-
5
-
-
0034291601
-
GPS-less Low Cost Outdoor Localization For Very Small Devices
-
October
-
N. Bulusu, J. Heidemann, and D. Estrin. GPS-less Low Cost Outdoor Localization For Very Small Devices . IEEE Personal Communications, Special Issue on Smart Spaces and Environments, 7(5), October 2000.
-
(2000)
IEEE Personal Communications, Special Issue on Smart Spaces and Environments
, vol.7
, Issue.5
-
-
Bulusu, N.1
Heidemann, J.2
Estrin, D.3
-
12
-
-
3042647758
-
-
Y. Hu and A. Perrig. A Survey of Secure Wireless Ad hoc Routing. IEEE Security & Privacy, 2(3):28-39, May/June 2004.
-
Y. Hu and A. Perrig. A Survey of Secure Wireless Ad hoc Routing. IEEE Security & Privacy, 2(3):28-39, May/June 2004.
-
-
-
-
14
-
-
0000629443
-
Dynamic Source Routing in Ad hoc Wireless Networks
-
Kluwer Academic Publishers
-
D. Johnson and D. Maltz. Dynamic Source Routing in Ad hoc Wireless Networks. In Mobile Computing, volume 353. Kluwer Academic Publishers, 1996.
-
(1996)
Mobile Computing
, vol.353
-
-
Johnson, D.1
Maltz, D.2
-
16
-
-
0035704362
-
Providing Robust and Ubiquitous Security Support for Wireless Mobile Networks
-
Nov
-
J. Kong, P. Zerfos, H. Luo, S. Lu, and L. Zhang. Providing Robust and Ubiquitous Security Support for Wireless Mobile Networks. In Proc. Intl Conference on Network Protocols, Nov. 2001.
-
(2001)
Proc. Intl Conference on Network Protocols
-
-
Kong, J.1
Zerfos, P.2
Luo, H.3
Lu, S.4
Zhang, L.5
-
17
-
-
27644464092
-
Experimental evaluation of wireless simulation assumptions
-
October
-
D. Kotz, C. Newport, R. Gray, J. Liu, Y Yuan, and C. Elliott. Experimental evaluation of wireless simulation assumptions. In Proc. ACM/IEEE Intl Symp on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM), pages 78-82, October 2004.
-
(2004)
Proc. ACM/IEEE Intl Symp on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM)
, pp. 78-82
-
-
Kotz, D.1
Newport, C.2
Gray, R.3
Liu, J.4
Yuan, Y.5
Elliott, C.6
-
18
-
-
0034541756
-
Mitigating Routing Misbehavior in Mobile Ad hoc Networks
-
S. Marti, T. J. Giuli, K. Lai, and M. Baker. Mitigating Routing Misbehavior in Mobile Ad hoc Networks. In Mobile Computing and Networking, pages 255-265, 2000.
-
(2000)
Mobile Computing and Networking
, pp. 255-265
-
-
Marti, S.1
Giuli, T.J.2
Lai, K.3
Baker, M.4
-
20
-
-
50049089775
-
-
S. McCanne and S. Floyd. Network Simulator Version 2
-
S. McCanne and S. Floyd. Network Simulator Version 2. http://www.isi.edu/nsnam/ns.
-
-
-
-
21
-
-
5044238739
-
Core: A Collaborative Reputation Mechanism to Enforce Node Cooperation in Mobile Ad hoc Networks
-
September
-
P. Michiardi and R. Molva. Core: A Collaborative Reputation Mechanism to Enforce Node Cooperation in Mobile Ad hoc Networks. InProc. Communications and Multimedia Security, September 2002.
-
(2002)
Proc. Communications and Multimedia Security
-
-
Michiardi, P.1
Molva, R.2
-
25
-
-
34347349933
-
Ad hoc On-Demand Distance Vector Routing
-
Feb
-
C. E. Perkins and E. M. Royer. Ad hoc On-Demand Distance Vector Routing. In Proc. WMCSA, Feb. 1999.
-
(1999)
Proc. WMCSA
-
-
Perkins, C.E.1
Royer, E.M.2
-
26
-
-
84937555407
-
Traffic analysis: Protocols, attacks, design issues and open problems
-
Proc. Intl Wkshp on Design Issues in Anonymity and Unobservability, of, Springer-Verlag
-
J.-F. Raymond. Traffic analysis: Protocols, attacks, design issues and open problems. In Proc. Intl Wkshp on Design Issues in Anonymity and Unobservability, volume 2009 of LNCS, pages 10-29. Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.2009
, pp. 10-29
-
-
Raymond, J.-F.1
-
27
-
-
0002101577
-
Reputation Systems
-
P. Resnick, K. Kuwabara, R. Zeckhauser, and E. Friedman. Reputation Systems. CACM, 43(12):45-48, 2000.
-
(2000)
CACM
, vol.43
, Issue.12
, pp. 45-48
-
-
Resnick, P.1
Kuwabara, K.2
Zeckhauser, R.3
Friedman, E.4
-
28
-
-
50049101455
-
A Secure Routing Protocol for Ad hoc Networks
-
March
-
K. Sanzgiri, B. Dahill, D. LaFlamme, B. N. Levine, C. Shields, and E. Belding-Royer. A Secure Routing Protocol for Ad hoc Networks. JSAC Special Issue on Ad hoc Networks, March 2005.
-
(2005)
JSAC Special Issue on Ad hoc Networks
-
-
Sanzgiri, K.1
Dahill, B.2
LaFlamme, D.3
Levine, B.N.4
Shields, C.5
Belding-Royer, E.6
-
31
-
-
14544273666
-
The Predecessor Attack: An Analysis of a Threat to Anonymous Communications Systems
-
November
-
M. Wright, M. Adler, B. N. Levine, and C. Shields. The Predecessor Attack: An Analysis of a Threat to Anonymous Communications Systems. ACM TISSEC, 7(4), November 2004.
-
(2004)
ACM TISSEC
, vol.7
, Issue.4
-
-
Wright, M.1
Adler, M.2
Levine, B.N.3
Shields, C.4
-
32
-
-
0033357103
-
Securing Ad hoc Networks
-
L. Zhou and Z. J. Haas. Securing Ad hoc Networks. IEEE Network, 13(6):24-30, 1999.
-
(1999)
IEEE Network
, vol.13
, Issue.6
, pp. 24-30
-
-
Zhou, L.1
Haas, Z.J.2
|