-
1
-
-
34250616714
-
A survey on congestion control for mobile ad hoc networks
-
June
-
Christian Lochert, Björn Scheuermann, and Martin Mauve, A survey on congestion control for mobile ad hoc networks, Wireless Communications & Mobile Computing, Vol. 7, pp. 655 - 676, June. 2007
-
(2007)
Wireless Communications & Mobile Computing
, vol.7
, pp. 655-676
-
-
Lochert, C.1
Scheuermann, B.2
Mauve, M.3
-
3
-
-
85177502261
-
-
Yongguang Zhang And Wenke Lee, Intrusion Detection in Wireless Ad-Hoc Networks, MOBICOM, 2000, pp. 275-283
-
Yongguang Zhang And Wenke Lee, Intrusion Detection in Wireless Ad-Hoc Networks, MOBICOM, 2000, pp. 275-283
-
-
-
-
4
-
-
84949958302
-
Distributed Light-Weight Authentication Model for Ad-hoc Networks
-
André Weimerskirch and Gilles Thonet, Distributed Light-Weight Authentication Model for Ad-hoc Networks, Lecture Notes In Computer Science; Vol. 2288, pp. 341-354, 2001
-
(2001)
Lecture Notes In Computer Science
, vol.2288
, pp. 341-354
-
-
Weimerskirch, A.1
Thonet, G.2
-
5
-
-
0742294233
-
Mobile Ad Hoc Networking: Imperatives and Challenges
-
I. Chlamtac, M. Conti, and J. Liu, Mobile Ad Hoc Networking: Imperatives and Challenges, Ad Hoc Networks, vol. 1, pp. 13-64, no. 1, 2003.
-
(2003)
Ad Hoc Networks
, vol.1
, Issue.1
, pp. 13-64
-
-
Chlamtac, I.1
Conti, M.2
Liu, J.3
-
7
-
-
84860703392
-
Cluster-based Intrusion Detection (CBID) Architecture for Mobile Ad Hoc Networks, AusCERT2006 R & D Stream Program
-
Australia
-
Ejaz Ahmed, Kashan Samad, Waqar Mahmood, Cluster-based Intrusion Detection (CBID) Architecture for Mobile Ad Hoc Networks, AusCERT2006 R & D Stream Program, Information Technology Security Conference, May 2006, Australia.
-
(2006)
Information Technology Security Conference, May
-
-
Ahmed, E.1
Samad, K.2
Mahmood, W.3
-
8
-
-
0035789229
-
The quest for security in mobile ad hoc networks
-
MobiHOC, October
-
J.P. Hubaux, L. Buttyan, S. Capkun, The quest for security in mobile ad hoc networks, in: Proceedings of the ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC), October, 2001
-
(2001)
Proceedings of the ACM Symposium on Mobile Ad Hoc Networking and Computing
-
-
Hubaux, J.P.1
Buttyan, L.2
Capkun, S.3
-
10
-
-
51849169012
-
Routing Security in Ad Hoc Networks
-
J. Lundberg, Routing Security in Ad Hoc Networks, 2000. Availabe: http://citeseer.nj.nec.com/400961.html.
-
(2000)
Availabe
-
-
Lundberg, J.1
-
11
-
-
1842815887
-
-
HAO YANG, HAIYUN LUO, FAN YE, SONGWU LU and AND LIXIA ZHANG, Security in mobile ad hoc networks: Challenges and solutions, IEEE Wireless Communications, 11, pp. 38-47, Feb., 2004.
-
HAO YANG, HAIYUN LUO, FAN YE, SONGWU LU and AND LIXIA ZHANG, Security in mobile ad hoc networks: Challenges and solutions, IEEE Wireless Communications, vol. 11, pp. 38-47, Feb., 2004.
-
-
-
-
12
-
-
6344239815
-
Real-time Intrusion Detection for Ad hoc Networks
-
M. Sci. dissertation, University of Dublin
-
Ioanna Stamouli, "Real-time Intrusion Detection for Ad hoc Networks", M. Sci. dissertation, University of Dublin, 2003
-
(2003)
-
-
Stamouli, I.1
-
13
-
-
0001831930
-
The Resurrecting Duckling: Security Issues for Ad hoc Wireless Networks
-
Cambridge, UK, April
-
F. Stajano, and R. Anderson, "The Resurrecting Duckling: Security Issues for Ad hoc Wireless Networks," Proc. 7th Int'1. Workshop on Security Protocols, Cambridge, UK, April 1999, pp. 172-194.
-
(1999)
Proc. 7th Int'1. Workshop on Security Protocols
, pp. 172-194
-
-
Stajano, F.1
Anderson, R.2
-
14
-
-
0038311863
-
Traffic Analysis: Protocols, Attacks, Design Issues and Open Problems
-
Berkeley, CA, July
-
J.-F. Raymond, "Traffic Analysis: Protocols, Attacks, Design Issues and Open Problems," Proc. Workshop on Design Issues in Anonymity and Unobservability, Berkeley, CA, July 2000, pp. 7-26.
-
(2000)
Proc. Workshop on Design Issues in Anonymity and Unobservability
, pp. 7-26
-
-
Raymond, J.-F.1
-
17
-
-
0036805086
-
Securing the Internet Routing Infrastructure
-
October
-
P. Papadimitratos, and Z.J. Haas, "Securing the Internet Routing Infrastructure," IEEE Communications, vol. 10, no. 40, October 2002, pp. 60-68.
