-
3
-
-
33847273536
-
A New Secure Routing Protocol To Defend Byzantine Attacks For Ad Hoc Networks
-
Nov. 16-18, Kuala Lumpur, Malaysia
-
M. Yu, S. Kulkarni, and P. Lau, "A New Secure Routing Protocol To Defend Byzantine Attacks For Ad Hoc Networks," IEEE Int. Conf. on Networks (ICON'05), vol. 2, pp. 1126-1131, Nov. 16-18, Kuala Lumpur, Malaysia.
-
IEEE Int. Conf. on Networks (ICON'05)
, vol.2
, pp. 1126-1131
-
-
Yu, M.1
Kulkarni, S.2
Lau, P.3
-
5
-
-
0001341422
-
DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks
-
Addison-Wesley
-
D. B. Johnson, D. A. Maltz, and J. Broch, "DSR: The Dynamic Source Routing Protocol for Multi-Hop Wireless Ad Hoc Networks," Ad Hoc Networking, pp. 139-172, Addison-Wesley, 2001.
-
(2001)
Ad Hoc Networking
, pp. 139-172
-
-
Johnson, D.B.1
Maltz, D.A.2
Broch, J.3
-
7
-
-
15744368857
-
Efficient and Secure Source Authentication for Multicast
-
Feb
-
Perrig, R. Canetti, D. Song, and J. D. Tygar, "Efficient and Secure Source Authentication for Multicast," Network and Distributed System Security Symposium (NDSS'01), p. 35-46, Feb. 2001.
-
(2001)
Network and Distributed System Security Symposium (NDSS'01)
, pp. 35-46
-
-
Perrig1
Canetti, R.2
Song, D.3
Tygar, J.D.4
-
10
-
-
34547376572
-
Authenticated Routing for Ad Hoc Networks
-
March
-
K. Sanzgiri, B. Dahill, B. N. Levine, C. Shields, and E. Belding-Royer, "Authenticated Routing for Ad Hoc Networks," IEEE JSAC, vol. 2, no. 1, March 2005.
-
(2005)
IEEE JSAC
, vol.2
, Issue.1
-
-
Sanzgiri, K.1
Dahill, B.2
Levine, B.N.3
Shields, C.4
Belding-Royer, E.5
-
11
-
-
33751400667
-
ODSBR: An On-Demand Secure Byzantine Routing Protocol
-
1, October 15th
-
B. Awerbuch, R. Curtmola, D. Holmer, and C. Nita-Rotaru, "ODSBR: An On-Demand Secure Byzantine Routing Protocol," JHU CS Technical Report Version 1, October 15th, 2003.
-
(2003)
JHU CS Technical Report Version
-
-
Awerbuch, B.1
Curtmola, R.2
Holmer, D.3
Nita-Rotaru, C.4
-
12
-
-
35248835575
-
Aggregate and verifiably encrypted signatures from bilinear maps
-
Proceedings of Advances in Cryptology, Eurocrypt03
-
D. Boneh, C. Gentry, H. Shacham, and B. Lynn, "Aggregate and verifiably encrypted signatures from bilinear maps," Proceedings of Advances in Cryptology - Eurocrypt03, LNCS, 2003.
-
(2003)
LNCS
-
-
Boneh, D.1
Gentry, C.2
Shacham, H.3
Lynn, B.4
-
13
-
-
8344236729
-
Highly Secure and Efficient Routing
-
Hong Kong, March
-
I. Avramopoulos, H. Kobayashi, R. Wang, and A. Krishnamurthy, "Highly Secure and Efficient Routing," IEEE Infocom, Hong Kong, March 2004.
-
(2004)
IEEE Infocom
-
-
Avramopoulos, I.1
Kobayashi, H.2
Wang, R.3
Krishnamurthy, A.4
-
14
-
-
18144393441
-
Using Feedback in Collaborative Reinforcement Learning to Adaptively Optimize MANET Routing
-
May
-
J. Dowling, E. Curran, R. Cunningham, and V. Cahil, "Using Feedback in Collaborative Reinforcement Learning to Adaptively Optimize MANET Routing," IEEE Trans, on SMC, Part A: Systems and Humans, pp. 360-372, vol. 35, no. 3, May 2005.
-
(2005)
IEEE Trans, on SMC, Part A: Systems and Humans
, vol.35
, Issue.3
, pp. 360-372
-
-
Dowling, J.1
Curran, E.2
Cunningham, R.3
Cahil, V.4
-
15
-
-
1542359009
-
A High-Throughput Path Metric for Multi-Hop Wireless Routing
-
Sept
-
D. De Couto, D. Aguayo, J. Bicket, and R. Morris, "A High-Throughput Path Metric for Multi-Hop Wireless Routing", MOBICOM, Sept. 2003.
-
(2003)
MOBICOM
-
-
De Couto, D.1
Aguayo, D.2
Bicket, J.3
Morris, R.4
-
16
-
-
0003802960
-
-
K. Fall and K. Varadhan Eds
-
K. Fall and K. Varadhan (Eds.), "The ns Manual," http://www.isi.edu/nsnam/ns/ns-documentation:html, 2002.
-
(2002)
The ns Manual
-
-
-
17
-
-
85106319926
-
A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols
-
J. Broch, D. Maltz, D. Johnson, Y-C. Hu, and J. Jetcheva. "A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols," IEEE/ACM MOBICOM, pages 85-97, 1998.
-
(1998)
IEEE/ACM MOBICOM
, pp. 85-97
-
-
Broch, J.1
Maltz, D.2
Johnson, D.3
Hu, Y.-C.4
Jetcheva, J.5
|