-
1
-
-
4544259841
-
SECTOR: Secure tracking of node encounters in multi-hop wireless networks
-
S. Capkun, L. Buttyan, and J. Hubaux, " SECTOR: Secure tracking of node encounters in multi-hop wireless networks," in Proceedings of the ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 21-32, 2003.
-
(2003)
Proceedings of the ACM Workshop on Security of Ad Hoc and Sensor Networks
, pp. 21-32
-
-
Capkun, S.1
Buttyan, L.2
Hubaux, J.3
-
3
-
-
84904904836
-
A secure routing protocol for ad hoc networks
-
B. Dahill, B. N. Levine, E. Royer, and C. Shields, " A secure routing protocol for ad hoc networks," in Proceedings of the International Conference on Network Protocols (ICNP), pp. 78-87, 2002.
-
(2002)
Proceedings of the International Conference on Network Protocols (ICNP)
, pp. 78-87
-
-
Dahill, B.1
Levine, B.N.2
Royer, E.3
Shields, C.4
-
4
-
-
34147120474
-
A note on two problems in connection with graphs
-
E. W. Dijkstra, " A note on two problems in connection with graphs," Numerische Mathematik, vol. 1, pp. 269-271, 1959.
-
(1959)
Numerische Mathematik
, vol.1
, pp. 269-271
-
-
Dijkstra, E.W.1
-
5
-
-
0036957315
-
Ariadne: A secure on-demand routing protocol for ad hoc networks
-
Y. C. Hu, A. Perrig, and D. B. Johnson, " Ariadne: A secure on-demand routing protocol for ad hoc networks," in Proceedings of the Eighth Annual International Conference on Mobile Computing and Networking (MobiCom), pp. 12-23, 2002.
-
(2002)
Proceedings of the Eighth Annual International Conference on Mobile Computing and Networking (MobiCom)
, pp. 12-23
-
-
Hu, Y.C.1
Perrig, A.2
Johnson, D.B.3
-
7
-
-
0041973497
-
Packet leashes: A defense against wormhole attacks in wireless networks
-
Y. C. Hu, A. Perrig, and D. B. Johnson, " Packet leashes: A defense against wormhole attacks in wireless networks," in Proceedings of the Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies, vol. 3, pp. 1976-1986, 2003.
-
(2003)
Proceedings of the Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies
, vol.3
, pp. 1976-1986
-
-
Hu, Y.C.1
Perrig, A.2
Johnson, D.B.3
-
9
-
-
33646424563
-
The dynamic source routing protocol for mobile ad hoc networks (DSR)
-
Internet Draft (work in progress)
-
D. B. Johnson, D. A. Maltz, and Y. Hu, " The dynamic source routing protocol for mobile ad hoc networks (DSR)," IETF MANET, Internet Draft (work in progress), 2003.
-
(2003)
IETF MANET
-
-
Johnson, D.B.1
Maltz, D.A.2
Hu, Y.3
-
12
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
S. Marti, T. Giuli, K. Lai, and M. Baker, " Mitigating routing misbehavior in mobile ad hoc networks," in Proceedings of the Sixth Annual International Conference on Mobile Computing and Networking (MobiCom) , pp. 255-265, 2000.
-
(2000)
Proceedings of the Sixth Annual International Conference on Mobile Computing and Networking (MobiCom)
, pp. 255-265
-
-
Marti, S.1
Giuli, T.2
Lai, K.3
Baker, M.4
-
14
-
-
84874835552
-
-
Department of Computer Science, Rice University
-
A. Perrig, Y. C. Hu, and D. B. Johnson, Wormhole Protection in Wireless Ad Hoc Networks, Technical Report TR01-384, Department of Computer Science, Rice University, 2001.
-
(2001)
Wormhole Protection in Wireless Ad Hoc Networks, Technical Report TR01-384
-
-
Perrig, A.1
Hu, Y.C.2
Johnson, D.B.3
-
15
-
-
33646421331
-
Secure routing protocols for mobile ad-hoc wireless networks
-
Springer
-
A. A. Pirzada and C. McDonald, " Secure routing protocols for mobile ad-hoc wireless networks," in Advanced Wired and Wireless Networks, T. A. Wysocki, A. Dadej, and B. J. Wysocki, editors, pp. 57-80, Springer, 2004.
-
(2004)
Advanced Wired and Wireless Networks, T. A. Wysocki, A. Dadej, and B. J. Wysocki, editors
, pp. 57-80
-
-
Pirzada, A.A.1
McDonald, C.2
-
19
-
-
0032621035
-
A review of current routing protocols for ad hoc mobile wireless networks
-
E. M. Royer and C. K. Toh, " A review of current routing protocols for ad hoc mobile wireless networks," IEEE Personal Communications Magazine, vol. 6, no. 2, pp. 46-55, 1999.
-
(1999)
IEEE Personal Communications Magazine
, vol.6
, Issue.2
, pp. 46-55
-
-
Royer, E.M.1
Toh, C.K.2
-
22
-
-
0034858411
-
Hidden terminal jamming problems in IEEE 802.11 mobile ad hoc networks
-
C. Ware, T. Wysocki, and J. Chicharo, " Hidden terminal jamming problems in IEEE 802.11 mobile ad hoc networks," in Proceedings of the IEEE International Conference on Communications (ICC), vol. 1, pp. 261-265, 2001.
-
(2001)
Proceedings of the IEEE International Conference on Communications (ICC)
, vol.1
, pp. 261-265
-
-
Ware, C.1
Wysocki, T.2
Chicharo, J.3
-
23
-
-
0036998591
-
Inter-relationships of performance metrics and system parameters in mobile ad hoc networks
-
W. H. Yuen and R. D. Yates, " Inter-relationships of performance metrics and system parameters in mobile ad hoc networks," in Proceedings of the IEEE MILCOM, vol. 1, pp. 519-524, 2002.
-
(2002)
Proceedings of the IEEE MILCOM
, vol.1
, pp. 519-524
-
-
Yuen, W.H.1
Yates, R.D.2
|