-
1
-
-
84968616624
-
Optimized link state routing protocol for ad hoc networks
-
P. Jacquet, P. Mühlethaler, T. Clausen, A. Laouiti, A. Qayyum, and L. Vennot, "Optimized link state routing protocol for ad hoc networks," in Proc. of IEEE International Multitopic Conference (INMIC 2001), 2001.
-
(2001)
Proc. of IEEE International Multitopic Conference (INMIC 2001)
-
-
Jacquet, P.1
Mühlethaler, P.2
Clausen, T.3
Laouiti, A.4
Qayyum, A.5
Vennot, L.6
-
3
-
-
84866985446
-
Securing the OLSR protocol
-
Mahdia, Tunisia, June
-
C. Adjih, T. Clausen, P. Jacquet, A. Laouiti, P. Mühlethaler, and D. Raffo, "Securing the OLSR protocol," in Proceedings of Med-Hoc-Net, Mahdia, Tunisia, June 2003.
-
(2003)
Proceedings of Med-Hoc-Net
-
-
Adjih, C.1
Clausen, T.2
Jacquet, P.3
Laouiti, A.4
Mühlethaler, P.5
Raffo, D.6
-
4
-
-
34247520820
-
Attacks against OLSR: Distributed key management for security
-
Ecole Polytechnique, Palaiseau, France, July 28-29
-
C. Adjih, D. Raffo, and P. Mülethaler, "Attacks against OLSR: Distributed key management for security," in 2005 OLSR Interop and Workshop, Ecole Polytechnique, Palaiseau, France, July 28-29 2005.
-
(2005)
2005 OLSR Interop and Workshop
-
-
Adjih, C.1
Raffo, D.2
Mülethaler, P.3
-
5
-
-
48049107779
-
-
HIPERCOM Project, INRIA Rocquencourt, Tech. Rep. INRIA RR-5494, February
-
C. Adjih, T. Clausen, A. Laouiti, P. Mühlethaler, and D. Raffo, "Securing the OLSR routing protocol with or without compromised nodes in the network," HIPERCOM Project, INRIA Rocquencourt, Tech. Rep. INRIA RR-5494, February 2005.
-
(2005)
Securing the OLSR routing protocol with or without compromised nodes in the network
-
-
Adjih, C.1
Clausen, T.2
Laouiti, A.3
Mühlethaler, P.4
Raffo, D.5
-
6
-
-
14844323027
-
An advanced signature system for OLSR
-
New York, NY, USA: ACM Press
-
D. Raffo, C. Adjih, T. Clausen, and P. Mühlethaler, "An advanced signature system for OLSR," in SASN '04: Proceedings of the 2nd ACM Workshop on security of ad hoc and sensor networks. New York, NY, USA: ACM Press, 2004, pp. 10-16.
-
(2004)
SASN '04: Proceedings of the 2nd ACM Workshop on security of ad hoc and sensor networks
, pp. 10-16
-
-
Raffo, D.1
Adjih, C.2
Clausen, T.3
Mühlethaler, P.4
-
7
-
-
4544296236
-
Implementing a fully distributed Certificate Autorithy in an OLSR MANET
-
Atlanta, Georgia, USA, March 21-25
-
D. Dhillon, T. S. Randhawa, M. Wang, and L. Lamont, "Implementing a fully distributed Certificate Autorithy in an OLSR MANET," in Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC 2004), Atlanta, Georgia, USA, March 21-25 2004.
-
(2004)
Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC 2004)
-
-
Dhillon, D.1
Randhawa, T.S.2
Wang, M.3
Lamont, L.4
-
8
-
-
84954161437
-
Enforcing service availability in mobile ad-hoc wans
-
Piscataway, NJ, USA: IEEE Press
-
L. Buttyán and J.-P. Hubaux, "Enforcing service availability in mobile ad-hoc wans," in MobiHoc '00: Proceedings of the 1st ACM international symposium on mobile ad hoc networking & computing. Piscataway, NJ, USA: IEEE Press, 2000, pp. 87-96.
-
(2000)
MobiHoc '00: Proceedings of the 1st ACM international symposium on mobile ad hoc networking & computing
, pp. 87-96
-
-
Buttyán, L.1
Hubaux, J.-P.2
-
9
-
-
0042933944
-
Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks
-
S. Zhong, J. Chen, and Y. R. Yang, "Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks," in INFOCOM, 2003.
-
(2003)
INFOCOM
-
-
Zhong, S.1
Chen, J.2
Yang, Y.R.3
-
10
-
-
0042660545
-
Stimulating cooperation in self-organizing mobile ad hoc networks
-
L. Buttyán and J.-P. Hubaux, "Stimulating cooperation in self-organizing mobile ad hoc networks," Mobile Networks and Applications, vol. 8, no. 5, pp. 579-592, 2003.
-
(2003)
Mobile Networks and Applications
, vol.8
, Issue.5
, pp. 579-592
-
-
Buttyán, L.1
Hubaux, J.-P.2
-
11
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
New York, NY, USA: ACM Press
-
S. Marti, T. J. Giuli, K. Lai, and M. Baker, "Mitigating routing misbehavior in mobile ad hoc networks," in MobiCom '00: Proceedings of the 6th annual international conference on mobile computing and networking. New York, NY, USA: ACM Press, 2000, pp. 255-265.
-
(2000)
MobiCom '00: Proceedings of the 6th annual international conference on mobile computing and networking
, pp. 255-265
-
-
Marti, S.1
Giuli, T.J.2
Lai, K.3
Baker, M.4
-
12
-
-
0242696192
-
Performance analysis of the confidant protocol
-
New York, NY, USA: ACM Press
-
S. Buchegger and J.-Y. L. Boudec, "Performance analysis of the confidant protocol," in MobiHoc '02: Proceedings of the 3rd ACM international symposium on mobile ad hoc networking & computing. New York, NY, USA: ACM Press, 2002, pp. 226-236.
-
(2002)
MobiHoc '02: Proceedings of the 3rd ACM international symposium on mobile ad hoc networking & computing
, pp. 226-236
-
-
Buchegger, S.1
Boudec, J.-Y.L.2
-
14
-
-
17444426121
-
Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks
-
Y. Hu, A. Perrig, and D. Johnson, "Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks," Wireless Networks, vol. 11, no. 1, pp. 21-38, 2005.
-
(2005)
Wireless Networks
, vol.11
, Issue.1
, pp. 21-38
-
-
Hu, Y.1
Perrig, A.2
Johnson, D.3
-
15
-
-
84870819361
-
UM-OLSR
-
obtain via
-
F. J. Ros, "UM-OLSR," obtain via: http://masimum.dif.um.es/.
-
-
-
Ros, F.J.1
-
16
-
-
51349094967
-
CSS-OLSR - Code for simulations
-
obtain via
-
J. P. Vilela, "CSS-OLSR - Code for simulations," obtain via: http://www.dcc.fc.up.pt/̃joaovilela/css-olsr/.
-
-
-
Vilela, J.P.1
-
17
-
-
27544458244
-
Perfect simulations for random trip mobility models
-
IEEE Computer Society, Online, Available
-
S. PalChaudhuri, J.-Y. L. Boudec, and M. Vojnovic, "Perfect simulations for random trip mobility models," in Annual Simulation Symposium. IEEE Computer Society, 2005, pp. 72-79. [Online]. Available: http://dx.doi.org/10.1109/ANSS.2005.33
-
(2005)
Annual Simulation Symposium
, pp. 72-79
-
-
PalChaudhuri, S.1
Boudec, J.-Y.L.2
Vojnovic, M.3
|