-
2
-
-
33750225439
-
A Wireless Intrusion Detection System for Secure Clustering and Routing in Ad Hoc Networks
-
L. Bononi, C. Tacconi, "A Wireless Intrusion Detection System for Secure Clustering and Routing in Ad Hoc Networks", Proceedings of ISC 2006, pages 398-414, 2006.
-
(2006)
Proceedings of ISC 2006
, pp. 398-414
-
-
Bononi, L.1
Tacconi, C.2
-
3
-
-
33747371642
-
Performance evaluation of an anonymity providing protocol for wireless ad hoc networks
-
Azzedine Boukerche, Khalil El-Khatib, Li Xu, Larry Korba, "Performance evaluation of an anonymity providing protocol for wireless ad hoc networks", Performance Evaluation, Vol. 63, pages 1094-1109, 2006.
-
(2006)
Performance Evaluation
, vol.63
, pp. 1094-1109
-
-
Boukerche, A.1
El-Khatib, K.2
Xu, L.3
Korba, L.4
-
4
-
-
85106319926
-
A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols
-
J. Brach, D. A. Maltz, D. B. Johnson, Y. C. Hu, and J. Jetcheva, "A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols", Proc. of the ACM/IEEE MobiCom, pages 85-97, 1998.
-
(1998)
Proc. of the ACM/IEEE MobiCom
, pp. 85-97
-
-
Brach, J.1
Maltz, D.A.2
Johnson, D.B.3
Hu, Y.C.4
Jetcheva, J.5
-
5
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
D. Chaum, "Untraceable electronic mail, return addresses, and digital pseudonyms", Communications of the ACM, Vol. 24, pages 84-88, 1981.
-
(1981)
Communications of the ACM
, vol.24
, pp. 84-88
-
-
Chaum, D.1
-
6
-
-
0023861309
-
The dining cryptographers problem: Unconditional sender and recipient untraceability
-
D. Chaum, "The dining cryptographers problem: unconditional sender and recipient untraceability", Journal of Cryptography, pp. 65-75, 1988.
-
(1988)
Journal of Cryptography
, pp. 65-75
-
-
Chaum, D.1
-
7
-
-
0005063385
-
Onion routing for anonymous and private Internet connections
-
pages
-
D. Goldschlag, M. Reed, and P. Syverson, "Onion routing for anonymous and private Internet connections", Communications of the ACM, Vol.42, pages39-41, 1999.
-
(1999)
Communications of the ACM
, vol.42
, pp. 39-41
-
-
Goldschlag, D.1
Reed, M.2
Syverson, P.3
-
9
-
-
77952644486
-
Destination-sequenced distance vector (DSDV) protocol
-
Technical report, Helsinki University of Technology, Finland
-
Guoyou He, "Destination-sequenced distance vector (DSDV) protocol", Technical report, Helsinki University of Technology, Finland.
-
-
-
He, G.1
-
11
-
-
21644448157
-
Achieving real-time guarantees in mobile ad hoc wireless networks
-
B. Hughes and V. Cahill, "Achieving real-time guarantees in mobile ad hoc wireless networks", 24th IEEE Real-Time Systems Symposium, pages 37-40, 2003.
-
(2003)
24th IEEE Real-Time Systems Symposium
, pp. 37-40
-
-
Hughes, B.1
Cahill, V.2
-
12
-
-
0035727921
-
A dynamic mix method in wireless ad hoc networks
-
S. Jiang, N. Vaidya, W. Zhao, "A dynamic mix method in wireless ad hoc networks", Proceedings of IEEE Milcom, pages 873-877, 2001.
-
(2001)
Proceedings of IEEE Milcom
, pp. 873-877
-
-
Jiang, S.1
Vaidya, N.2
Zhao, W.3
-
13
-
-
0000629443
-
Dynamic source routing in ad hoc wireless networks
-
D. B. Johnson and D. B. Maltz, "Dynamic source routing in ad hoc wireless networks", Mobile Computing, pages 153-181, 1996.
