-
1
-
-
85032668813
-
MACAW: A Media Access Protocol for Wireless LANs
-
V. Bharghavan, A. Demers, S. Shenker, and L. Zhang, "MACAW: A Media Access Protocol for Wireless LANs," Proceedings of the ACM SIGCOMM Conference on Communications Architectures, Protocols and Applications, vol. 24, issue 4, pp. 212-225, 1994.
-
(1994)
Proceedings of the ACM SIGCOMM Conference on Communications Architectures, Protocols and Applications
, vol.24
, Issue.4
, pp. 212-225
-
-
Bharghavan, V.1
Demers, A.2
Shenker, S.3
Zhang, L.4
-
3
-
-
33144479525
-
SCAN: Self-organized network-layer security in mobile ad hoc networks
-
February
-
H. Yang, J. Shu, X. Meng, and S. Lu, "SCAN: Self-organized network-layer security in mobile ad hoc networks," IEEE Journal on Selected Areas in Communications, vol. 24, issue 2, pp. 261-273, February 2006.
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, Issue.2
, pp. 261-273
-
-
Yang, H.1
Shu, J.2
Meng, X.3
Lu, S.4
-
4
-
-
33144490460
-
A framework for misuse detection in ad hoc networks - part I
-
February
-
D. Subhadrabandhu, S. Sarkar, and F. Anjum, "A framework for misuse detection in ad hoc networks - part I," IEEE Journal on Selected Areas in Communications, vol. 24, pp. 274-289, February 2006.
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, pp. 274-289
-
-
Subhadrabandhu, D.1
Sarkar, S.2
Anjum, F.3
-
5
-
-
33144490460
-
A framework for misuse detection in ad hoc networks - part II
-
February
-
D. Subhadrabandhu, S. Sarkar, and F. Anjum, "A framework for misuse detection in ad hoc networks - part II," IEEE Journal on Selected Areas in Communications, vol. 24, pp. 290-304, February 2006.
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, pp. 290-304
-
-
Subhadrabandhu, D.1
Sarkar, S.2
Anjum, F.3
-
10
-
-
38049070870
-
Secure ad hoc on-demand distance vector (SAODV) routing
-
Internet Draft, IETF Mobile Ad Hoc Networking Working Group, February
-
M. Guerrero-Zapata, "Secure ad hoc on-demand distance vector (SAODV) routing," Internet Draft, IETF Mobile Ad Hoc Networking Working Group, February 2005, draftguerrero-manet-saodv-05.txt
-
(2005)
draftguerrero-manet-saodv-05.txt
-
-
Guerrero-Zapata, M.1
-
12
-
-
85031307530
-
Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers
-
C. E. Perkins, and P. Bhagwat, "Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers," Proceedings of the ACM SIGCOMM Conference on Communications Architectures, Protocols and Applications, vol. 24, issue 4, pp. 234-244, 1994.
-
(1994)
Proceedings of the ACM SIGCOMM Conference on Communications Architectures, Protocols and Applications
, vol.24
, Issue.4
, pp. 234-244
-
-
Perkins, C.E.1
Bhagwat, P.2
-
14
-
-
0742292815
-
Ad hoc on-demand distance vector (AODV) routing
-
RFC, July, available at
-
C. E. Perkins, "Ad hoc on-demand distance vector (AODV) routing," Request For Comments (RFC) 3561, July 2003, available at: http://www.ietf.org/rfc/rfc3561.txt
-
(2003)
Request For Comments
, pp. 3561
-
-
Perkins, C.E.1
-
15
-
-
0003597247
-
-
Internet Draft, IETF MANET Working Group, July, draft- ietf-manet-dsr-10.txt
-
D. B. Johnson, D. A Maltz, and Y. C. Hu, "The dynamic source routing protocol for mobile ad hoc networks," Internet Draft, IETF MANET Working Group, July 2004, draft- ietf-manet-dsr-10.txt
-
(2004)
The dynamic source routing protocol for mobile ad hoc networks
-
-
Johnson, D.B.1
Maltz, D.A.2
Hu, Y.C.3
-
17
-
-
0033690336
-
Efficient authentication and signing of multicast streams over lossy channels
-
May
-
Perrig, R. Canetti, J. D. Tygar, and D. Song, "Efficient authentication and signing of multicast streams over lossy channels," Proceedings of the IEEE Symposium on Security and Privacy, pp. 56-73, May 2000.
-
(2000)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 56-73
-
-
Perrig1
Canetti, R.2
Tygar, J.D.3
Song, D.4
-
20
-
-
33144467802
-
Secure data communication in mobile ad hoc networks
-
February
-
P. Papadimitratos, and Z. Haas, "Secure data communication in mobile ad hoc networks," IEEE Journal on Selected Areas in Communications, vol. 24, issue 2, pp. 343-356, February 2006.
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, Issue.2
, pp. 343-356
-
-
Papadimitratos, P.1
Haas, Z.2
-
22
-
-
0033357103
-
Securing ad hoc networks
-
November/December
-
L. Zhou, and Z. Haas, "Securing ad hoc networks," IEEE Network Magazine, vol. 13, issue 6, November/December 1999.
-
(1999)
IEEE Network Magazine
, vol.13
, Issue.6
-
-
Zhou, L.1
Haas, Z.2
-
24
-
-
0842331554
-
Detecting malicious packet dropping using statistically regular traffic patterns in multihop wireless networks that are not bandwidth limited
-
R. Rao, and G. Kesidis, "Detecting malicious packet dropping using statistically regular traffic patterns in multihop wireless networks that are not bandwidth limited," Proceedings of the 2003 IEEE Global Telecommunications Conference, vol.5, pp. 2957-2961, 2003.
-
(2003)
Proceedings of the 2003 IEEE Global Telecommunications Conference
, vol.5
, pp. 2957-2961
-
-
Rao, R.1
Kesidis, G.2
-
25
-
-
0031703272
-
Detecting disruptive routers: A distributed network monitoring approach
-
May
-
K. A. Bradley, S. Cheung, N. Puketza, B. Mukherjee, and R. A. Olsson, "Detecting disruptive routers: a distributed network monitoring approach," Proceedings of the 1998 Symposium on Security and Privacy, pp. 115-124, May 1998.
-
(1998)
Proceedings of the 1998 Symposium on Security and Privacy
, pp. 115-124
-
-
Bradley, K.A.1
Cheung, S.2
Puketza, N.3
Mukherjee, B.4
Olsson, R.A.5
|