-
1
-
-
85106319926
-
A performance comparison of multi-hop wireless ad hoc network routing protocols
-
Dallas, TX, U.S.A
-
Broch J, Maltz D, Johnson D, Hu Y-C, Jetcheva J. A performance comparison of multi-hop wireless ad hoc network routing protocols. The fourth Annual ACMI IEEE International Conference on Mobile Computing and Networking, Dallas, TX, U.S.A., 1998; 85-97.
-
(1998)
The fourth Annual ACMI IEEE International Conference on Mobile Computing and Networking
, pp. 85-97
-
-
Broch, J.1
Maltz, D.2
Johnson, D.3
Hu, Y.-C.4
Jetcheva, J.5
-
2
-
-
0033357103
-
Securing ad hoc networks
-
Zhou L, Haas Z. Securing ad hoc networks. IEEE Network 1999; 13(6):24-30.
-
(1999)
IEEE Network
, vol.13
, Issue.6
, pp. 24-30
-
-
Zhou, L.1
Haas, Z.2
-
5
-
-
0142168899
-
A secure routing protocol with limited key distribution and double message hashing
-
Victoria, Canada, August
-
Yu M. A secure routing protocol with limited key distribution and double message hashing. Proceedings of the IEEE Pacific Rim Conference on Computer, Communications and Signal Processing (PacRim'03), vol. 2, Victoria, Canada, August 2003; 553-556.
-
(2003)
Proceedings of the IEEE Pacific Rim Conference on Computer, Communications and Signal Processing (PacRim'03)
, vol.2
, pp. 553-556
-
-
Yu, M.1
-
7
-
-
54049140358
-
Multilayer chaotic encryption for secure communications in packet switching networks
-
Beijing, China, August
-
Beritelli F, Di Cola E, Fortuna L, Italia F. Multilayer chaotic encryption for secure communications in packet switching networks. WCC-ICCT International Conference on Communication Technology Proceedings, Beijing, China, August 2000; 1575-1582.
-
(2000)
WCC-ICCT International Conference on Communication Technology Proceedings
, pp. 1575-1582
-
-
Beritelli, F.1
Di Cola, E.2
Fortuna, L.3
Italia, F.4
-
8
-
-
0003197918
-
Protecting mobile agents against malicious hosts
-
Mobile Agents and Security, Springer: Berlin, 1419
-
Sander T, Tschudin CF. Protecting mobile agents against malicious hosts. Mobile Agents and Security, Lecture Notes in Computer Science, vol. 1419. Springer: Berlin, 1998; 1419:44-60.
-
(1998)
Lecture Notes in Computer Science
, vol.1419
, pp. 44-60
-
-
Sander, T.1
Tschudin, C.F.2
-
9
-
-
0033309271
-
No-interactive crypto-computing for NC
-
New York City, NY, U.S.A, October
-
Sander T, Young A, Yung M. No-interactive crypto-computing for NC. Proceedings of the 40th IEEE Symposium on Foundations of Computer Science, New York City, NY, U.S.A., October 1999; 554-566.
-
(1999)
Proceedings of the 40th IEEE Symposium on Foundations of Computer Science
, pp. 554-566
-
-
Sander, T.1
Young, A.2
Yung, M.3
-
10
-
-
0034828870
-
Cryptographic security for mobile code
-
Oakland, CA, U.S.A
-
Algesheimer J, Cachin C, Camenisch J, Karjoth G. Cryptographic security for mobile code, IEEE Symposium on Security and Privacy, Oakland, CA, U.S.A., 2001; 2-11.
-
(2001)
IEEE Symposium on Security and Privacy
, pp. 2-11
-
-
Algesheimer, J.1
Cachin, C.2
Camenisch, J.3
Karjoth, G.4
-
12
-
-
34547499301
-
-
IEEE Standard Specifications for Public-Key Cryptography IEEE Std 1363-2000
-
IEEE Standard Specifications for Public-Key Cryptography (IEEE Std 1363-2000). 2000. http://www.ieee.org
-
(2000)
-
-
-
14
-
-
84954179089
-
Neighbor supporting ad hoc multicast routing protocol
-
Boston, MA, U.S.A
-
Lee S, Kim C. Neighbor supporting ad hoc multicast routing protocol. First Annual Workshop on Mobile and Ad Hoc Networking and Computing, Boston, MA, U.S.A., 2000; 37-44.
