayanoglu, E.1
Chih-Lin, I.2
Gitlin, R.D.3
Mazo, J.E.4
-
2
-
-
24944509183
-
Analysis of a Hybrid Key Management Solution for Ad hoc Networks
-
March
-
Aruna Balasubramanian, S. Mishra and R. Sridhar. Analysis of a Hybrid Key Management Solution for Ad hoc Networks, IEEE Wireless Communications and Networking Conference (WCNC 2005), Vol. 4, pp. 2082-2087, March 2005.
-
(2005)
IEEE Wireless Communications and Networking Conference (WCNC 2005)
, vol.4
, pp. 2082-2087
-
-
Balasubramanian, A.1
Mishra, S.2
Sridhar, R.3
-
3
-
-
15944392792
-
Secure Communication in Ad hoc Networks
-
West Point, NY, pp, June
-
Mike Burmester and Tri van Le. Secure Communication in Ad hoc Networks, Proceedings of the IEEE Workshop on Information Assurance and Security, West Point, NY, pp. 234-241, June 2004.
-
(2004)
Proceedings of the IEEE Workshop on Information Assurance and Security
, pp. 234-241
-
-
Burmester, M.1
van Le, T.2
-
4
-
-
29644432419
-
Reliable and Efficient Forwarding in Ad hoc Networks
-
May
-
Marco Conti, Enrico Gregori and Gaia Maselli. Reliable and Efficient Forwarding in Ad hoc Networks, Elsevier Journal of Ad Hoc Networks, Vol. 4, Issue 3, pp. 398-415, May 2006.
-
(2006)
Elsevier Journal of Ad Hoc Networks
, vol.4
, Issue.3
, pp. 398-415
-
-
Conti, M.1
Gregori, E.2
Maselli, G.3
-
5
-
-
84892591410
-
-
D. Djenouri, L. Khelladi and A.N. Badache. A Survey of Security Issues in Mobile Ad Hoc and Sensor Networks, Communications Surveys & Tutorials, IEEE , 7, Issue 4, pp. 2-28, Fourth Quarter 2005.
-
D. Djenouri, L. Khelladi and A.N. Badache. A Survey of Security Issues in Mobile Ad Hoc and Sensor Networks, Communications Surveys & Tutorials, IEEE , Vol. 7, Issue 4, pp. 2-28, Fourth Quarter 2005.
-
-
-
-
6
-
-
3042647758
-
Survey of Secure Wireless Ad Hoc Routing
-
May/June
-
Yh-Chun Hu and Adrian Perrig. A Survey of Secure Wireless Ad Hoc Routing, IEEE Security & Privacy, special issue on Making Wireless Work, Vol. 2, Issue 3, pp. 28-39, May/June 2004.
-
(2004)
IEEE Security & Privacy, special issue on Making Wireless Work
, vol.2
, Issue.3
, pp. 28-39
-
-
Yh-Chun, H.1
Adrian Perrig, A.2
-
8
-
-
0026105198
-
Sequential Decoding with an Efficient Partial Retransmission ARQ Strategy
-
Feb
-
Samir Kallel and David Haccoun. Sequential Decoding with an Efficient Partial Retransmission ARQ Strategy, IEEE Transactions on Communications, Vol. 39, pp. 208-213, Feb. 1991.
-
(1991)
IEEE Transactions on Communications
, vol.39
, pp. 208-213
-
-
Kallel, S.1
Haccoun, D.2
-
9
-
-
25144473813
-
Secure Multipath Routing for Mobile Ad Hoc Networks
-
Jan
-
P. Kotzanikolaou, R. Mavropodi and C. Douligeris. Secure Multipath Routing for Mobile Ad Hoc Networks, Wireless On-demand Network Systems and Services, 2005. WONS 2005. Second Annual Conference on, pp. 89-96, Jan. 2005.
-
(2005)
Wireless On-demand Network Systems and Services, 2005. WONS 2005. Second Annual Conference on
, pp. 89-96
-
-
Kotzanikolaou, P.1
Mavropodi, R.2
Douligeris, C.3
-
10
-
-
24744451604
-
Ad Hoc Key Management Infrastructure
-
B. Lehane, L. Dolye and D.O'Mahony. Ad Hoc Key Management Infrastructure, Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'05), Vol. 2, pp. 540-545, 2005.
-
(2005)
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'05)
, vol.2
, pp. 540-545
-
-
Lehane, B.1
Dolye, L.2
O'Mahony, D.3
-
11
-
-
4444237581
-
SPREAD: Enhancing Data Confidentiality in Mobile Ad Hoc Networks
-
Hong Kong, China, March
-
Wenjing Lou, Wei Liu and Yuguang Fang. SPREAD: Enhancing Data Confidentiality in Mobile Ad Hoc Networks, IEEE INFOCOM 2004, Hong Kong, China, March 2004.
