-
3
-
-
0013046226
-
-
chapter 5, Addison-Wesley
-
D. Johnson, D. Maltz, and J. Broch. DSR The Dynamic Source Routing Protocol for Multihop Wireless Ad Hoc Networks, chapter 5, pages 139-172. Addison-Wesley, 2001.
-
(2001)
DSR The Dynamic Source Routing Protocol for Multihop Wireless Ad Hoc Networks
, pp. 139-172
-
-
Johnson, D.1
Maltz, D.2
Broch, J.3
-
4
-
-
38649140383
-
Bootstrapping security associations for routing in mobile ad-hoc networks
-
May
-
Rekesh Babu Bobba, Laurent Eschenauer, Virgil Gligor, and William Arbaugh. Bootstrapping security associations for routing in mobile ad-hoc networks, May 2002.
-
(2002)
-
-
Babu Bobba, R.1
Eschenauer, L.2
Gligor, V.3
Arbaugh, W.4
-
5
-
-
0035704362
-
Providing Robust and Ubiquitous Security Support for Wireless Mobile Networks
-
Jiejun Kong, Petros Zerfos, Haiyun Luo, Songwu Lu, and Lixia Zhang. Providing Robust and Ubiquitous Security Support for Wireless Mobile Networks. In Ninth Internation Conference on Network Protocols (ICNP'01), pages 251-260, 2001.
-
(2001)
Ninth Internation Conference on Network Protocols (ICNP'01)
, pp. 251-260
-
-
Kong, J.1
Zerfos, P.2
Luo, H.3
Lu, S.4
Zhang, L.5
-
7
-
-
11244269535
-
SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks
-
Y. Hu, D. Johnson, and A. Perrig. SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks. Ad Hoc Networks, 1:175-192, 2003.
-
(2003)
Ad Hoc Networks
, vol.1
, pp. 175-192
-
-
Hu, Y.1
Johnson, D.2
Perrig, A.3
-
9
-
-
5044238739
-
CORE: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks
-
Portoroz, Slovenia, 22 September
-
Michiardi, Pietro, Molva, and Refik. CORE: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In CMS'2002, Communication and Multimedia Security 2002 Conference, Portoroz, Slovenia, 22 September 2002.
-
(2002)
CMS'2002, Communication and Multimedia Security 2002 Conference
-
-
Michiardi, P.1
Molva2
Refik3
-
11
-
-
3042667172
-
Rushing attacks and defense in wireless ad hoc network routing protocols
-
Technical Report TR01384, Department of Computer Scince, Rice University, June
-
Y. Hu, A. Perrig, and D. Johnson. Rushing attacks and defense in wireless ad hoc network routing protocols. Technical Report TR01384, Department of Computer Scince, Rice University, June 2002.
-
(2002)
-
-
Hu, Y.1
Perrig, A.2
Johnson, D.3
-
12
-
-
0036286842
-
Video transport over ad-hoc networks using multiple paths
-
S. Lin, Y. Wang, S. Mao, and S. Panwar. Video transport over ad-hoc networks using multiple paths. In IEEE International Symposium on Circuits and Systems, volume 1, pages 57-60, 2002.
-
(2002)
IEEE International Symposium on Circuits and Systems
, vol.1
, pp. 57-60
-
-
Lin, S.1
Wang, Y.2
Mao, S.3
Panwar, S.4
-
13
-
-
0035209078
-
A qos-aware multi-path dynamic source routing protocol for wireless ad-hoc networks
-
R. Leung, J. Liu, E. Poon, A. Chan, and B. Li. Mp-dsr: A qos-aware multi-path dynamic source routing protocol for wireless ad-hoc networks. In Proceedings of 26th Annual IEEE Conference on Local Computer Networks (LCN'01), 2001.
-
(2001)
Proceedings of 26th Annual IEEE Conference on Local Computer Networks (LCN'01)
-
-
Leung, R.1
Liu, J.2
Poon, E.3
Chan, A.4
Mp-dsr, B.L.5
-
14
-
-
0034844688
-
Split multipath routing with maximally disjoint paths in ad hoc networks
-
S. Lee and M. Gerla. Split multipath routing with maximally disjoint paths in ad hoc networks. In Proceedings of the IEEE ICC, pages 3201-3205, 2001.
-
(2001)
Proceedings of the IEEE ICC
, pp. 3201-3205
-
-
Lee, S.1
Gerla, M.2
-
15
-
-
3042547159
-
Secure multipath communication in mobile ad hoc networks
-
02:405
-
Mike Burmester and Tri Van Le. Secure multipath communication in mobile ad hoc networks. itcc, 02:405, 2004.