-
(2002)
IEEE Communications
, vol.10
, Issue.40
, pp. 60-68
-
-
Papadimitratos, P.1
Haas, Z.J.2
-
18
-
-
0041973497
-
Packet Leashes: A Defense Against Wormhole Attacks in Wireless Ad hoc Networks
-
San Francisco, CA, April
-
Y.-C. Hu, A. Perrig, and D.B. Johnson, "Packet Leashes: A Defense Against Wormhole Attacks in Wireless Ad hoc Networks," Proc. 22nd Annual Joint Conf. IEEE Computer and Communications Societies (Infocom'03), San Francisco, CA, April 2003
-
(2003)
Proc. 22nd Annual Joint Conf. IEEE Computer and Communications Societies (Infocom'03)
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
19
-
-
1542317831
-
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols
-
San Diego, California, September
-
Yih-Chun Hu, Adrian Perrig, and Dave Johnson. "Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols." In Proceedings of the ACM Workshop on Wireless Security (WiSe), San Diego, California, September 2003.
-
(2003)
Proceedings of the ACM Workshop on Wireless Security (WiSe)
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.3
-
20
-
-
84961572484
-
SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad hoc Networks
-
NY, June
-
Y.-C. Hu, D.B. Johnson, and A. Perrig, "SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad hoc Networks," Proc. 4th IEEE Workshop on Mobile Computing Systems and Applications, Callicoon, NY, June 2002, pp. 3-13.
-
(2002)
Proc. 4th IEEE Workshop on Mobile Computing Systems and Applications, Callicoon
, pp. 3-13
-
-
Hu, Y.-C.1
Johnson, D.B.2
Perrig, A.3
-
21
-
-
0033357103
-
Securing Ad hoc Networks
-
November/December
-
L. Zhou, and Z.J. Haas, "Securing Ad hoc Networks," IEEE Network Magazine, vol. 6, no. 13, November/December 1999, pp. 24-30.
-
(1999)
IEEE Network Magazine
, vol.6
, Issue.13
, pp. 24-30
-
-
Zhou, L.1
Haas, Z.J.2
-
22
-
-
0003597247
-
-
Internet Draft, draft-ietf-manet-dsr-07.txt, February
-
D.B. Johnson, D.A. Maltz, Y.-C. Hu, and J.G. Jetcheva, The Dynamic Source Routing Protocol for Mobile Ad hoc Networks (DSR), Internet Draft, draft-ietf-manet-dsr-07.txt, February 2002.
-
(2002)
The Dynamic Source Routing Protocol for Mobile Ad hoc Networks (DSR)
-
-
Johnson, D.B.1
Maltz, D.A.2
Hu, Y.-C.3
Jetcheva, J.G.4
-
24
-
-
85031307530
-
Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for Mobile Computers
-
ACM Press
-
C.E. Perkins and P. Bhagwat, "Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for Mobile Computers," Proc. SIGCOMM'94 Conf. Communications Architectures, Protocols and Applications, ACM Press, 1994, pp. 234-244.
-
(1994)
Proc. SIGCOMM'94 Conf. Communications Architectures, Protocols and Applications
, pp. 234-244
-
-
Perkins, C.E.1
Bhagwat, P.2
-
25
-
-
17444426121
-
Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks
-
Hu, Yih-Chun, Adrian Perrig, and Dave Johnson. "Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks." In Wireless Networks Journal, 11(1), 2005.
-
(2005)
In Wireless Networks Journal
, vol.11
, Issue.1
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.3
-
26
-
-
51849131519
-
-
A. Perrig, R. Canetti, D. Song and J.D. Tygar, Efficient and secure source authentication for multicast, in: Proceedings of the Network and Distributed System Security Symposium, NDSS'01 (February 2001) pp. 35-46.
-
A. Perrig, R. Canetti, D. Song and J.D. Tygar, Efficient and secure source authentication for multicast, in: Proceedings of the Network and Distributed System Security Symposium, NDSS'01 (February 2001) pp. 35-46.
-
-
-
-
28
-
-
6344273537
-
Secure Message Transmission in Mobile Ad Hoc Networks
-
Elsevier
-
P. Papadimitratos and Z.J. Haas, "Secure Message Transmission in Mobile Ad Hoc Networks," Elsevier Ad Hoc Networks J., Elsevier, vol. 1, no. 1, 2003, pp. 193-209.
-
(2003)
Elsevier Ad Hoc Networks J
, vol.1
, Issue.1
, pp. 193-209
-
-
Papadimitratos, P.1
Haas, Z.J.2
-
29
-
-
15244339622
-
Authenticated Routing for Ad Hoc Networks
-
March
-
Kimaya Sanzgiri, Daniel LaFlamme, Bridget Dahill, Brian Neil Levine, Clay Shields, and Elizabeth M. Belding-Royer, "Authenticated Routing for Ad Hoc Networks", Proceedings of IEEE journal on selected areas in communications, Volume 23, No. 3, March 2005
-
(2005)
Proceedings of IEEE journal on selected areas in communications
, vol.23
, Issue.3
-
-
Sanzgiri, K.1
LaFlamme, D.2
Dahill, B.3
Neil Levine, B.4
Shields, C.5
Belding-Royer, E.M.6
-
30
-
-
84904904836
-
A Secure Routing Protocol for Ad hoc Networks
-
IEEE Press
-
K. Sanzgiri, B. Dahill, B.N. Levine, C. Shields and E.M. Royer, "A Secure Routing Protocol for Ad hoc Networks", Proc. 10th IEEE Int'l. Conf. Network Protocols (ICNP'02), IEEE Press, 2002, pp. 78-87.
-
(2002)
Proc. 10th IEEE Int'l. Conf. Network Protocols (ICNP'02)
, pp. 78-87
-
-
Sanzgiri, K.1
Dahill, B.2
Levine, B.N.3
Shields, C.4
Royer, E.M.5
|