-
1
-
-
0036924859
-
Flooding-based geocasting protocols for mobile ad hoc networks
-
Y. B. Ko and N. H. Vaidya, "Flooding-based geocasting protocols for mobile ad hoc networks," Mob. Netw. Appl., volT 7, no. 6, 2002.
-
(2002)
Mob. Netw. Appl
, vol.7 T
, Issue.6
-
-
Ko, Y.B.1
Vaidya, N.H.2
-
2
-
-
0035016827
-
Anonymous gossip: Improving multicast reliability in mobile ad-hoc networks
-
R. Chandra, V. Ramasubramanian, and K. Birman, "Anonymous gossip: Improving multicast reliability in mobile ad-hoc networks," in Proc. of ICDCS, 2001.
-
(2001)
Proc. of ICDCS
-
-
Chandra, R.1
Ramasubramanian, V.2
Birman, K.3
-
3
-
-
0034499548
-
GeoTORA: A protocol for geocasting in mobile ad hoc networks
-
IEEE
-
Y-B. Ko and N. H. Vaidya, "GeoTORA: a protocol for geocasting in mobile ad hoc networks," in Proc. of ICNP. IEEE. 2000. p. 240.
-
(2000)
Proc. of ICNP
, pp. 240
-
-
Ko, Y.-B.1
Vaidya, N.H.2
-
4
-
-
0035268368
-
Scalable multicasting: The core-assisted mesh protocol
-
E. L. Madruga and J. J. Garcia-Luna-Aceves, "Scalable multicasting: the core-assisted mesh protocol," Mob. Netw. Appl., vol. 6, no. 2, 2001.
-
(2001)
Mob. Netw. Appl
, vol.6
, Issue.2
-
-
Madruga, E.L.1
Garcia-Luna-Aceves, J.J.2
-
5
-
-
0036924499
-
On-demand multicast routing protocol in multihop wireless mobile networks
-
S. J. Lee, W. Su, and M. Gerla, "On-demand multicast routing protocol in multihop wireless mobile networks," Mob. Netw. Appl., 2002.
-
(2002)
Mob. Netw. Appl
-
-
Lee, S.J.1
Su, W.2
Gerla, M.3
-
6
-
-
11144257116
-
Multicast ad-hoc on-demand distance vector (MAODV) routing
-
July
-
E. M. Rqyer and C. E. Perkins, "Multicast ad-hoc on-demand distance vector (MAODV) routing," in Internet Draft, July 2000.
-
(2000)
Internet Draft
-
-
Rqyer, E.M.1
Perkins, C.E.2
-
7
-
-
0035789901
-
Adaptive demand-driven multicast routing in multi-hop wireless ad hoc networks
-
J. G. Jetcheva and D. B. Johnson, "Adaptive demand-driven multicast routing in multi-hop wireless ad hoc networks." in Proc. of MobiHoc, 2001, pp. 33-44.
-
(2001)
Proc. of MobiHoc
, pp. 33-44
-
-
Jetcheva, J.G.1
Johnson, D.B.2
-
8
-
-
0036980106
-
Coping with communication gray zones in IEEE 802.11b based ad hoc networks
-
ACM Press
-
H. Lundgren, E. Nordstrom, and C. Tschudin, "Coping with communication gray zones in IEEE 802.11b based ad hoc networks," in Proc. of WOWMOM '02. ACM Press, 2002, pp. 49-55.
-
(2002)
Proc. of WOWMOM '02
, pp. 49-55
-
-
Lundgren, H.1
Nordstrom, E.2
Tschudin, C.3
-
9
-
-
1542359009
-
A high-throughput path metric For multi-hop wireless routing
-
ACM
-
D. S. J. D. Couto, D. Aguayo, J. C. Bicket, and R. Morris, "A high-throughput path metric For multi-hop wireless routing," in Proc. of MOBICOM '03. ACM, 2003, pp. 134-146.
-
(2003)
Proc. of MOBICOM '03
, pp. 134-146
-
-
Couto, D.S.J.D.1
Aguayo, D.2
Bicket, J.C.3
Morris, R.4
-
10
-
-
33947641587
-
High-throughput multicast routing metrics in wireless mesh networks
-
S. Roy, D. Koutsonikolas, S. Das, and C. Hu, "High-throughput multicast routing metrics in wireless mesh networks," in Proc. of ICDCS '06, 2006.
