-
2
-
-
0036980203
-
Securing IPv6 neighbor and router discovery
-
D. Maughan and N. Vaidya, editors, ACM Press
-
J. Arkko, T. Aura, J. Kempf, V. Mäntylä, P. Nikander, and M. Roe. Securing IPv6 neighbor and router discovery. In D. Maughan and N. Vaidya, editors, Proceedings of the ACM Workshop on Wireless Security, September 28, 2002, Atlanta, Georgia, USA, pages 77-86. ACM Press, 2002.
-
(2002)
Proceedings of the ACM Workshop on Wireless Security, September 28, 2002, Atlanta, Georgia, USA
, pp. 77-86
-
-
Arkko, J.1
Aura, T.2
Kempf, J.3
Mäntylä, V.4
Nikander, P.5
Roe, M.6
-
3
-
-
0036986441
-
An on-demand secure routing protocol resilient to byzantine failures
-
D. Maughan and N. Vaidya, editors, ACM Press
-
B. Awerbuch, D. Holmer, C. Nita-Rotaru, and H. Rubens. An on-demand secure routing protocol resilient to byzantine failures. In D. Maughan and N. Vaidya, editors, Proceedings of the ACM Workshop on Wireless Security, September 28, 2002, Atlanta, Georgia, USA, pages 21-30. ACM Press, 2002.
-
(2002)
Proceedings of the ACM Workshop on Wireless Security, September 28, 2002, Atlanta, Georgia, USA
, pp. 21-30
-
-
Awerbuch, B.1
Holmer, D.2
Nita-Rotaru, C.3
Rubens, H.4
-
4
-
-
0242696192
-
Performance analysis of the CONFIDANT protocol (cooperation of nodes: Fairness in dynamic ad-hoc networks)
-
J. Hubaux, J. J. Garcia-Luna-Aceves, and D. Johnson, editors, ACM Press
-
S. Buchegger and J.-Y. L. Boudec. Performance analysis of the CONFIDANT protocol (cooperation of nodes: Fairness in dynamic ad-hoc networks). In J. Hubaux, J. J. Garcia-Luna-Aceves, and D. Johnson, editors, Proceedings of The Third ACM International Symposium on Mobile Ad Hoc Networking and Computing, 9-11 June, 2002, Lausanne, Switzerland, pages 226-236. ACM Press, 2002.
-
(2002)
Proceedings of the Third ACM International Symposium on Mobile Ad Hoc Networking and Computing, 9-11 June, 2002, Lausanne, Switzerland
, pp. 226-236
-
-
Buchegger, S.1
Boudec, J.-Y.L.2
-
5
-
-
3042562089
-
The optimized link state routing protocol, evaluation through experiments and simulation
-
IEEE Press
-
T. Clausen, G. Hansen, L. Christensen, and G. Behrmann. The optimized link state routing protocol, evaluation through experiments and simulation. In Proceedings 4th International Symposium on Wireless Personal Multimedia Communications, September 9-12, 2001, Aalborg, Denmark, pages 841-846. IEEE Press, 2001.
-
(2001)
Proceedings 4th International Symposium on Wireless Personal Multimedia Communications, September 9-12, 2001, Aalborg, Denmark
, pp. 841-846
-
-
Clausen, T.1
Hansen, G.2
Christensen, L.3
Behrmann, G.4
-
7
-
-
0012843931
-
ZRP - A hybrid framework for routing in ad hoc networks
-
C. Perkins, editor, chapter 7, Addison-Wesley
-
Z. Haas and M. Pearlman. ZRP - A hybrid framework for routing in ad hoc networks. In C. Perkins, editor, Ad Hoc Networking, chapter 7, pages 221-253. Addison-Wesley, 2001.
-
(2001)
Ad Hoc Networking
, pp. 221-253
-
-
Haas, Z.1
Pearlman, M.2
-
8
-
-
0014413249
-
The tragedy of the commons
-
G. Hardin. The tragedy of the commons. Science, 162(3859):1243-1246, 1968.
-
(1968)
Science
, vol.162
, Issue.3859
, pp. 1243-1246
-
-
Hardin, G.1
-
9
-
-
38049018110
-
NSS: An NTRU lattice-based signature scheme
-
B. Pfitzmann, editor, Springer
-
J. Hoffstein, J. Pipher, and J. Silverman. NSS: An NTRU lattice-based signature scheme. In B. Pfitzmann, editor, Advances in Cryptology - EUROCRYPT 2001, International Conference on the Theory and Application of Cryptographic Techniques, May 6-10, 2001, Innsbruck, Austria, volume 2045 of Lecture Notes in Computer Science, pages 211-228. Springer, 2001.
