-
1
-
-
85106319926
-
A performance comparison of multi-hop wireless ad hoc network routing protocols
-
Josh Broch, David A. Maltz, David B. Johnson, Yih-Chun Hu, and Jorjeta Jetcheva. A performance comparison of multi-hop wireless ad hoc network routing protocols. In Proceedings of Fourth ACM/IEEE Conference on Mobile Computing and Networking (MobiCom), pages 85-97, 1998.
-
(1998)
Proceedings of Fourth ACM/IEEE Conference on Mobile Computing and Networking (MobiCom)
, pp. 85-97
-
-
Broch, J.1
Maltz, D.A.2
Johnson, D.B.3
Hu, Y.4
Jetcheva, J.5
-
2
-
-
0035015898
-
Investigating the energy consumption of a wireless network interface in an ad hoc networking environment
-
Laura M. Feeney and Martin Nilsson. Investigating the energy consumption of a wireless network interface in an ad hoc networking environment. In Proceedings of IEEE INFOCOM, 2001.
-
(2001)
Proceedings of IEEE INFOCOM
-
-
Feeney, L.M.1
Nilsson, M.2
-
4
-
-
17444426121
-
Ariadne: A secure on-demand routing protocol for ad hoc networks
-
Yih-Chun Hu, Adrian Perrig, and David B. Johnson. Ariadne: A secure on-demand routing protocol for ad hoc networks. Wireless Networks, 11(1-2):21-38, 2005.
-
(2005)
Wireless Networks
, vol.11
, Issue.1-2
, pp. 21-38
-
-
Hu, Y.1
Perrig, A.2
Johnson, D.B.3
-
5
-
-
0000629443
-
Dynamic source routing in ad hoc wireless networks
-
Imielinski and Korth, editors, Kluwer Academic Publishers
-
David B Johnson and David A Maltz. Dynamic source routing in ad hoc wireless networks. In Imielinski and Korth, editors, Mobile Computing, pages 153-181. Kluwer Academic Publishers, 1996.
-
(1996)
Mobile Computing
, pp. 153-181
-
-
Johnson, D.B.1
Maltz, D.A.2
-
6
-
-
0033357103
-
-
Z.J. Haas L. Zhou. Securing ad hoc networks. IEEE Network Magazine, 13(6), Dec 1999.
-
Z.J. Haas L. Zhou. Securing ad hoc networks. IEEE Network Magazine, 13(6), Dec 1999.
-
-
-
-
10
-
-
0032621035
-
A review of current routing protocols for ad-hoc mobile wireless networks
-
E. Royer and C. Toh. A review of current routing protocols for ad-hoc mobile wireless networks. IEEE Personal Communications, 1999.
-
(1999)
IEEE Personal Communications
-
-
Royer, E.1
Toh, C.2
-
11
-
-
26844569805
-
-
S. Sarafljanovic and J.Y. Le Boudec. An artificial immune system approach with secondary response for misbehavior detection in mobile ad-hoc networks. IEEE Transactions on Neural Networks, 16(5), Sep 2005.
-
S. Sarafljanovic and J.Y. Le Boudec. An artificial immune system approach with secondary response for misbehavior detection in mobile ad-hoc networks. IEEE Transactions on Neural Networks, 16(5), Sep 2005.
-
-
-
-
12
-
-
34548081082
-
-
W. Stallings. Cryptography and Network Security -Principles and Practices. Pearson Educ., Inc., 2003.
-
W. Stallings. Cryptography and Network Security -Principles and Practices. Pearson Educ., Inc., 2003.
-
-
-
-
14
-
-
32444432940
-
Beeadhoc: An energy efficient routing algorithm for mobile ad hoc networks inspired by bee behavior
-
H.F. Wedde, M. Farooq, T. Pannenbaecker, B. Vogel, C. Mueller, J. Meth, and R. Jeruschkat. Beeadhoc: an energy efficient routing algorithm for mobile ad hoc networks inspired by bee behavior. In GECCO, pages 153-160, 2005.
-
(2005)
GECCO
, pp. 153-160
-
-
Wedde, H.F.1
Farooq, M.2
Pannenbaecker, T.3
Vogel, B.4
Mueller, C.5
Meth, J.6
Jeruschkat, R.7
-
15
-
-
33750241323
-
Beehiveais: A simple, efficient, scalable and secure routing framework inspired by artificial immune systems
-
H.F. Wedde, C. Timm, and M. Farooq. Beehiveais: A simple, efficient, scalable and secure routing framework inspired by artificial immune systems. In PPSN, pages 623-632, 2006.
-
(2006)
PPSN
, pp. 623-632
-
-
Wedde, H.F.1
Timm, C.2
Farooq, M.3
-
16
-
-
33745781835
-
Beehiveguard: A step towards secure nature inspired routing algorithms
-
H.F. Wedde, C. Timm, and M. Farooq. Beehiveguard: A step towards secure nature inspired routing algorithms. In EvoWorkshops, pages 243-254, 2006.
-
(2006)
EvoWorkshops
, pp. 243-254
-
-
Wedde, H.F.1
Timm, C.2
Farooq, M.3
|