-
(2006)
Proc. of ICDCS '06
-
-
Roy, S.1
Koutsonikolas, D.2
Das, S.3
Hu, C.4
-
12
-
-
34347254802
-
The medium time metric: High throughput route selection in multirate ad hoc wireless networks
-
B. Awerbuch, D. Holmer, and H. Rubens, "The medium time metric: High throughput route selection in multirate ad hoc wireless networks," MONET, Spec. Iss. on Internet Wireless Access: 802.11 and Bevond, 2005.
-
(2005)
MONET, Spec. Iss. on Internet Wireless Access: 802.11 and Bevond
-
-
Awerbuch, B.1
Holmer, D.2
Rubens, H.3
-
13
-
-
19544389145
-
A multiradio unification protocol for ieee 802.11 wireless networks
-
A. Adya. P. Bahl, J. Padhye, A. Wolman, and L. Zhou," "A multiradio unification protocol for ieee 802.11 wireless networks," in Proc. of BroadNets '04, 2004.
-
(2004)
Proc. of BroadNets '04
-
-
Adya, A.1
Bahl, P.2
Padhye, J.3
Wolman, A.4
Zhou, L.5
-
15
-
-
11244335412
-
Routing in multi-radio, multi-hop wireless mesh networks
-
ACM
-
R. Draves, J. Padhye, and B. Zill, "Routing in multi-radio, multi-hop wireless mesh networks," in Proc. of MOBICOM '04. ACM, 2004.
-
(2004)
Proc. of MOBICOM '04
-
-
Draves, R.1
Padhye, J.2
Zill, B.3
-
16
-
-
0013138682
-
Secure routing for mobile ad hoc networks
-
January
-
P. Papadimitratos and Z. Haas, "Secure routing for mobile ad hoc networks," in Proc. of CNDS, January 2002, pp. 27-31.
-
(2002)
Proc. of CNDS
, pp. 27-31
-
-
Papadimitratos, P.1
Haas, Z.2
-
17
-
-
84961572484
-
SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks
-
June
-
Y.-C. Hu, D. B. Johnson, and A. Perrig, "SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks," in Proc. of WMCSA, June 2002.
-
(2002)
Proc. of WMCSA
-
-
Hu, Y.-C.1
Johnson, D.B.2
Perrig, A.3
-
18
-
-
0036957315
-
Ariadne: A secure on-demand routing protocol for ad hoc networks
-
Y.-C. Hu, A. Perrig, and D. B. Johnson, "Ariadne: A secure on-demand routing protocol for ad hoc networks," in Proc. of MOBICOM, 2002.
-
(2002)
Proc. of MOBICOM
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
19
-
-
0842283101
-
A secure routing protocol for ad hoc networks
-
K. Sanzgiri, B. Dahill, B. N. Levine, C. Shields, and E. Belding-Royer, "A secure routing protocol for ad hoc networks," in Proc. of ICNP, 2002.
-
(2002)
Proc. of ICNP
-
-
Sanzgiri, K.1
Dahill, B.2
Levine, B.N.3
Shields, C.4
Belding-Royer, E.5
-
20
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
August
-
S. Marti, T. Giuli, K. Lai, and M. Baker, "Mitigating routing misbehavior in mobile ad hoc networks," in Proc. of MOBICOM, August 2000.
-
(2000)
Proc. of MOBICOM
-
-
Marti, S.1
Giuli, T.2
Lai, K.3
Baker, M.4
-
21
-
-
1542287664
-
Secure data transmission in mobile ad hoc networks
-
P. Papadimitratos and Z. Haas, "Secure data transmission in mobile ad hoc networks," in Proc. of WiSe, 2003, pp. 41-50.
-
(2003)
Proc. of WiSe
, pp. 41-50
-
-
Papadimitratos, P.1
Haas, Z.2
-
23
-
-
48049089717
-
On the survivability of routingprotocols in ad hoc wireless networks
-
IEEE
-
B. Awerbuch, R. Curtmola, D. Holmer, C. Nita-Rotaru, and H. Rubens, "On the survivability of routingprotocols in ad hoc wireless networks," in Proc. of SecureComm'05. IEEE, 2005.