-
(2000)
First Annual Workshop on Mobile and Ad Hoc Networking and Computing
, pp. 37-44
-
-
Lee, S.1
Kim, C.2
-
15
-
-
85031307530
-
Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers
-
London, U.K, October
-
Perkins C, Bhagwat P. Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers. ACM SIGCOMM'94 Conference on Communications Architectures, Protocols and Applications, London, U.K., October 1994; 234-244.
-
(1994)
ACM SIGCOMM'94 Conference on Communications Architectures, Protocols and Applications
, pp. 234-244
-
-
Perkins, C.1
Bhagwat, P.2
-
18
-
-
3042645880
-
Optimized link state routing protocol
-
October
-
Clausen T, Jacquet P. Optimized link state routing protocol. Request for Comments 3626, October 2003.
-
(2003)
Request for Comments
, vol.3626
-
-
Clausen, T.1
Jacquet, P.2
-
19
-
-
4444282195
-
Topology dissemination based on reverse-path forwarding (TBRPF)
-
February
-
Ogier R et al. Topology dissemination based on reverse-path forwarding (TBRPF). Request for Comments 3684, February 2004.
-
(2004)
Request for Comments
, vol.3684
-
-
Ogier, R.1
-
20
-
-
0031353437
-
-
Park V, Corson M. A Highly adaptive distributed routing algorithm for mobile wireless networks. Proceedings of IEEE INFOCOM '97, 3, Kobe, Japan, April 1997; 1405-1413.
-
Park V, Corson M. A Highly adaptive distributed routing algorithm for mobile wireless networks. Proceedings of IEEE INFOCOM '97, vol. 3, Kobe, Japan, April 1997; 1405-1413.
-
-
-
-
22
-
-
0000629443
-
Dynamic source routing in ad hoc wireless networks, mobile computing
-
Imielinski T, Korth H eds, Kluwer Academic Publishers: Dordrecht
-
Johnson DB, Maltz DA. Dynamic source routing in ad hoc wireless networks, mobile computing. In Mobile Computing, Imielinski T, Korth H (eds). Kluwer Academic Publishers: Dordrecht, 1996; 153-181.
-
(1996)
Mobile Computing
, pp. 153-181
-
-
Johnson, D.B.1
Maltz, D.A.2
-
24
-
-
1142268856
-
A new approach to on-demand loop-free routing in ad hoc networks
-
Boston, MA, July
-
Garcia-Luna-Aceves JJ, Mosko M, Perkins C. A new approach to on-demand loop-free routing in ad hoc networks. Proceedings of the PODC 2003, Boston, MA, July 2003; 53-62.
-
(2003)
Proceedings of the PODC 2003
, pp. 53-62
-
-
Garcia-Luna-Aceves, J.J.1
Mosko, M.2
Perkins, C.3
-
25
-
-
4444308329
-
Using labeled paths for loop-free on-demand routing in ad hoc networks
-
Roppongi, Japan, May
-
Rangarajan H, Garcia-Luna-Aceves JJ. Using labeled paths for loop-free on-demand routing in ad hoc networks, Proceedings of the 5th ACM MOBIHOC, Roppongi, Japan, May 2004; 43-54.
-
(2004)
Proceedings of the 5th ACM MOBIHOC
, pp. 43-54
-
-
Rangarajan, H.1
Garcia-Luna-Aceves, J.J.2
-
26
-
-
0035249889
-
Performance comparison of two on-demand routing protocols for ad hoc networks
-
Perkins C, Royer EM, Das SR, Marina MK. Performance comparison of two on-demand routing protocols for ad hoc networks. IEEE Personal Communication 2001; 8(1):16-28.
-
(2001)
IEEE Personal Communication
, vol.8
, Issue.1
, pp. 16-28
-
-
Perkins, C.1
Royer, E.M.2
Das, S.R.3
Marina, M.K.4
-
28
-
-
0035392857
-
A survey of energy efficient network protocols for wireless networks
-
Jones CE, Sivalingam KM, Agrawal P, Chen JC. A survey of energy efficient network protocols for wireless networks, Wireless Networks 2001; 7(4):343-358,
-
(2001)
Wireless Networks
, vol.7
, Issue.4
, pp. 343-358
-
-
Jones, C.E.1
Sivalingam, K.M.2
Agrawal, P.3
Chen, J.C.4
-
30
-
-
0035019897
-
Performance comparison and analysis of ad hoc routing algorithms
-
Phoenix, AR, U.S.A, April
-
Boukerche A. Performance comparison and analysis of ad hoc routing algorithms. 20th IEEE International Performance, Computing, and Communication Conference, Phoenix, AR, U.S.A., April 2001; 171-178.
