메뉴 건너뛰기




Volumn , Issue , 2007, Pages 1268-1272

ARMA: An efficient secure ad hoc routing protocol

Author keywords

[No Author keywords available]

Indexed keywords

DATA COMMUNICATION SYSTEMS; MESSAGE PASSING; ROUTING PROTOCOLS; SECURITY OF DATA;

EID: 39349098059     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/GLOCOM.2007.244     Document Type: Conference Paper
Times cited : (11)

References (15)
  • 2
    • 33747371642 scopus 로고    scopus 로고
    • Performance evaluation of an anonymity providing protocol for wireless ad hoc networks
    • A. Boukerche, K. El-Khatib, L. Xu, L. Korba, "Performance evaluation of an anonymity providing protocol for wireless ad hoc networks", Performance Evaluation, Vol. 63, pp. 1094-1109, 2006.
    • (2006) Performance Evaluation , vol.63 , pp. 1094-1109
    • Boukerche, A.1    El-Khatib, K.2    Xu, L.3    Korba, L.4
  • 3
    • 0005063385 scopus 로고    scopus 로고
    • Onion routing for anonymous and private Internet connections
    • D. Goldschlag, M. Reed, and P. Syverson, "Onion routing for anonymous and private Internet connections", Communications of the ACM, Vol. 42, pp. 39-41, 1999.
    • (1999) Communications of the ACM , vol.42 , pp. 39-41
    • Goldschlag, D.1    Reed, M.2    Syverson, P.3
  • 4
    • 21644448157 scopus 로고    scopus 로고
    • Achieving real-time guarantees in mobile ad hoc wireless networks
    • B. Hughes and V. Cahill, "Achieving real-time guarantees in mobile ad hoc wireless networks", 24th IEEE Real-Time Systems Symposium, pp. 37-40, 2003.
    • (2003) 24th IEEE Real-Time Systems Symposium , pp. 37-40
    • Hughes, B.1    Cahill, V.2
  • 5
    • 0004118152 scopus 로고    scopus 로고
    • Ariadne: A secure on-demand routing protocol for ad hoc networks
    • Technical Report, TR01-384, Rice University
    • Y.-C. Hu, A. Perrig, and D. B. Johnson, "Ariadne: A secure on-demand routing protocol for ad hoc networks", Technical Report, TR01-384, Rice University, 2001.
    • (2001)
    • Hu, Y.-C.1    Perrig, A.2    Johnson, D.B.3
  • 7
    • 0000629443 scopus 로고    scopus 로고
    • Dynamic source routing in ad hoc wireless networks
    • Kluwer Academic Publishers, pp
    • D. B. Johnson and D. B. Maltz, "Dynamic source routing in ad hoc wireless networks", Mobile Computing, Kluwer Academic Publishers, pp. 153-181, 1996.
    • (1996) Mobile Computing , pp. 153-181
    • Johnson, D.B.1    Maltz, D.B.2
  • 8
    • 0242696170 scopus 로고    scopus 로고
    • ANODR: Anonymous on demand routing with untraceable routes for mobile ad hoc networks
    • J. Kong and X. Hong, "ANODR: Anonymous on demand routing with untraceable routes for mobile ad hoc networks", 4th ACM symposium on Mobile ad hoc networking and computing, pp. 291-302, 2003.
    • (2003) 4th ACM symposium on Mobile ad hoc networking and computing , pp. 291-302
    • Kong, J.1    Hong, X.2
  • 9
    • 33845715578 scopus 로고    scopus 로고
    • Location verification and trust management for resilient geographic routing
    • K. Liu, N. Abu-Ghazaleh, and K. Kang, "Location verification and trust management for resilient geographic routing", Journal of Parallel and Distributed Computing, Vol. 67, pp. 215-228, 2007.
    • (2007) Journal of Parallel and Distributed Computing , vol.67 , pp. 215-228
    • Liu, K.1    Abu-Ghazaleh, N.2    Kang, K.3
  • 14
    • 39349093509 scopus 로고    scopus 로고
    • Wikipedia contributors, Wikipedia, The Free Encyclopedia, accessed May 23, 2007
    • Wikipedia contributors, "Denial-of-service attack [Internet]", Wikipedia, The Free Encyclopedia, http://en.wikipedia.org/, accessed May 23, 2007.
    • Denial-of-service attack [Internet]


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.