-
(2004)
itcc
-
-
Burmester, M.1
Van Le, T.2
-
16
-
-
25144467845
-
Performance analysis of secure multipath routing protocols for mobile ad hoc networks
-
Douligeris C. Mavropodi R., Kotzanikolaou P. Performance analysis of secure multipath routing protocols for mobile ad hoc networks. WICC, 3510:269-278, 2005.
-
(2005)
WICC
, vol.3510
, pp. 269-278
-
-
Douligeris, C.1
Mavropodi, R.2
Kotzanikolaou, P.3
-
17
-
-
25144473813
-
Secure multipath routing for mobile ad hoc networks
-
00:89-96
-
Panayiotis Kotzanikolaou, Rosa Mavropodi, and Christos Douligeris. Secure multipath routing for mobile ad hoc networks. wons, 00:89-96, 2005.
-
(2005)
wons
-
-
Kotzanikolaou, P.1
Mavropodi, R.2
Douligeris, C.3
-
18
-
-
35048869579
-
Multipath routing in mobile ad hoc networks: Issues and challenges
-
Stephen Mueller, Rose P. Tsang, and Dipak Ghosal. Multipath routing in mobile ad hoc networks: Issues and challenges. Lecture Notes in Computer Science, 2965:209-234, 1 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.2965
, Issue.209-234
, pp. 1
-
-
Mueller, S.1
Tsang, R.P.2
Ghosal, D.3
-
19
-
-
0019634370
-
Password authentication with insecure communication
-
Leslie Lamport. Password authentication with insecure communication. Commun. ACM, 24(11):770-772, 1981.
-
(1981)
Commun. ACM
, vol.24
, Issue.11
, pp. 770-772
-
-
Lamport, L.1
-
21
-
-
2442582716
-
Secure ad hoc on-demand distance vector routing
-
Manel Guerrero Zapata. Secure ad hoc on-demand distance vector routing. SIGMOBILE Mob. Comput. Commun. Rev., 6(3): 106-107, 2002.
-
(2002)
SIGMOBILE Mob. Comput. Commun. Rev
, vol.6
, Issue.3
, pp. 106-107
-
-
Guerrero Zapata, M.1
-
22
-
-
84957626176
-
Proactive secret sharing or: How to cope with perpetual leakage
-
Amir Herzberg, Stanislaw Jarecki, Hugo Krawczyk, and Moti Yung. Proactive secret sharing or: How to cope with perpetual leakage. Lecture Notes in Computer Science, 963:339-352, 1995.
-
(1995)
Lecture Notes in Computer Science
, vol.963
, pp. 339-352
-
-
Herzberg, A.1
Jarecki, S.2
Krawczyk, H.3
Yung, M.4
-
24
-
-
7744238188
-
Wormhole protection in wireless ad hoc networks
-
Technical Report TR01-384, Department of Computer Science.Rice University
-
Adrian Perrig, Yih-Chun Hu, and David B. Johnson. Wormhole protection in wireless ad hoc networks. Technical Report TR01-384, Department of Computer Science.Rice University, 2001.
-
(2001)
-
-
Perrig, A.1
Hu, Y.-C.2
Johnson, D.B.3
-
25
-
-
4544314577
-
Admission control in peer-to-peer: Design and performance evaluation
-
New York, NY, USA, ACM Press
-
Nitesh Saxena, Gene Tsudik, and Jeong Hyun Yi. Admission control in peer-to-peer: design and performance evaluation. In SASN '03, pages 104-113, New York, NY, USA, 2003. ACM Press.
-
(2003)
SASN '03
, pp. 104-113
-
-
Saxena, N.1
Tsudik, G.2
Hyun Yi, J.3
-
26
-
-
38649102081
-
Performance of symmetric ciphers and oneway hash functions
-
London, UK, Springer-Verlag
-
Michael Roe. Performance of symmetric ciphers and oneway hash functions. In Fast Software Encryption, Cambridge Security Workshop, pages 83-89, London, UK, 1994. Springer-Verlag.
-
(1994)
Fast Software Encryption, Cambridge Security Workshop
, pp. 83-89
-
-
Roe, M.1
-
27
-
-
0033892676
-
Performance comparison of two on-demand routing protocols for ad hoc networks
-
Samir Ranjan Das, Charles E. Perkins, and Elizabeth E. Royer. Performance comparison of two on-demand routing protocols for ad hoc networks. In INFOCOM (1), pages 3-12, 2000.
-
(2000)
INFOCOM
, vol.1
, pp. 3-12
-
-
Ranjan Das, S.1
Perkins, C.E.2
Royer, E.E.3
|