-
(2001)
20th IEEE International Performance, Computing, and Communication Conference
, pp. 171-178
-
-
Boukerche, A.1
-
31
-
-
0033680936
-
A performance comparison of energy consumption for mobile ad hoc network routing protocols
-
San Francisco, CA, U.S.A, August
-
Cano JC, Manzoni P. A performance comparison of energy consumption for mobile ad hoc network routing protocols. 8th International Workshop on Modeling, Analysis and Simulation of Computer and Telecommunication Systems, San Francisco, CA, U.S.A., August 2000; 57-64.
-
(2000)
8th International Workshop on Modeling, Analysis and Simulation of Computer and Telecommunication Systems
, pp. 57-64
-
-
Cano, J.C.1
Manzoni, P.2
-
32
-
-
0033720457
-
Performance of TCP over different routing protocols in mobile ad hoc networks
-
Tokyo, Japan, May
-
Ahuja A, Agarwal S, Singh JP, Shorey R. Performance of TCP over different routing protocols in mobile ad hoc networks. IEEE 51st Vehicular Technology Conference Proceedings, vol. 3, Tokyo, Japan, May 2000; 2315-2319.
-
(2000)
IEEE 51st Vehicular Technology Conference Proceedings
, vol.3
, pp. 2315-2319
-
-
Ahuja, A.1
Agarwal, S.2
Singh, J.P.3
Shorey, R.4
-
33
-
-
0032621035
-
A review of current routing protocols for ad hoc mobile wireless networks
-
Royer EM, Toh CK. A review of current routing protocols for ad hoc mobile wireless networks. IEEE Personal Communication 1999; 6(2):46-55.
-
(1999)
IEEE Personal Communication
, vol.6
, Issue.2
, pp. 46-55
-
-
Royer, E.M.1
Toh, C.K.2
-
34
-
-
0003361860
-
Ns notes and documentation
-
Fall K, Varadhan K ed, UC Berkeley, LBL, USC/ISI, and Xerox PARC, November, available from
-
Fall K, Varadhan K (ed). Ns notes and documentation. The VINT Project, UC Berkeley, LBL, USC/ISI, and Xerox PARC, November 1997, available from http://www-mash.cs.berkeley.edu/ns/
-
(1997)
The VINT Project
-
-
-
35
-
-
0027693935
-
Diversity coding for transparent self-healing and fault-tolerant communication networks,
-
Ayanoglu E, Chih-Lin I, Gitlin RD, Mazo JE. Diversity coding for transparent self-healing and fault-tolerant communication networks,' IEEE Transactions on Communication 1993; 41(11): 1677-1686.
-
(1993)
IEEE Transactions on Communication
, vol.41
, Issue.11
, pp. 1677-1686
-
-
Ayanoglu, E.1
Chih-Lin, I.2
Gitlin, R.D.3
Mazo, J.E.4
-
36
-
-
0030695529
-
Securing distance-vector routing protocols
-
San Diego, CA, U.S.A
-
Smith BR, Murthy S, Garcia-Luna-Aceves JJ. Securing distance-vector routing protocols. Proceedings of the Symposium on Network and Distributed System Security, San Diego, CA, U.S.A., 1997; 85-92.
-
(1997)
Proceedings of the Symposium on Network and Distributed System Security
, pp. 85-92
-
-
Smith, B.R.1
Murthy, S.2
Garcia-Luna-Aceves, J.J.3
-
38
-
-
84961745313
-
Celestial security management system
-
Hilton Head, SC, U.S.A, January
-
Xu C, Gong F, Baldine I, Sargor C, Jou F, Wu S, Fu Z, Huang H. Celestial security management system. DARPA Information Survivability Conference and Exposition, Hilton Head, SC, U.S.A., January 2000; 1:162-172.