-
(2004)
IEEE INFOCOM 2004
-
-
Lou, W.1
Liu, W.2
Fang, Y.3
-
12
-
-
34547431932
-
-
Wenjing Lou, Wei Liu, and Yanchao Zhang. Performance Optimization Using Multipath Routing in Mobile Ad-hoc and Wireless Sensor Networks, to appear in book Combinatorial Optimization in Communication Networks, edited by M. Cheng, Y. Li, and D-Z. Zhu, Kluwer, 2005.
-
Wenjing Lou, Wei Liu, and Yanchao Zhang. Performance Optimization Using Multipath Routing in Mobile Ad-hoc and Wireless Sensor Networks, to appear in book Combinatorial Optimization in Communication Networks, edited by M. Cheng, Y. Li, and D-Z. Zhu, Kluwer, 2005.
-
-
-
-
13
-
-
0034541756
-
Mitigating Routing Misbehavior in Mobile Ad Hoc Networks
-
S. Marti, T. Giuli, K. Lai, and M. Baker. Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, In Proceedings of the Sixth annual ACM/IEEE International Conference on Mobile Computing and Networking, pp. 255-265, 2000.
-
(2000)
Proceedings of the Sixth annual ACM/IEEE International Conference on Mobile Computing and Networking
, pp. 255-265
-
-
Marti, S.1
Giuli, T.2
Lai, K.3
Baker, M.4
-
14
-
-
25144467845
-
Performance Analysis of Secure Multipath Routing Protocols for Mobile Ad Hoc Networks
-
WICC 2005, Springer-Verlag, pp
-
R. Mavropodi, P. Kotzanikolaou and C. Douligeris. Performance Analysis of Secure Multipath Routing Protocols for Mobile Ad Hoc Networks, WICC 2005, LNCS, Vol. 3510, Springer-Verlag, pp. 269-278, 2005.
-
(2005)
LNCS
, vol.3510
, pp. 269-278
-
-
Mavropodi, R.1
Kotzanikolaou, P.2
Douligeris, C.3
-
16
-
-
0347458171
-
Path Set Selection in Mobile Ad Hoc Networks
-
Lausanne, Switzerland, June
-
P. Papadimitratos, Z.J. Haas and E.G. Sirer. Path Set Selection in Mobile Ad Hoc Networks, ACM MOBIHOC 2002, Lausanne, Switzerland, June 2002.
-
(2002)
ACM MOBIHOC 2002
-
-
Papadimitratos, P.1
Haas, Z.J.2
Sirer, E.G.3
-
17
-
-
6344273537
-
Secure Message Transmission in Mobile Ad Hoc Networks
-
July
-
P. Papadimitratos and Z. Haas. Secure Message Transmission in Mobile Ad Hoc Networks, Elsevier Journal of Ad Hoc Networks, Vol. 1, Issue 1, pp. 193-209, July 2003.
-
(2003)
Elsevier Journal of Ad Hoc Networks
, vol.1
, Issue.1
, pp. 193-209
-
-
Papadimitratos, P.1
Haas, Z.2
-
18
-
-
33144467802
-
Secure Data Communication in Mobile Ad hoc Networks
-
February
-
P. Papadimitratos and Z. Haas, Secure Data Communication in Mobile Ad hoc Networks, Selected Areas in Communications, IEEE Journal on , Vol. 24, Issue 2, pp. 343-356, February 2006.
-
(2006)
Selected Areas in Communications, IEEE Journal on
, vol.24
, Issue.2
, pp. 343-356
-
-
Papadimitratos, P.1
Haas, Z.2
-
20
-
-
2342588224
-
Analysis of Multipath Routing - Part I: The Effect on the Packet Delivery Ratio
-
January
-
A. Tsirigos and Z.J. Haas, Analysis of Multipath Routing - Part I: The Effect on the Packet Delivery Ratio, IEEE Transactions on Wireless Communications, Vol. 3, Issue 1, pp. 138-146, January 2004.
-
(2004)
IEEE Transactions on Wireless Communications
, vol.3
, Issue.1
, pp. 138-146
-
-
Tsirigos, A.1
Haas, Z.J.2
-
21
-
-
2342625273
-
Analysis of Multipath Routing - Part II: Mitigation of the Effects of Frequently Changing Network Topologies
-
March
-
A. Tsirigos and Z.J. Haas, Analysis of Multipath Routing - Part II: Mitigation of the Effects of Frequently Changing Network Topologies, IEEE Transactions on Wireless Communications, Vol. 3, Issue 2, pp. 500-511, March 2004.
-
(2004)
IEEE Transactions on Wireless Communications
, vol.3
, Issue.2
, pp. 500-511
-
-
Tsirigos, A.1
Haas, Z.J.2
|