-
1
-
-
33646915038
-
Cryptography and Network Security: Principles and Practice
-
3rd Edition
-
W. Stallings, "Cryptography and Network Security: Principles and Practice," Prentice Hall, 3rd Edition, 2003.
-
(2003)
Prentice Hall
-
-
Stallings, W.1
-
2
-
-
0033296115
-
Internet Security Architecture
-
April
-
R. Molva, "Internet Security Architecture," Journal of Computer Networks, no. 8, vol. 31, pp. 785-899, April 1999.
-
(1999)
Journal of Computer Networks
, vol.31
, Issue.8
, pp. 785-899
-
-
Molva, R.1
-
7
-
-
50649109340
-
-
S. Cheung, An efficient message authentication scheme for link state routing, The 13th Annual Computer Security Applications Conference, pp. 9098, December 1997.
-
S. Cheung, "An efficient message authentication scheme for link state routing," The 13th Annual Computer Security Applications Conference, pp. 9098, December 1997.
-
-
-
-
9
-
-
50649113395
-
A Credit-Based Secure Routing Protocol for Wireless Ad Hoc Networks,
-
Technical Report, Dept. of ECE, SUNY Binghamton
-
M. Yu and T. Zhu, "A Credit-Based Secure Routing Protocol for Wireless Ad Hoc Networks," Technical Report, Dept. of ECE, SUNY Binghamton, 2005.
-
(2005)
-
-
Yu, M.1
Zhu, T.2
-
10
-
-
33847273536
-
A New Secure Routing Protocol To Defend Byzantine Attacks For Ad Hoc Networks
-
Kuala Lumpur, Malaysia, Nov. 16-18
-
M. Yu, S. Kulkarni, and P. Lau, "A New Secure Routing Protocol To Defend Byzantine Attacks For Ad Hoc Networks, IEEE Int. Conf. on Networks (ICON), vol. 2, pp. 1126-1131, Nov. 16-18, Kuala Lumpur, Malaysia.
-
IEEE Int. Conf. on Networks (ICON)
, vol.2
, pp. 1126-1131
-
-
Yu, M.1
Kulkarni, S.2
Lau, P.3
-
11
-
-
0003802960
-
-
K. Fall and K. Varadhan Eds
-
K. Fall and K. Varadhan (Eds.), "The ns Manual," http://www.isi.edu/nsnam/ns/ns-documentation.html, 2002.
-
(2002)
The ns Manual
-
-
-
12
-
-
84890788516
-
Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications
-
IEEE Computer Society LAN MAN Standards Committee, IEEE
-
IEEE Computer Society LAN MAN Standards Committee. "Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications," IEEE Std 802.11-1997., IEEE, 1997.
-
(1997)
IEEE Std 802.11-1997
-
-
-
13
-
-
85106319926
-
A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols
-
J. Broch, D. Maltz, D. Johnson, Y-C. Hu, and J. Jetcheva. "A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols," IEEE/ACM MOBICOM, p. 85-97, 1998.
-
(1998)
IEEE/ACM MOBICOM
, pp. 85-97
-
-
Broch, J.1
Maltz, D.2
Johnson, D.3
Hu, Y.-C.4
Jetcheva, J.5
-
15
-
-
0001341422
-
DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks
-
Addison-Wesley
-
D. B. Johnson, D. A. Maltz, and J. Broch, "DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks," Ad Hoc Networking, pp. 139- 172, Addison-Wesley, 2001.
-
(2001)
Ad Hoc Networking
, pp. 139-172
-
-
Johnson, D.B.1
Maltz, D.A.2
Broch, J.3
-
16
-
-
0036986441
-
An on-demand secure routing protocol resilient to byzantine failures
-
September
-
B. Awerbuch, D. Holmer, C. Nita-Rotaru, and H. Rubens, "An on-demand secure routing protocol resilient to byzantine failures," ACM Workshop on Wireless Security (WiSe), September 2002.
-
(2002)
ACM Workshop on Wireless Security (WiSe)
-
-
Awerbuch, B.1
Holmer, D.2
Nita-Rotaru, C.3
Rubens, H.4
-
17
-
-
33751400667
-
ODSBR: An On-Demand Secure Byzantine Routing Protocol,
-
1, October 15th
-
B. Awerbuch, R. Curtmola, D. Holmer, and C. Nita-Rotaru, "ODSBR: An On-Demand Secure Byzantine Routing Protocol," JHU CS Technical Report Version 1, October 15th, 2003.
-
(2003)
JHU CS Technical Report Version
-
-
Awerbuch, B.1
Curtmola, R.2
Holmer, D.3
Nita-Rotaru, C.4
|