-
(2001)
Advances in Cryptology - EUROCRYPT 2001, International Conference on the Theory and Application of Cryptographic Techniques, May 6-10, 2001, Innsbruck, Austria, Volume 2045 of Lecture Notes in Computer Science
, vol.2045
, pp. 211-228
-
-
Hoffstein, J.1
Pipher, J.2
Silverman, J.3
-
10
-
-
77951167227
-
Packet leashes: A defense against wormhole attacks in wireless ad hoc networks
-
IEEE Press, to appear
-
Y. Hu, A. Perrig, and D. Johnson. Packet leashes: A defense against wormhole attacks in wireless ad hoc networks. In Proceedings of the Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies, April 1-3, 2003, San Fransisco, CA, USA. IEEE Press, 2003, to appear.
-
(2003)
Proceedings of the Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies, April 1-3, 2003, San Fransisco, CA, USA
-
-
Hu, Y.1
Perrig, A.2
Johnson, D.3
-
15
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
R. Pickholtz, S. Das, R. Caceres, and J. J. Garcia-Luna-Aceves, editors, ACM Press
-
S. Marti, T. J. Giuli, K. Lai, and M. Baker. Mitigating routing misbehavior in mobile ad hoc networks. In R. Pickholtz, S. Das, R. Caceres, and J. J. Garcia-Luna-Aceves, editors, Proceedings of the Sixth Annual International Conference on Mobile Computing and Networking, August 6-11, 2000, Boston, Massachusetts, USA, pages 255-265. ACM Press, 2000.
-
(2000)
Proceedings of the Sixth Annual International Conference on Mobile Computing and Networking, August 6-11, 2000, Boston, Massachusetts, USA
, pp. 255-265
-
-
Marti, S.1
Giuli, T.J.2
Lai, K.3
Baker, M.4
-
16
-
-
85113133621
-
CORE: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks
-
B. Jerman-Blazic and T. Klobucar, editors, Kluwer Academic
-
P. Michiardi and R. Molva. CORE: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In B. Jerman-Blazic and T. Klobucar, editors, Communications and Multimedia Security, IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security, September 26-27, 2002, Portoroz, Slovenia, volume 228 of IFIP Conference Proceedings, pages 107-121, Kluwer Academic, 2002.
-
(2002)
Communications and Multimedia Security, IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security, September 26-27, 2002, Portoroz, Slovenia, Volume 228 of IFIP Conference Proceedings
, vol.228
, pp. 107-121
-
-
Michiardi, P.1
Molva, R.2
-
17
-
-
0004024262
-
The ad hoc on-demand distance-vector protocol
-
C. Perkins, editor, chapter 6, Addison-Wesley
-
C. Perkins and E. Royer. The ad hoc on-demand distance-vector protocol. In C. Perkins, editor, Ad Hoc Networking, chapter 6, pages 173-219. Addison-Wesley, 2001.
-
(2001)
Ad Hoc Networking
, pp. 173-219
-
-
Perkins, C.1
Royer, E.2
-
18
-
-
84947251443
-
The resurrecting duckling: Security issues for ad-hoc wireless networks
-
B. Christianson, B. Crispo, and M. Roe, editors, Springer
-
F. Stajano and R. Anderson. The resurrecting duckling: Security issues for ad-hoc wireless networks. In B. Christianson, B. Crispo, and M. Roe, editors, Security Protocols, 7th International Workshop, April 19-21, 1999, Cambridge, UK, volume 1796 of Lecture Notes in Computer Science, pages 172-194. Springer, 2000.
-
(2000)
Security Protocols, 7th International Workshop, April 19-21, 1999, Cambridge, UK, Volume 1796 of Lecture Notes in Computer Science
, vol.1796
, pp. 172-194
-
-
Stajano, F.1
Anderson, R.2
-
19
-
-
6344271642
-
Security vulnerabilities in ad hoc networks
-
HW Communications Ltd., July
-
P. Yau and C. J. Mitchell. Security vulnerabilities in ad hoc networks. In The Seventh International Symposium on Communication Theory and Applications, July 13-18, 2003, Ambleside, Lake District, UK, pages 99-104. HW Communications Ltd., July 2003.
-
(2003)
The Seventh International Symposium on Communication Theory and Applications, July 13-18, 2003, Ambleside, Lake District, UK
, pp. 99-104
-
-
Yau, P.1
Mitchell, C.J.2
-
20
-
-
6344245579
-
Towards the security of routing in ad hoc networks
-
C. J. Mitchell, editor, chapter 10, IEE Press
-
P. Yau and V. Sdralia. Towards the security of routing in ad hoc networks. In C. J. Mitchell, editor, Security for Mobility, chapter 10, pages 231-268. IEE Press, 2004.
-
(2004)
Security for Mobility
, pp. 231-268
-
-
Yau, P.1
Sdralia, V.2
|