-
1
-
-
0013138682
-
Secure routing for mobile ad hoc networks
-
San Antonio, TX, January 27-31
-
P. Papadimitratos, Z.J. Haas, Secure routing for mobile ad hoc networks, in: Proceedings of the SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002), San Antonio, TX, January 27-31, 2002.
-
(2002)
Proceedings of the SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002)
-
-
Papadimitratos, P.1
Haas, Z.J.2
-
2
-
-
0003899978
-
The secure routing protocol (SRP) for ad hoc networks
-
draft-papadimitratos-secure-routing-protocol-00.txt, December
-
P. Papadimitratos, Z.J. Haas, P. Samar, The secure routing protocol (SRP) for ad hoc networks, Internet Draft, draft-papadimitratos-secure-routing- protocol-00.txt, December 2002.
-
(2002)
Internet Draft
-
-
Papadimitratos, P.1
Haas, Z.J.2
Samar, P.3
-
3
-
-
0024641589
-
Efficient dispersal of information for security, load balancing, and fault tolerance
-
M.O. Rabin, Efficient dispersal of information for security, load balancing, and fault tolerance, J. ACM 36 (2) (1989) 335-348.
-
(1989)
J. ACM
, vol.36
, Issue.2
, pp. 335-348
-
-
Rabin, M.O.1
-
4
-
-
0003196107
-
HMAC: Keyedhashing for message authentication
-
February
-
H. Krawczyk, M. Bellare, R. Canetti, HMAC: Keyedhashing for message authentication, RFC 2104, February 1997.
-
(1997)
RFC
, vol.2104
-
-
Krawczyk, H.1
Bellare, M.2
Canetti, R.3
-
5
-
-
84943745348
-
Secure link state routing for mobile ad hoc networks
-
Orlando, FL, January
-
P. Papadimitratos, Z.J. Haas, Secure link state routing for mobile ad hoc networks, in: Proceedings of the IEEE CS Workshop on Security and Assurance in Ad hoc Networks, in conjunction with the 2003 International Symposium on Applications and the Internet, Orlando, FL, January 2003.
-
(2003)
Proceedings of the IEEE CS Workshop on Security and Assurance in Ad Hoc Networks, in Conjunction with the 2003 International Symposium on Applications and the Internet
-
-
Papadimitratos, P.1
Haas, Z.J.2
-
6
-
-
0035507501
-
Multipath routing in the presence of frequent topological changes
-
A. Tsirigos, Z.J. Haas, Multipath routing in the presence of frequent topological changes, IEEE Comm. Mag. (November) (2001) 132-138.
-
(2001)
IEEE Comm. Mag.
, Issue.NOVEMBER
, pp. 132-138
-
-
Tsirigos, A.1
Haas, Z.J.2
-
7
-
-
85106319926
-
A Performance comparison of multi-hop wireless ad hoc network routing protocols
-
J. Broch, D.A. Maltz, D.B. Johnson, Y-C. Hu, J. Jetcheva, A Performance comparison of multi-hop wireless ad hoc network routing protocols, in: Proceedings of the 4th International Conference on Mobile Computing (Mobicom'98), 1998.
-
(1998)
Proceedings of the 4th International Conference on Mobile Computing (Mobicom'98)
-
-
Broch, J.1
Maltz, D.A.2
Johnson, D.B.3
Hu, Y.-C.4
Jetcheva, J.5
-
8
-
-
0003068282
-
Security architecture for the Internet protocol
-
November
-
S. Kent, R. Atkinson, Security architecture for the Internet protocol, IETF RFC 2401, November 1998.
-
(1998)
IETF RFC
, vol.2401
-
-
Kent, S.1
Atkinson, R.2
-
9
-
-
0003254362
-
IP authentication header
-
November
-
S. Kent, R. Atkinson, IP authentication header, IETF FC 2402, November 1998.
-
(1998)
IETF FC
, vol.2402
-
-
Kent, S.1
Atkinson, R.2
-
10
-
-
0003315822
-
IP Encapsulating security payload
-
November
-
S. Kent, R. Atkinson, IP Encapsulating security payload, IETF FC 2406, November 1998.
-
(1998)
IETF FC
, vol.2406
-
-
Kent, S.1
Atkinson, R.2
-
11
-
-
0003357112
-
Internet security association and key management protocol
-
November
-
D. Maughan, M. Schertler, M. Schneider, J. Turner, Internet security association and key management protocol, IETF RFC 2408, November 1998.
-
(1998)
IETF RFC
, vol.2408
-
-
Maughan, D.1
Schertler, M.2
Schneider, M.3
Turner, J.4
-
13
-
-
0003324496
-
Stream control transmission protocol
-
October
-
R. Stewart et al., Stream control transmission protocol, IETF RFC 2960, October 2000.
-
(2000)
IETF RFC
, vol.2960
-
-
Stewart, R.1
-
14
-
-
0031352149
-
TCP-Boston: A fragmentationtolerant TCP protocol for ATM networks
-
Kobe, Japan, April
-
A. Bestavros, G. Kim, TCP-Boston: A fragmentationtolerant TCP protocol for ATM networks, in: Proceedings of the IEEE Infocom'97, Kobe, Japan, April 1997.