-
(2005)
Proc. of SecureComm'05
-
-
Awerbuch, B.1
Curtmola, R.2
Holmer, D.3
Nita-Rotaru, C.4
Rubens, H.5
-
24
-
-
33845497487
-
Securing MAODV: Attacks and countermeasures
-
IEEE
-
S. Roy, V. G. Addada, S. Setia, and S. Jajodia, "Securing MAODV: Attacks and countermeasures," in Proc. of SECON '05. IEEE, 2005.
-
(2005)
Proc. of SECON '05
-
-
Roy, S.1
Addada, V.G.2
Setia, S.3
Jajodia, S.4
-
25
-
-
48049116219
-
BSMR: Byzantine-resilient secure multicast routing in multi-hop wireless networks
-
June
-
R. Curtmola and C. Nita-Rotaru, "BSMR: Byzantine-resilient secure multicast routing in multi-hop wireless networks," in Proc. of IEEE SECON '07, June 2007.
-
(2007)
Proc. of IEEE SECON '07
-
-
Curtmola, R.1
Nita-Rotaru, C.2
-
26
-
-
13844302260
-
Comparison of routing metrics for static multi-hop wireless networks
-
R. Draves, J. Padhye. and B. Zill, "Comparison of routing metrics for static multi-hop wireless networks," in Proc. of SIGCOMM '04, 2004.
-
(2004)
Proc. of SIGCOMM '04
-
-
Draves, R.1
Padhye, J.2
Zill, B.3
-
27
-
-
52049119349
-
High-throughput multicast routing metrics in wireless mesh networks
-
S. Roy, D. Koutsonikolas, S. Das, and C. Hu, "High-throughput multicast routing metrics in wireless mesh networks," Elsevier Ad Hoc Ntwks, 2007.
-
(2007)
Elsevier Ad Hoc Ntwks
-
-
Roy, S.1
Koutsonikolas, D.2
Das, S.3
Hu, C.4
-
28
-
-
3042667172
-
Rushing attacks and defense in wireless ad hoc network routing protocols
-
Y.-C. Hu, A. Perrig. and D. B. Johnson, "Rushing attacks and defense in wireless ad hoc network routing protocols," in Proc. of WiSe. 2003.
-
(2003)
Proc. of WiSe
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
29
-
-
0041973497
-
Packet leashes: A defense against wormhole attacks in wireless ad hoc networks
-
Y.-C. Hu. A. Perrig, and D. B. Johnson, "Packet leashes: A defense against wormhole attacks in wireless ad hoc networks," in Proc. of INFOCOM, 2003.
-
(2003)
Proc. of INFOCOM
-
-
Perrig, Y.-C.H.A.1
Johnson, D.B.2
-
30
-
-
46149096001
-
Truelink: A practical countermeasure to the wormhole attack in wireless networks
-
J. Eriksson, S. V. Krishnamurthy, and M. Faloutsos, "Truelink: A practical countermeasure to the wormhole attack in wireless networks," in Proc. of ICNP '06, 2006.
-
(2006)
Proc. of ICNP '06
-
-
Eriksson, J.1
Krishnamurthy, S.V.2
Faloutsos, M.3
-
31
-
-
84977898401
-
Using directional antennas to prevent wormhole attacks
-
L. Hu and D. Evans, "Using directional antennas to prevent wormhole attacks," in Proc. of NDSS, 2004.
-
(2004)
Proc. of NDSS
-
-
Hu, L.1
Evans, D.2
-
32
-
-
15744368857
-
Efficient and secure source authentication for multicast
-
February
-
A. Perrig, R. Canetti, D. Song, and D. Tygar, "Efficient and secure source authentication for multicast, in Proc. of NDSS, February 2001.
-
(2001)
Proc. of NDSS
-
-
Perrig, A.1
Canetti, R.2
Song, D.3
Tygar, D.4
-
33
-
-
52049110580
-
Secure Neighbor Discovery in Wireless Networks: Formal Investigation of Possiblity,
-
Tech. Rep
-
M. Poturalski, P. Papadimitratos, and J.-P. Hubaux, "Secure Neighbor Discovery in Wireless Networks: Formal Investigation of Possiblity," Tech. Rep., 2007.
-
(2007)
-
-
Poturalski, M.1
Papadimitratos, P.2
Hubaux, J.-P.3
|