-
1
-
-
34948813452
-
-
R. Molva, P. Michiardi, Security in Ad hoc Networks, PWC 2003, pp. 756-775, 2003
-
R. Molva, P. Michiardi, "Security in Ad hoc Networks," PWC 2003, pp. 756-775, 2003
-
-
-
-
2
-
-
0033357103
-
Securing ad hoc networks
-
Nov./Dec
-
L. Zhou and Z. J. Haas, "Securing ad hoc networks," IEEE Network Magazine, vol. 13, No. 6, pp. 24-30, Nov./Dec. 1999.
-
(1999)
IEEE Network Magazine
, vol.13
, Issue.6
, pp. 24-30
-
-
Zhou, L.1
Haas, Z.J.2
-
3
-
-
0013138682
-
Secure routing for mobile ad hoc networks
-
San Antonio, TX, Jan. 27-31, pp
-
P. Papadimitratos and Z. J. Haas, "Secure routing for mobile ad hoc networks," in Proa SCS CNDS, San Antonio, TX, Jan. 27-31, pp. 193-204, 2002.
-
(2002)
Proa SCS CNDS
, pp. 193-204
-
-
Papadimitratos, P.1
Haas, Z.J.2
-
4
-
-
0034229404
-
Network information flow
-
R. Ahlswede, N. Cai, S. Li, and R. Yeung. "Network information flow," IEEE Trans. on Information Theory, vol. 46, No. 4, pp. 1204-1216, 2000.
-
(2000)
IEEE Trans. on Information Theory
, vol.46
, Issue.4
, pp. 1204-1216
-
-
Ahlswede, R.1
Cai, N.2
Li, S.3
Yeung, R.4
-
5
-
-
33947399169
-
A random linear network coding approach to multicast
-
Oct
-
T. Ho, M. Médard, R. Koetter, D. Karger, M. Effros, J. Shi, and B. Leong, "A random linear network coding approach to multicast," IEEE Trans. on Inform. Theory, vol. 52, pp. 4413-4430, Oct. 2006.
-
(2006)
IEEE Trans. on Inform. Theory
, vol.52
, pp. 4413-4430
-
-
Ho, T.1
Médard, M.2
Koetter, R.3
Karger, D.4
Effros, M.5
Shi, J.6
Leong, B.7
-
7
-
-
2942656255
-
Secure routing in wireless sensor networks: Attacks and countermeasures
-
C. Karlof, D. Wagneer, "Secure routing in wireless sensor networks: attacks and countermeasures", Ad hoc Networks, Elsevier, pp. 293-315, 2003.
-
(2003)
Ad hoc Networks, Elsevier
, pp. 293-315
-
-
Karlof, C.1
Wagneer, D.2
-
8
-
-
77950998038
-
Detecting Selective Forwarding Attacks in Wireless Sensor Networks
-
B. Yu, B. Xiao, "Detecting Selective Forwarding Attacks in Wireless Sensor Networks", Proceedings IEEE, 2006
-
(2006)
Proceedings IEEE
-
-
Yu, B.1
Xiao, B.2
-
9
-
-
84982832461
-
On the intruder Detection for Sinkhole Attack in Wireless Sensor Networks
-
E. C. H Ngai, J. Liu and M R. Lyu, "On the intruder Detection for Sinkhole Attack in Wireless Sensor Networks," Proc. IEEE ICC, 2006.
-
(2006)
Proc. IEEE
, vol.199
-
-
Ngai, E.C.H.1
Liu, J.2
Lyu, M.R.3
-
10
-
-
5044242517
-
Bizantine modification detection in multicast networks using randomized network coding
-
T. Ho, B. Leong, R. Koetter, M. Médard, M. Effros and D.R. Karger, "Bizantine modification detection in multicast networks using randomized network coding", Proc. IEEE International Symposium of Information Theory, pp. 114, 2004.
-
(2004)
Proc. IEEE International Symposium of Information Theory
, pp. 114
-
-
Ho, T.1
Leong, B.2
Koetter, R.3
Médard, M.4
Effros, M.5
Karger, D.R.6
-
11
-
-
57349131861
-
Analysis of Interference in Ad-Hoc Networks
-
Thesis, August
-
M. Burkhart, R. Wattenhofer, A. Zoollinger, "Analysis of Interference in Ad-Hoc Networks", Thesis, Swiss Federal Institute of Technology Zurich, -August 2003.
-
(2003)
Swiss Federal Institute of Technology Zurich
-
-
Burkhart, M.1
Wattenhofer, R.2
Zoollinger, A.3
|