-
(2000)
DARPA Information Survivability Conference and Exposition
, vol.1
, pp. 162-172
-
-
Xu, C.1
Gong, F.2
Baldine, I.3
Sargor, C.4
Jou, F.5
Wu, S.6
Fu, Z.7
Huang, H.8
-
39
-
-
0032026045
-
SNMP and SNMPv2: The infrastructure for network management
-
Stallings W. SNMP and SNMPv2: the infrastructure for network management. IEEE Communication Magazine 1998; 36(3):37-43.
-
(1998)
IEEE Communication Magazine
, vol.36
, Issue.3
, pp. 37-43
-
-
Stallings, W.1
-
42
-
-
0004198635
-
-
2nd edn, Prentice-Hall: Englewood Cliffs, NJ
-
Pfleeger CP. Security in Computing (2nd edn). Prentice-Hall: Englewood Cliffs, NJ, 1997.
-
(1997)
Security in Computing
-
-
Pfleeger, C.P.1
-
43
-
-
0036957315
-
ARIADNE: A secure on-demand routing protocol for ad hoc networks
-
Atlanta, GA, U.S.A, September
-
Hu Y, Perrig A, Johnson D. ARIADNE: a secure on-demand routing protocol for ad hoc networks. In Proceedings of the MobiCom, Atlanta, GA, U.S.A., September 2002; 12-23,
-
(2002)
Proceedings of the MobiCom
, pp. 12-23
-
-
Hu, Y.1
Perrig, A.2
Johnson, D.3
-
44
-
-
84961572484
-
SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks
-
Callicoon, NY, U.S.A, June
-
Hu Y, Johnson D, Perrig A. SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks. In Proceedings of the WMCSA, Callicoon, NY, U.S.A., June 2002; 3-13.
-
(2002)
Proceedings of the WMCSA
, pp. 3-13
-
-
Hu, Y.1
Johnson, D.2
Perrig, A.3
-
47
-
-
15244339622
-
Authenticated routing for ad hoc networks
-
Sanzgiri K, LaFlamme D, Dahill B, Levine BN, Shields C, Belding-Royer EM. Authenticated routing for ad hoc networks. IEEE Journal on Selected Areas in Communications 2005; 23(3):598-610.
-
(2005)
IEEE Journal on Selected Areas in Communications
, vol.23
, Issue.3
, pp. 598-610
-
-
Sanzgiri, K.1
LaFlamme, D.2
Dahill, B.3
Levine, B.N.4
Shields, C.5
Belding-Royer, E.M.6
-
48
-
-
1542287664
-
Secure data transmission in mobile ad hoc networks
-
San Diego, CA, U.S.A, September
-
Papadimitratos P, Haas Z. Secure data transmission in mobile ad hoc networks. Proceedings of ACM Workshop on Wireless Security (WiSe), San Diego, CA, U.S.A., September 2003.
-
(2003)
Proceedings of ACM Workshop on Wireless Security (WiSe)
-
-
Papadimitratos, P.1
Haas, Z.2
-
49
-
-
34547539676
-
Policy-based authentication and authorization: Secure access to the network infrastructure
-
New Orleans, LA, U.S.A, December
-
Hayes J. Policy-based authentication and authorization: secure access to the network infrastructure. 16th Annual Computer Security Applications Conference, New Orleans, LA, U.S.A., December 2000; 328-333.
-
(2000)
16th Annual Computer Security Applications Conference
, pp. 328-333
-
-
Hayes, J.1
-
50
-
-
0035271246
-
Authenticated ad hoc routing at the link layer for mobile systems
-
Binkley J. Authenticated ad hoc routing at the link layer for mobile systems. Wireless Networks 2001; 7(2):139-145.
-
(2001)
Wireless Networks
, vol.7
, Issue.2
, pp. 139-145
-
-
Binkley, J.1
-
51
-
-
0031611417
-
Applying the composition principle to verify a hierarchy of security servers
-
Big Island, HI, U.S.A, January
-
Heckman MR, Levitt KN. Applying the composition principle to verify a hierarchy of security servers. Proceedings of the 31st Hawaii International Conference on System Sciences, vol. 3, Big Island, HI, U.S.A., January 1998; 338-347.