-
(1997)
Proceedings of the IEEE Infocom'97
-
-
Bestavros, A.1
Kim, G.2
-
15
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
Boston, MA, August
-
S. Marti, T.J. Giuli, K. Lai, M. Baker, Mitigating routing misbehavior in mobile ad hoc networks, in: Proceedings of the 6th MobiCom, Boston, MA, August 2000.
-
(2000)
Proceedings of the 6th MobiCom
-
-
Marti, S.1
Giuli, T.J.2
Lai, K.3
Baker, M.4
-
16
-
-
84954161437
-
Enforcing service availability in mobile ad hoc WANs
-
Boston, MA, August
-
L. Buttyan, J.P. Hubaux, Enforcing service availability in mobile ad hoc WANs, in: Proceedings of the 1st MobiHoc, Boston, MA, August 2000.
-
(2000)
Proceedings of the 1st MobiHoc
-
-
Buttyan, L.1
Hubaux, J.P.2
-
18
-
-
0001262977
-
Probabilistic algorithms in finite fields
-
M.O. Rabin, Probabilistic algorithms in finite fields, SIAM J. Comput. 9 (1980).
-
(1980)
SIAM J. Comput.
, vol.9
-
-
Rabin, M.O.1
-
19
-
-
0344095743
-
Using elliptic curve Diffie-Hellman in the SPKM GSS-API
-
August
-
R. Zucceratto, C. Adams, Using elliptic curve Diffie-Hellman in the SPKM GSS-API, IETF Internet Draft, August 1999.
-
(1999)
IETF Internet Draft
-
-
Zucceratto, R.1
Adams, C.2
-
20
-
-
1542341244
-
Performance evaluation of the CONFIDANT protocol
-
Lausanne, Switzerland, June
-
S. Buchegger, J.Y. LeBoudec, Performance evaluation of the CONFIDANT protocol, in: Proceedings of the Third ACM Symposium on Mobile Ad Hoc Networking & Computing (MobiHoc 2002), Lausanne, Switzerland, June 2002.
-
(2002)
Proceedings of the Third ACM Symposium on Mobile Ad Hoc Networking & Computing (MobiHoc 2002)
-
-
Buchegger, S.1
Leboudec, J.Y.2
-
21
-
-
0036986441
-
An on-demand secure routing protocol resilent to byzantine failures
-
Atlanta, GA, September
-
B. Awerbuch, D. Holmer, C. Nita-Rotaru, H. Rubens, An on-demand secure routing protocol resilent to byzantine failures, in: Proceedings of the ACM WiSe 2002, Atlanta, GA, September 2002.
-
(2002)
Proceedings of the ACM WiSe 2002
-
-
Awerbuch, B.1
Holmer, D.2
Nita-Rotaru, C.3
Rubens, H.4
-
22
-
-
0004115996
-
-
Prentice Hall, Upper Saddle River, NJ
-
R.K. Ahuja, T.L. Magnati, J.B. Olin, Network Flows, Prentice Hall, Upper Saddle River, NJ, 1993.
-
(1993)
Network Flows
-
-
Ahuja, R.K.1
Magnati, T.L.2
Olin, J.B.3
-
25
-
-
0004118143
-
A secure routing protocol for ad hoc networks
-
EE&CS, University of Michigan, August
-
B. Dahill, B.N. Levine, E. Royer, C. Shields, A secure routing protocol for ad hoc networks, Technical Report UM-CS-2001-037, EE&CS, University of Michigan, August 2001.
-
(2001)
Technical Report
, vol.UM-CS-2001-037
-
-
Dahill, B.1
Levine, B.N.2
Royer, E.3
Shields, C.4
-
26
-
-
0242453871
-
Securing ad hoc routing protocols
-
Atlanta, GA, September
-
M.G. Zapata, N. Asokan, Securing ad hoc routing protocols, in: Proceedings of the ACM WiSe 2002, Atlanta, GA, September 2002.
-
(2002)
Proceedings of the ACM WiSe 2002
-
-
Zapata, M.G.1
Asokan, N.2
-
27
-
-
0242527360
-
Path set selection in mobile ad hoc networks
-
Lausanne, Switzerland, June
-
P. Papadimitratos, Z.J. Haas, E.G. Sirer, Path set selection in mobile ad hoc networks, in: Proceedings of the Third ACM Symposium on Mobile Ad Hoc Networking & Computing (MobiHoc 2002), Lausanne, Switzerland, June 2002.
-
(2002)
Proceedings of the Third ACM Symposium on Mobile Ad Hoc Networking & Computing (MobiHoc 2002)
-
-
Papadimitratos, P.1
Haas, Z.J.2
Sirer, E.G.3
|