-
2
-
-
0742292815
-
Ad hoc on-demand distance-vector routing (AODV)
-
Perkins C et al. Ad hoc on-demand distance-vector routing (AODV), IETF Draft, 2001.
-
(2001)
IETF Draft
-
-
Perkins, C.1
-
4
-
-
0034546898
-
Intrusion detection in wireless ad-hoc networks
-
Boston, MA, U.S.A
-
Zhang Y, Lee W. Intrusion detection in wireless ad-hoc networks. Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, Boston, MA, U.S.A., 2000; 275-283.
-
(2000)
Proceedings of the 6th Annual International Conference on Mobile Computing and Networking
, pp. 275-283
-
-
Zhang, Y.1
Lee, W.2
-
6
-
-
0035704362
-
Providing robust and ubiquitous security support for mobile ad hoc networks
-
Riverside, U.S.A
-
Kong J et al. Providing robust and ubiquitous security support for mobile ad hoc networks. IEEE International Conference on Network Protocols (ICNP), Riverside, U.S.A., 2001.
-
(2001)
IEEE International Conference on Network Protocols (ICNP)
-
-
Kong, J.1
-
7
-
-
0242696170
-
ANODR: ANonymous On Demand Routing with untraceable routes for mobile ad-hoc networks
-
Maryland, U.S.A, 1-3 June
-
Kong J, Hong X. ANODR: ANonymous On Demand Routing with untraceable routes for mobile ad-hoc networks. Fourth International ACM Symposium on Mobile Ad Hoc Networking and Computing, (MobiHoc), Maryland, U.S.A., 1-3 June 2003; 291-302.
-
(2003)
Fourth International ACM Symposium on Mobile Ad Hoc Networking and Computing, (MobiHoc)
, pp. 291-302
-
-
Kong, J.1
Hong, X.2
-
8
-
-
1842794475
-
Intercepting mobile communications: The insecurity of 802.11
-
Borisov N, Goldberg I, Wagner D. Intercepting mobile communications: the insecurity of 802.11. ACM MOBICON, 2001.
-
(2001)
ACM MOBICON
-
-
Borisov, N.1
Goldberg, I.2
Wagner, D.3
-
9
-
-
37249066337
-
Packet leashes: A defense against wormhole attacks in wireless networks
-
New York, U.S.A, 23-27 June
-
Hu Y, Perrig A, Johnson D. Packet leashes: a defense against wormhole attacks in wireless networks. Twenty-first Annual IEEE Conference on Computer Communications (INFOCOM), New York, U.S.A., 23-27 June 2002.
-
(2002)
Twenty-first Annual IEEE Conference on Computer Communications (INFOCOM)
-
-
Hu, Y.1
Perrig, A.2
Johnson, D.3
-
10
-
-
0035365149
-
Self-organization in mobile ad-hoc networks: The approach of terminodes
-
Blazevic L et al. Self-organization in mobile ad-hoc networks: the approach of terminodes. IEEE Communications Magazine 2001; 39(6): 166-174.
-
(2001)
IEEE Communications Magazine
, vol.39
, Issue.6
, pp. 166-174
-
-
Blazevic, L.1
-
13
-
-
0242527360
-
Path set selection in mobile ad hoc networks
-
Lausanne, Switzerland, 9-11 June
-
Papadimitratos P, Haas ZJ, Sirer EG. Path set selection in mobile ad hoc networks. Third ACM International Symposium on Mobile Ad Hoc Networking and Computing, Lausanne, Switzerland, 9-11 June 2002.
-
(2002)
Third ACM International Symposium on Mobile Ad Hoc Networking and Computing
-
-
Papadimitratos, P.1
Haas, Z.J.2
Sirer, E.G.3
-
19
-
-
84889956484
-
Using the Fluhrer, Martin, and Shamir attack to break WEP
-
California, U.S.A, 6-8 February
-
Stubblefield A, Ioannidis J, Rubin A. Using the Fluhrer, Martin, and Shamir attack to break WEP. Network and Distributed System Security Symposium (NDSS), California, U.S.A., 6-8 February 2002.
-
(2002)
Network and Distributed System Security Symposium (NDSS)
-
-
Stubblefield, A.1
Ioannidis, J.2
Rubin, A.3
-
21
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
Chaum D. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM 1981; 24(2):84-88.
-
(1981)
Communications of the ACM
, vol.24
, Issue.2
, pp. 84-88
-
-
Chaum, D.1
-
23
-
-
0035178273
-
Security enhancements in AODV protocol for wireless ad hoc networks
-
Atlanta, U.S.A
-
Bhargava S, Agrawal DP. Security enhancements in AODV protocol for wireless ad hoc networks. Vehicular Technology Conference, 2001, vol. 4, Atlanta, U.S.A., 2001; 2143-2147.
-
(2001)
Vehicular Technology Conference, 2001
, vol.4
, pp. 2143-2147
-
-
Bhargava, S.1
Agrawal, D.P.2
-
24
-
-
0242527339
-
Mobility helps security in ad hoc networks
-
Maryland, U.S.A, 1-3 June
-
Capkun S, Hubaux JP, Buttyan L. Mobility helps security in ad hoc networks. Fourth ACM International Symposium in Mobile Ad Hoc Networking and Computing (MobiHoc), Maryland, U.S.A., 1-3 June 2003; 46-56.
-
(2003)
Fourth ACM International Symposium in Mobile Ad Hoc Networking and Computing (MobiHoc)
, pp. 46-56
-
-
Capkun, S.1
Hubaux, J.P.2
Buttyan, L.3
-
25
-
-
0032621035
-
A review of current routing protocols for ad-hoc mobile wireless networks
-
Royer EM, Toh C-K. A review of current routing protocols for ad-hoc mobile wireless networks. IEEE Personal Communications Magazine 1999; 6(2):46-55.
-
(1999)
IEEE Personal Communications Magazine
, vol.6
, Issue.2
, pp. 46-55
-
-
Royer, E.M.1
Toh, C.-K.2
-
26
-
-
18944373619
-
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc network
-
Boukerche A. An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc network. Computer Communications 2005; 28(10):1193-1203.
-
(2005)
Computer Communications
, vol.28
, Issue.10
, pp. 1193-1203
-
-
Boukerche, A.1
|