-
1
-
-
0033892676
-
Performance comparison of two on-demand routing protocols for ad hoc networks
-
Das S., Perkins C., and Royer E. Performance comparison of two on-demand routing protocols for ad hoc networks. IEEE Infocom (2000) 3-12
-
(2000)
IEEE Infocom
, pp. 3-12
-
-
Das, S.1
Perkins, C.2
Royer, E.3
-
2
-
-
0000629443
-
Dynamic source routing in ad hoc wireless networks
-
Johnson D., and Maltz D. Dynamic source routing in ad hoc wireless networks. Mobile Computing, Kluwer (1996) 153-181
-
(1996)
Mobile Computing, Kluwer
, pp. 153-181
-
-
Johnson, D.1
Maltz, D.2
-
3
-
-
85116486060
-
Location-aided routing in mobile ad hoc networks
-
Ko Y., and Vaidya N. Location-aided routing in mobile ad hoc networks. ACM Mobicom (1998) 66-75
-
(1998)
ACM Mobicom
, pp. 66-75
-
-
Ko, Y.1
Vaidya, N.2
-
5
-
-
0032046534
-
Maintaining strong cache consistency in the World Wide Web
-
Cao P., and Liu C. Maintaining strong cache consistency in the World Wide Web. IEEE Transactions on Computers (1998) 445-457
-
(1998)
IEEE Transactions on Computers
, pp. 445-457
-
-
Cao, P.1
Liu, C.2
-
6
-
-
0028447376
-
Sleepers and workaholics: caching strategies for mobile environments
-
Barbara D., and Imielinski T. Sleepers and workaholics: caching strategies for mobile environments. ACM SIGMOD (1994) 1-12
-
(1994)
ACM SIGMOD
, pp. 1-12
-
-
Barbara, D.1
Imielinski, T.2
-
7
-
-
0034543872
-
-
G. Cao, A scalable low-latency cache invalidation strategy for mobile environments, ACM Mobicom, 2000.
-
-
-
-
8
-
-
0035789229
-
The quest for security in mobile ad hoc networks
-
Hubaux H., Buttyan L., and Capkun S. The quest for security in mobile ad hoc networks. ACM MobiHoc (2001) 146-155
-
(2001)
ACM MobiHoc
, pp. 146-155
-
-
Hubaux, H.1
Buttyan, L.2
Capkun, S.3
-
9
-
-
0033357103
-
Securing ad hoc networks
-
Zhou L., and Haas Z. Securing ad hoc networks. IEEE Network 13 6 (1999) 24-30
-
(1999)
IEEE Network
, vol.13
, Issue.6
, pp. 24-30
-
-
Zhou, L.1
Haas, Z.2
-
10
-
-
37549064152
-
-
K. Sanzgiri, B. Dahill, B. Levine, C. Shields, E. Belding-Royer, A secure routing protocol for ad hoc networks, in: IEEE Int'l Conf. on Network Protocols (ICNP), November 2002.
-
-
-
-
11
-
-
37549025590
-
-
Y. Hu, A. Perrig, D. Johnson, Ariadne: a secure on-demand routing protocol for wireless ad hoc networks, ACM Mobicom, September 2002.
-
-
-
-
12
-
-
0033690336
-
-
A. Perrig, R. Canetti, J. Tygar, D. Song, Efficient authentication and signing of multicast streams over lossy channels, in: IEEE Symposium on Security and Privacy, May 2000.
-
-
-
-
13
-
-
0041973497
-
-
Y. Hu, A. Perrig, D. Johnson, Packet leashes: a defense against wormhole attacks in wireless ad hoc networks, in: IEEE Infocom, April 2003.
-
-
-
-
14
-
-
85177500467
-
-
S. Marti, T. Giuli, K. Lai, M. Baker, Mitigating routing misbehavior in mobile ad hoc networks, in: ACM MobiCom, August 2000.
-
-
-
-
15
-
-
2442597363
-
Performance analysis of the CONFIDANT Protocol: Cooperation Of Nodes Fairness In Dynamic Adhoc NeTworks
-
Buchegger S., and Boudec J.-Y. Performance analysis of the CONFIDANT Protocol: Cooperation Of Nodes Fairness In Dynamic Adhoc NeTworks. ACM Mobihoc (2002) 80-91
-
(2002)
ACM Mobihoc
, pp. 80-91
-
-
Buchegger, S.1
Boudec, J.-Y.2
-
16
-
-
0036980295
-
-
H. Yang, X. Meng, S. Lu, Self-organized network-layer security in mobile ad hoc networks, in: ACM Workshop on Wireless Security, August 2002.
-
-
-
-
18
-
-
0034546898
-
Intrusion detection in wireless ad-hoc networks
-
Zhang Y., and Lee W. Intrusion detection in wireless ad-hoc networks. ACM Mobicom Aug. (2000) 275-283
-
(2000)
ACM Mobicom
, Issue.Aug
, pp. 275-283
-
-
Zhang, Y.1
Lee, W.2
-
19
-
-
37549062796
-
-
P. Kyasanur, N. Vaidya, Detection and handling of MAC layer misbehavior in wireless networks, Technical Report, UIUC, August 2002.
-
-
-
-
20
-
-
37549012352
-
-
The CMU Monarch Project, The CMU Monarch Projects Wireless and Mobility Extensions to ns. , October 1999.
-
-
-
|