-
2
-
-
39149129262
-
-
1999a. IEEE Std 802.11a-1999. http://standards.ieee.org/.
-
1999a. IEEE Std 802.11a-1999. http://standards.ieee.org/.
-
-
-
-
3
-
-
39149108008
-
-
1999b. IEEE Std 802.11b-1999. http://standards.ieee.org/.
-
1999b. IEEE Std 802.11b-1999. http://standards.ieee.org/.
-
-
-
-
4
-
-
84965066515
-
Advanced Encryption Standard
-
AES
-
AES. 2001. Advanced Encryption Standard. Number FIPS 197. National Institute for Standards and Technology (NIST). http://csrc.nist.gov/encryption/ aes/.
-
(2001)
Number FIPS
, vol.197
-
-
-
5
-
-
34347254802
-
The medium time metric: High throughput route selection in multirate ad hoc wireless networks
-
AWERBUCH, B., HOLMER, D., AND RUBENS, H. 2005. The medium time metric: High throughput route selection in multirate ad hoc wireless networks. Kluwer Mobile Networks and Applications (MONET) Journal, Special Issue on Internet Wireless Access: 802.11 and Beyond.
-
(2005)
Kluwer Mobile Networks and Applications (MONET) Journal, Special Issue on Internet Wireless Access: 802.11 and Beyond
-
-
AWERBUCH, B.1
HOLMER, D.2
RUBENS, H.3
-
6
-
-
0031703272
-
Detecting disruptive routers: A distributed network monitoring approach
-
BRADLEY, K. A., CHEUNG, S., PUKETZA, N., MUKHEHJEE, B., AND OLSSON, R. A. 1998. Detecting disruptive routers: A distributed network monitoring approach. In Proceedings of IEEE Symposium on Security and Privacy.
-
(1998)
Proceedings of IEEE Symposium on Security and Privacy
-
-
BRADLEY, K.A.1
CHEUNG, S.2
PUKETZA, N.3
MUKHEHJEE, B.4
OLSSON, R.A.5
-
7
-
-
85084161952
-
PGP in constrained wireless devices
-
USENIX
-
BROWN, M., CHEUNG, D., HANKERSON, D., HERNANDEZ, J., KIRKUP, M., AND MENEZES., A. 2000. PGP in constrained wireless devices. In Proceeding of USENIX Security Symposium. USENIX.
-
(2000)
Proceeding of USENIX Security Symposium
-
-
BROWN, M.1
CHEUNG, D.2
HANKERSON, D.3
HERNANDEZ, J.4
KIRKUP, M.5
MENEZES, A.6
-
8
-
-
0242696192
-
Performance analysis of the CONFIDANT protocol (cooperation of nodes: Fairness in dynamic ad-hoc networks
-
ACM, New York
-
BUCHEGGER, S. AND BOUDEC, J.-Y. L. 2002. Performance analysis of the CONFIDANT protocol (cooperation of nodes: Fairness in dynamic ad-hoc networks. In Proc. of MobiHoc. ACM, New York, 226-236.
-
(2002)
Proc. of MobiHoc
, pp. 226-236
-
-
BUCHEGGER, S.1
BOUDEC, J.-Y.L.2
-
9
-
-
0042660545
-
Stimulating cooperation in self-organizing mobile ad hoc networks
-
BUTTYAN, L. AND HUBAUX, J.-P. 2003. Stimulating cooperation in self-organizing mobile ad hoc networks. Mob. Netw. Appl. 8, 5, 579-592.
-
(2003)
Mob. Netw. Appl
, vol.8
, Issue.5
, pp. 579-592
-
-
BUTTYAN, L.1
HUBAUX, J.-P.2
-
10
-
-
0013294745
-
Protecting routing infrastructures from denial of service using cooperative intrusion detection
-
CHEUNG, S. AND LEVITT, K. 1997. Protecting routing infrastructures from denial of service using cooperative intrusion detection. In New Security Paradigms Workshop.
-
(1997)
New Security Paradigms Workshop
-
-
CHEUNG, S.1
LEVITT, K.2
-
11
-
-
1542359009
-
A high-throughput path metric for multi-hop wireless routing
-
San Diego, California
-
DE COUTO, D. S. J., AGUAYO, D., BICKET, J., AND MORRIS, R. 2003. A high-throughput path metric for multi-hop wireless routing. In Proceedings of ACM Annual, International, Conference of Mobile Computing (MOBICOM). San Diego, California.
-
(2003)
Proceedings of ACM Annual, International, Conference of Mobile Computing (MOBICOM)
-
-
DE COUTO, D.S.J.1
AGUAYO, D.2
BICKET, J.3
MORRIS, R.4
-
12
-
-
77952404217
-
Digital Signature Standard
-
DSS
-
DSS. 2006. Digital Signature Standard. Number FIPS 186-3. National Institute for Standards and Technology (NIST). http://csrc.nist.gov/ publications/dra.fts/fips_186-3/Draft-FIPS-186-3_March2006.pdf.
