-
1
-
-
0032621035
-
A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks
-
April
-
E. M. Royer and C. K. Toh, "A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks," IEEE Personal Communications, pp. 46-55, April 1999.
-
(1999)
IEEE Personal Communications
, pp. 46-55
-
-
Royer, E.M.1
Toh, C.K.2
-
3
-
-
0036804761
-
Routing Security in Wireless Ad Hoc Network
-
October
-
H. Deng, W. Li, and D. P. Agrawal, "Routing Security in Wireless Ad Hoc Network," IEEE Communications Magazine, vol. 40, no. 10, October 2002.
-
(2002)
IEEE Communications Magazine
, vol.40
, Issue.10
-
-
Deng, H.1
Li, W.2
Agrawal, D.P.3
-
4
-
-
0034541756
-
Mitigating Routing Misbehavior in Mobile Ad Hoc Networks
-
August
-
S. Marti, T. J. Giuli, K. Lai, and M. Baker, "Mitigating Routing Misbehavior in Mobile Ad Hoc Networks," 6th Int'l. Conference Mobile Comp. Net, pp. 255-265, August 2000.
-
(2000)
6th Int'l. Conference Mobile Comp. Net
, pp. 255-265
-
-
Marti, S.1
Giuli, T.J.2
Lai, K.3
Baker, M.4
-
5
-
-
78349285372
-
-
Glomosim, http://pcl.cs.ucla.edu/projects/glomosim/
-
Glomosim
-
-
-
6
-
-
0036638646
-
Scalable Routing Protocols for Mobile Ad Hoc Networks
-
July/August
-
X. Hong, K. Xu, and M. Gerla, "Scalable Routing Protocols for Mobile Ad Hoc Networks," IEEE Network Magazine, July/August, 2002, pp. 11-21.
-
(2002)
IEEE Network Magazine
, pp. 11-21
-
-
Hong, X.1
Xu, K.2
Gerla, M.3
-
7
-
-
0033357103
-
Securing Ad Hoc Networks
-
November/December
-
L. Zhou and Z. J. Haas, "Securing Ad Hoc Networks," IEEE Network Magazine, vol. 13, no. 6, November/December 1999.
-
(1999)
IEEE Network Magazine
, vol.13
, Issue.6
-
-
Zhou, L.1
Haas, Z.J.2
-
8
-
-
0004118143
-
A Secure Routing Protocol for Ad Hoc Networks,
-
Technical Report UM-CS-2001
-
K. Sanzgiri, B. Dahill, B. N. Levine, C. Shields, and E. M. Belding-Royer, "A Secure Routing Protocol for Ad Hoc Networks," Technical Report UM-CS-2001.
-
-
-
Sanzgiri, K.1
Dahill, B.2
Levine, B.N.3
Shields, C.4
Belding-Royer, E.M.5
-
9
-
-
0000629443
-
Dynamic Source Routing in Ad Hoc Wireless Networks
-
edited by Tomasz Imielinski and Hank Korth, Chapter 5, pp, Kluwer Academic Publishers
-
D. B. Johnson and D A. Maltz, "Dynamic Source Routing in Ad Hoc Wireless Networks," Mobile Computing, edited by Tomasz Imielinski and Hank Korth, Chapter 5, pp 153-181, Kluwer Academic Publishers, 1996.
-
(1996)
Mobile Computing
, pp. 153-181
-
-
Johnson, D.B.1
Maltz, D.A.2
-
10
-
-
1842815887
-
Security in Mobile Ad Hoc Networks: Challenges and Solutions
-
February
-
H.Yang, H. Luo, F. Ye, S. Lu, and L. Zhang, "Security in Mobile Ad Hoc Networks: Challenges and Solutions," IEEE Wireless Communications, Vol. 11, No. 1, pp. 38-47, February 2004.
-
(2004)
IEEE Wireless Communications
, vol.11
, Issue.1
, pp. 38-47
-
-
Yang, H.1
Luo, H.2
Ye, F.3
Lu, S.4
Zhang, L.5
-
11
-
-
84883869163
-
Self-securing Ad Hoc Wireless Networks
-
Italy
-
H. Luo, P. Zerfos, J. Kong, S. Lu, and L. Zhang, "Self-securing Ad Hoc Wireless Networks," IEEE Symposium on Computers and Communications, 2002, Italy.
-
(2002)
IEEE Symposium on Computers and Communications
-
-
Luo, H.1
Zerfos, P.2
Kong, J.3
Lu, S.4
Zhang, L.5
-
12
-
-
1642307979
-
Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks
-
Las Vegas, NV, USA, June
-
S. Ramaswamy, H. Fu, M. Sreekantaradhya, J. Dixon, and K. Nygard, "Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks," ICWN'03, Las Vegas, NV, USA, June 2003.
-
(2003)
ICWN'03
-
-
Ramaswamy, S.1
Fu, H.2
Sreekantaradhya, M.3
Dixon, J.4
Nygard, K.5
-
13
-
-
0036986441
-
An On-Demand Secure Routing Protocol Resilient to Byzantine Failures
-
Atlanta, Georgia, Sept
-
Baruch Awerbuch, David Holmer, Cristina NitaRotaru, and Herbert Rubens, "An On-Demand Secure Routing Protocol Resilient to Byzantine Failures," ACM Workshop on Wireless Security (WiSe), Atlanta, Georgia, Sept. 2002.
-
(2002)
ACM Workshop on Wireless Security (WiSe)
-
-
Awerbuch, B.1
Holmer, D.2
NitaRotaru, C.3
Rubens, H.4
-
14
-
-
60749137326
-
-
S. Capkuny, L. Butty'an, and J. P. Hubaux, Self-Organized Public-Key Management for Mobile Ad Hoc Networks, Technical Report at EPFL.
-
S. Capkuny, L. Butty'an, and J. P. Hubaux, "Self-Organized Public-Key Management for Mobile Ad Hoc Networks," Technical Report at EPFL.
-
-
-
-
15
-
-
0011256357
-
Routing Security in Ad Hoc Networks,
-
Technical Report, Helsinki University of Technology
-
J. Lundberg, "Routing Security in Ad Hoc Networks," Technical Report, Helsinki University of Technology, 2000.
-
(2000)
-
-
Lundberg, J.1
-
16
-
-
60749135199
-
-
M. Just, E. Kranakis, and T. Wan, Resisting Malicious Packet Dropping in Wireless Ad Hoc Networks, In proceedings of 2nd Annual Conference on Ad hoc Networks and Wireless, Montreal, Canada, Oct. 2003.
-
M. Just, E. Kranakis, and T. Wan, "Resisting Malicious Packet Dropping in Wireless Ad Hoc Networks," In proceedings of 2nd Annual Conference on Ad hoc Networks and Wireless, Montreal, Canada, Oct. 2003.
-
-
-
|