-
2
-
-
48049107779
-
-
CCSd, CNRS, INRIA, Rocquencourt
-
Clausen T, Laouiti A, Muhlethaler P, Raffo D, Adjih C (2005) Securing the OLSR routing protocol with or without compromised nodes in the network, HAL - CCSd - CNRS, INRIA - Rocquencourt.
-
(2005)
Securing the OLSR routing protocol with or without compromised nodes in the network, HAL
-
-
Clausen, T.1
Laouiti, A.2
Muhlethaler, P.3
Raffo, D.4
Adjih, C.5
-
3
-
-
36749019893
-
-
Clausen T, Jacquet P (2003) IETF RFC-3626: Optimized Link State Routing Protocol OLSR.
-
Clausen T, Jacquet P (2003) IETF RFC-3626: Optimized Link State Routing Protocol OLSR.
-
-
-
-
5
-
-
0003839495
-
-
PhD Thesis. Department of Mathematics and Computer Science, University of Stirling
-
Marsh S (1994) Formalising Trust as a Computational Concept, PhD Thesis. Department of Mathematics and Computer Science, University of Stirling.
-
(1994)
Formalising Trust as a Computational Concept
-
-
Marsh, S.1
-
7
-
-
35148834491
-
-
PhD Thesis. IC School of Computer and Communication Sciences, Lausanne university
-
Buchegger S (2004) Coping with Misbehavior in Mobile Ad-hoc Networks, PhD Thesis. IC School of Computer and Communication Sciences, Lausanne university.
-
(2004)
Coping with Misbehavior in Mobile Ad-hoc Networks
-
-
Buchegger, S.1
-
8
-
-
33645561073
-
A Shared Secret-based Algorithm for Securing the OLSR Routing Protocol
-
Numbers 2-3, pp
-
Fourati A, Al Agha K (2006) A Shared Secret-based Algorithm for Securing the OLSR Routing Protocol. Springer Netherlands, Telecommunication Systems, Volume 31, Numbers 2-3, pp. 213-226.
-
(2006)
Springer Netherlands, Telecommunication Systems
, vol.31
, pp. 213-226
-
-
Fourati, A.1
Al Agha, K.2
-
9
-
-
33745877154
-
Trust-Based Route Selection in Dynamic Source Routing
-
Springer, Pisa, Italy 2006
-
Jensen C D, Connell P O (2006) Trust-Based Route Selection in Dynamic Source Routing. In: Trust Management, 4th International Conference, iTrust 2006. Springer, Volume 3986/2006, pp.150-163, Pisa, Italy.
-
(2006)
Trust Management, 4th International Conference, iTrust
, vol.3986
, pp. 150-163
-
-
Jensen, C.D.1
Connell, P.O.2
-
11
-
-
2442519150
-
Location-centric Isolation of Misbehavior and Trust Routing in Energy-constrained Sensor Networks. IEEE International Performance, Computing
-
Tanachaiwiwat S, Dave P, Bhindwale R, Helmy A (2004) Location-centric Isolation of Misbehavior and Trust Routing in Energy-constrained Sensor Networks. IEEE International Performance, Computing, and Communications Conference (IPCCC), pp. 463-469.
-
(2004)
and Communications Conference (IPCCC)
, pp. 463-469
-
-
Tanachaiwiwat, S.1
Dave, P.2
Bhindwale, R.3
Helmy, A.4
-
12
-
-
33847008265
-
Enhanced Reputation Mechanism for Mobile Ad Hoc Networks
-
Oxford, UK
-
Liu J, Issarny V (2004) Enhanced Reputation Mechanism for Mobile Ad Hoc Networks. In: Trust Management. 2nd International Conference, iTrust 2004. Springer, Volume 2995/2004, pp. 48-62, Oxford, UK.
-
(2004)
Trust Management. 2nd International Conference, iTrust 2004. Springer
, vol.2995
, pp. 48-62
-
-
Liu, J.1
Issarny, V.2
-
15
-
-
36749031402
-
On the Vulnerabilities and Protection of Mobile Ad Hoc Network Routing Protocols
-
New Jersey, USA
-
Puttini R S, Mé L, Sousa Jr R T (2004) On the Vulnerabilities and Protection of Mobile Ad Hoc Network Routing Protocols. In: Proceedings of the 3rd International Conference on Networking ICN'2004. IEEE, pp. 676-684, New Jersey, USA.
-
(2004)
Proceedings of the 3rd International Conference on Networking ICN'2004. IEEE
, pp. 676-684
-
-
Puttini, R.S.1
Mé, L.2
Sousa Jr, R.T.3
-
16
-
-
33750440529
-
A Framework for Security Analysis of Mobile Wireless Networks
-
Nanz S, Hankin C (2006) A Framework for Security Analysis of Mobile Wireless Networks. Theoretical Computer Science, Volume 367, pp. 203-227.
-
(2006)
Theoretical Computer Science
, vol.367
, pp. 203-227
-
-
Nanz, S.1
Hankin, C.2
-
18
-
-
84976828623
-
-
New York, USA
-
Johnson D B (1973) A Note on Dijkstra's Shortest Path Algorithm, Journal of the ACM, Volume 20, pp. 385-388, New York, USA.
-
(1973)
A Note on Dijkstra's Shortest Path Algorithm, Journal of the ACM
, vol.20
, pp. 385-388
-
-
Johnson, D.B.1
|