-
(1998)
Proceedings of the 31st Hawaii International Conference on System Sciences
, vol.3
, pp. 338-347
-
-
Heckman, M.R.1
Levitt, K.N.2
-
52
-
-
0034590150
-
A novel authentication scheme for ad hoc networks
-
Chicago, IL, U.S.A, September
-
Venkatraman L, Agrawal DP. A novel authentication scheme for ad hoc networks. Proceedings of IEEE Conference on Wireless Communication and Networking, vol. 3, Chicago, IL, U.S.A., September 2000; 1268-1293.
-
(2000)
Proceedings of IEEE Conference on Wireless Communication and Networking
, vol.3
, pp. 1268-1293
-
-
Venkatraman, L.1
Agrawal, D.P.2
-
53
-
-
84860518634
-
Personal security environment on Palm PDA
-
New Orleans, LA, U.S.A, December
-
Freudenthal M, Heiberg S, Willemson J. Personal security environment on Palm PDA. 16th Annual Computer Security Applications Conference, New Orleans, LA, U.S.A., December 2000; 159-167.
-
(2000)
16th Annual Computer Security Applications Conference
, pp. 159-167
-
-
Freudenthal, M.1
Heiberg, S.2
Willemson, J.3
-
54
-
-
34547545411
-
-
Palm, Inc
-
Palm, Inc., 2005, http://www.palm.com
-
(2005)
-
-
-
55
-
-
0034823295
-
Graph-based authentication of digital streams
-
Oakland, CA, U.S.A, May
-
Miner S, Staddon J. Graph-based authentication of digital streams, Proceedings of 2001 IEEE Symposium on Security and Privacy, Oakland, CA, U.S.A., May 2001; 232-246.
-
(2001)
Proceedings of 2001 IEEE Symposium on Security and Privacy
, pp. 232-246
-
-
Miner, S.1
Staddon, J.2
-
56
-
-
85180799647
-
Authenticating streamed data in the presence of random packet loss
-
San Diego, CA, U.S.A
-
Golle P, Modaduge N. Authenticating streamed data in the presence of random packet loss. ISOC Network and Distributed System Security Symposium, San Diego, CA, U.S.A., 2001; 13-22.
-
(2001)
ISOC Network and Distributed System Security Symposium
, pp. 13-22
-
-
Golle, P.1
Modaduge, N.2
-
57
-
-
0017930809
-
A method for obtaining signatures and public-key cryptosystems
-
Rivest R, Shamir A, Adleman L. A method for obtaining signatures and public-key cryptosystems. Communications of the ACM 1978; 21(2):120-126.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
-
58
-
-
0033718255
-
Using model checking to analyze network vulnerabilities
-
Berkeley, CA, U.S.A, May
-
Ritchey RW, Ammann P. Using model checking to analyze network vulnerabilities. Proceedings of IEEE Symposium on Security and Privacy, Berkeley, CA, U.S.A., May 2000; 156-165.
-
(2000)
Proceedings of IEEE Symposium on Security and Privacy
, pp. 156-165
-
-
Ritchey, R.W.1
Ammann, P.2
-
59
-
-
0025545236
-
A multilevel security policy model for network
-
San Francisco, CA, U.S.A
-
Varadharajan V. A multilevel security policy model for network. Ninth Annual Joint Conference of the IEEE Computer and Communication Societies, vol. 2, San Francisco, CA, U.S.A., 1990; 710-718.
-
(1990)
Ninth Annual Joint Conference of the IEEE Computer and Communication Societies
, vol.2
, pp. 710-718
-
-
Varadharajan, V.1
-
61
-
-
33847273536
-
A new secure routing protocol to defend byzantine attacks for ad hoc networks
-
Kuala Lumpur, Malaysia, 16-18 November
-
Yu M, Kulkarni S, Lau P. A new secure routing protocol to defend byzantine attacks for ad hoc networks. IEEE International Conference on Networks (ICON), vol. 2, Kuala Lumpur, Malaysia, 16-18 November 2005; 1126-1131.
-
(2005)
IEEE International Conference on Networks (ICON)
, vol.2
, pp. 1126-1131
-
-
Yu, M.1
Kulkarni, S.2
Lau, P.3
-
66
-
-
34547504981
-
-
IPv6 Organization
-
IPv6 Organization, 2005. http://www.ipv6.org
-
(2005)
-
-
|