-
(2006)
Number FIPS
, pp. 186-193
-
-
-
13
-
-
46149096001
-
Truelink: A practical countermeasure to the wormhole attack in wireless networks
-
ERIKSSON, J., KRISHNAMURTHY, S.-V, AND FALOUTSOS, M. 2006. Truelink: A practical countermeasure to the wormhole attack in wireless networks. Proc. of ICNP'06.
-
(2006)
Proc. of ICNP'06
-
-
ERIKSSON, J.1
KRISHNAMURTHY, S.-V.2
FALOUTSOS, M.3
-
15
-
-
0013091373
-
The Keyed-Hash Message Authentication Code
-
HMAC
-
HMAC. 2002. The Keyed-Hash Message Authentication Code. Number FIPS 198. National Institute for Standards and Technology (NIST). http://csrc.nist.gov/publications/fips/index.html.
-
(2002)
Number FIPS
, vol.198
-
-
-
18
-
-
0036957315
-
Ariadne: A secure on-demand routing protocol for ad hoc networks
-
HU, Y.-C., PERRIG, A., AND JOHNSON, D. B. 2002b. Ariadne: A secure on-demand routing protocol for ad hoc networks. In Proceedings of ACM Annual International, Conference of Mobile Computing (MOBICOM).
-
(2002)
Proceedings of ACM Annual International, Conference of Mobile Computing (MOBICOM)
-
-
HU, Y.-C.1
PERRIG, A.2
JOHNSON, D.B.3
-
22
-
-
0003897853
-
-
IEEE, 1999 Edition
-
IEEE. 1999. IEEE Std 802.11, 1999 Edition, http://standards.ieee. org/catalog/olis/lanman.html.
-
(1999)
IEEE Std 802.11
-
-
-
24
-
-
0001341422
-
DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks
-
Addison-Wesley, Reading, MA. Chapter 5, 139-172
-
JOHNSON, D. B., MALTZ, D. A., AND BROCH, J. 2001. DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks, in Ad Hoc Networking. Addison-Wesley, Reading, MA. Chapter 5, 139-172.
-
(2001)
Ad Hoc Networking
-
-
JOHNSON, D.B.1
MALTZ, D.A.2
BROCH, J.3
-
25
-
-
0033743163
-
Secure border gateway protocol (s-bgp)
-
KENT, S., LYNN, C., AND SEO, K. 2000. Secure border gateway protocol (s-bgp). IEEE Journal on Selected Areas in Communication 18, 4.
-
(2000)
IEEE Journal on Selected Areas in Communication
, vol.18
, pp. 4
-
-
KENT, S.1
LYNN, C.2
SEO, K.3
-
26
-
-
0004112961
-
-
Addison-Wesley Longman, Reading, MA
-
KUROSE, J. AND ROSS, K. 2000. Computer Networking, A Top Down Approach Featuring the Internet. Addison-Wesley Longman, Reading, MA.
-
(2000)
Computer Networking, A Top Down Approach Featuring the Internet
-
-
KUROSE, J.1
ROSS, K.2
-
27
-
-
84976699318
-
The byzantine generals problem
-
LAMPORT, L., SHOSTAK, R., AND PEASE, M. 1982. The byzantine generals problem. ACM Trans. Program. Lang. Syst. 4, 3, 382-401.
-
(1982)
ACM Trans. Program. Lang. Syst
, vol.4
, Issue.3
, pp. 382-401
-
-
LAMPORT, L.1
SHOSTAK, R.2
PEASE, M.3
-
29
-
-
0036980106
-
-
LUNDGREN, H., NORDSTRÖM, E., AND TSCHUDIN, C. 2002. Coping with communication gray zones in ieee 802.11b based ad hoc networks. In Proceedings of IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WOWMOM). ACM Press, New York, 49-55.
-
LUNDGREN, H., NORDSTRÖM, E., AND TSCHUDIN, C. 2002. Coping with communication gray zones in ieee 802.11b based ad hoc networks. In Proceedings of IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WOWMOM). ACM Press, New York, 49-55.
-
-
-
-
30
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
MARTI, S., GIULI, T., LAI, K., AND BAKER, M. 2000. Mitigating routing misbehavior in mobile ad hoc networks. In Proceedings of ACM Annual International Conference of Mobile Computing (MOBICOM).