-
(1996)
Mobile Computing
, pp. 153-181
-
-
Johnson, D.B.1
Maltz, D.B.2
-
14
-
-
0001341422
-
The dynamic source routing protocol for multi-hop wireless ad hoc networks
-
D. B. Johnson, D. A. Maltz, J. Brach, "The dynamic source routing protocol for multi-hop wireless ad hoc networks", Ad Hoc Networking, pages 139-172, 2001.
-
(2001)
Ad Hoc Networking
, pp. 139-172
-
-
Johnson, D.B.1
Maltz, D.A.2
Brach, J.3
-
15
-
-
0242696170
-
ANODR: Anonymous on demand routing with untraceable routes for mobile ad hoc networks, 4th
-
J. Kong and X. Hong, "ANODR: Anonymous on demand routing with untraceable routes for mobile ad hoc networks", 4th ACM MobiHoc, pages 291-302, 2003.
-
(2003)
ACM MobiHoc
, pp. 291-302
-
-
Kong, J.1
Hong, X.2
-
16
-
-
33845715578
-
Location verification and trust management for resilient geographic routing
-
Ke Liu, Nael Abu-Ghazaleh, Kyoung-Don Kang, "Location verification and trust management for resilient geographic routing", Journal of Parallel and Distributed Computing, Vol. 67, pages 215-228, 2007.
-
(2007)
Journal of Parallel and Distributed Computing
, vol.67
, pp. 215-228
-
-
Liu, K.1
Abu-Ghazaleh, N.2
Kang, K.-D.3
-
18
-
-
47249116391
-
-
NS-2, available at
-
NS-2, available at http://www.isi.edu/nsnam/ns/.
-
-
-
-
20
-
-
84943745348
-
Secure Link State Routing for Mobile Ad Hoc Networks
-
Workshops
-
P. Papadimitratos and Z. J. Haas, "Secure Link State Routing for Mobile Ad Hoc Networks", Proceedings of the 2003 SAINT'03 Workshops, page 379-383, 2003.
-
(2003)
Proceedings of the 2003 SAINT'03
, pp. 379-383
-
-
Papadimitratos, P.1
Haas, Z.J.2
-
24
-
-
85031633867
-
Proxies for anonymous routing
-
M. Reed, P. Syverson, D. Goldschlag, "Proxies for anonymous routing", 12th Annual Computer Security Applications Conference, pages 95-104, 1995.
-
(1995)
12th Annual Computer Security Applications Conference
, pp. 95-104
-
-
Reed, M.1
Syverson, P.2
Goldschlag, D.3
-
25
-
-
84904904836
-
A secure routing protocol for ad hoc networks
-
K. Sanzgiri, B. Dahill, B.N. Levine, C. Shields, E.M. Belding-Royer, "A secure routing protocol for ad hoc networks", Proceedings of 2002 IEEE ICNP, pages 78-87, 2002.
-
(2002)
Proceedings of 2002 IEEE ICNP
, pp. 78-87
-
-
Sanzgiri, K.1
Dahill, B.2
Levine, B.N.3
Shields, C.4
Belding-Royer, E.M.5
-
27
-
-
47249125137
-
Mobile Ad Hoc Networks: Routing, MAC and Transport Issues
-
Nitin H. Vaidya, "Mobile Ad Hoc Networks: Routing, MAC and Transport Issues", IEEE INFOCOM 2004, 2004.
-
(2004)
IEEE INFOCOM 2004
-
-
Vaidya, N.H.1
-
28
-
-
24144432679
-
Anonymous communications in mobile ad hoc networks
-
Y. Zhang, W. Liu, W. Lou, "Anonymous communications in mobile ad hoc networks", IEEE INFOCOM 2005, pages 291-302, 2005.
-
(2005)
IEEE INFOCOM 2005
, pp. 291-302
-
-
Zhang, Y.1
Liu, W.2
Lou, W.3
|