-
(2000)
Proceedings of ACM Annual International Conference of Mobile Computing (MOBICOM)
-
-
MARTI, S.1
GIULI, T.2
LAI, K.3
BAKER, M.4
-
31
-
-
84944878354
-
-
CRC Press, Boca Raton, FL
-
MENEZES, A., VAN OORSCHOT, P., AND VANSTONE, S. 1996. Handbook of Applied Cryptography. CRC Press, Boca Raton, FL.
-
(1996)
Handbook of Applied Cryptography
-
-
MENEZES, A.1
VAN OORSCHOT, P.2
VANSTONE, S.3
-
33
-
-
27544472999
-
Fatih: Detecting and isolating malicious routers
-
MIZRAK, A., CHENG, Y.-C., MARZULLO, K., AND SAVAGE, S. 2005. Fatih: Detecting and isolating malicious routers. In Proceedings of International Conference on Dependable Systems and Networks (DSN).
-
(2005)
Proceedings of International Conference on Dependable Systems and Networks (DSN)
-
-
MIZRAK, A.1
CHENG, Y.-C.2
MARZULLO, K.3
SAVAGE, S.4
-
36
-
-
85031307530
-
Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers
-
PERKINS, C. E. AND BHAGWAT, P. 1994. Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers. In Proceedings of SIGCOMM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication (SIGCOMM).
-
(1994)
Proceedings of SIGCOMM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication (SIGCOMM)
-
-
PERKINS, C.E.1
BHAGWAT, P.2
-
37
-
-
0003582910
-
-
Addison-Wesley, Reading, MA. Chapter Ad hoc On-Demand Distance Vector Routing
-
PERKINS, C. E. AND ROYER, E. M. 2000. Ad hoc Networking. Addison-Wesley, Reading, MA. Chapter Ad hoc On-Demand Distance Vector Routing.
-
(2000)
Ad hoc Networking
-
-
PERKINS, C.E.1
ROYER, E.M.2
-
38
-
-
39149134181
-
-
PERLMAN, R. 1988. Network layer protocols with byzantine robustness. Ph.D. thesis, MIT LCS TR-429.
-
PERLMAN, R. 1988. Network layer protocols with byzantine robustness. Ph.D. thesis, MIT LCS TR-429.
-
-
-
-
39
-
-
33750333793
-
Routing with byzantine robustness
-
Tech. Rep. TR-2005-146, Sun Microsystems
-
PERLMAN, R. 2005. Routing with byzantine robustness. Tech. Rep. TR-2005-146, Sun Microsystems.
-
(2005)
-
-
PERLMAN, R.1
-
40
-
-
15744368857
-
Efficient and secure source authentication for multicast
-
PERRIG, A., CANETTI, R., SONG, D., AND TYGAR, D. 2001. Efficient and secure source authentication for multicast. In Proceedings of ISOC Symposium of Network and Distributed Systems Security (NDSS).
-
(2001)
Proceedings of ISOC Symposium of Network and Distributed Systems Security (NDSS)
-
-
PERRIG, A.1
CANETTI, R.2
SONG, D.3
TYGAR, D.4
-
41
-
-
0017930809
-
-
RIVEST, R. L., SHAMIR, A., AND ADLEMAN, L. M. 1978. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21, 2 (Feb.), 120-126.
-
RIVEST, R. L., SHAMIR, A., AND ADLEMAN, L. M. 1978. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21, 2 (Feb.), 120-126.
-
-
-
-
42
-
-
0842283101
-
A secure routing protocol for ad hoc networks
-
SANZGIRI, K., DAHILL, B., LEVINE, B. N., SHIELDS, C., AND BELDING-ROYER, E. 2002. A secure routing protocol for ad hoc networks. In Proceedings of IEEE International Conference on Network Protocols (ICNP).
-
(2002)
Proceedings of IEEE International Conference on Network Protocols (ICNP)
-
-
SANZGIRI, K.1
DAHILL, B.2
LEVINE, B.N.3
SHIELDS, C.4
BELDING-ROYER, E.5
-
44
-
-
0002088010
-
When the CRC and TCP checksum disagree
-
STONE, J. AND PARTRIDGE, C. 2000. When the CRC and TCP checksum disagree. In Proceedings of SIGCOMM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication (SIGCOMM).
-
(2000)
Proceedings of SIGCOMM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication (SIGCOMM)
-
-
STONE, J.1
PARTRIDGE, C.2
-
47
-
-
0042014530
-
Random waypoint considered harmful
-
San Francisco, CA
-
YOON, J., LIU, M., AND NOBLE, B. D. 2003. Random waypoint considered harmful. In Proceedings of IEEE Conference of the IEEE Communications Society (INFOCOMM). San Francisco, CA.
-
(2003)
Proceedings of IEEE Conference of the IEEE Communications Society (INFOCOMM)
-
-
YOON, J.1
LIU, M.2
NOBLE, B.D.3
|