-
1
-
-
35148864700
-
Wimax- potential commercial off-theshelf solution for tactical mobile mesh communications
-
B. Hartzog and T. Brown, "Wimax- potential commercial off-theshelf solution for tactical mobile mesh communications," Milcom, 2006.
-
(2006)
Milcom
-
-
Hartzog, B.1
Brown, T.2
-
3
-
-
33845564340
-
Securing vehicular communications
-
DOI 10.1109/WC-M.2006.250352
-
M. Raya, P. Papadimitratos, and J. Hubaux, "Securing vehicular communications," IEEE Wireless Comm. Magazine, vol.13, no. 5, pp. 8-15, 2006. (Pubitemid 44934142)
-
(2006)
IEEE Wireless Communications
, vol.13
, Issue.5
, pp. 8-15
-
-
Raya, M.1
Papadimitratos, P.2
Hubaux, J.-P.3
-
4
-
-
2442551009
-
Optimized link state routing protocol (olsr)
-
T. Clausen and P. Jacquet, "Optimized link state routing protocol (olsr)," IETF RFC 3626, 2003.
-
(2003)
IETF RFC 3626
-
-
Clausen, T.1
Jacquet, P.2
-
5
-
-
34347349933
-
Ad-hoc on-demand distance vector routing
-
C. Perkins and E. Royer, "Ad-hoc on-demand distance vector routing," IEEE WMCSA, 1999.
-
(1999)
IEEE WMCSA
-
-
Perkins, C.1
Royer, E.2
-
6
-
-
67249133693
-
Alarm: Anonymous locationaided routing in suspicious manets
-
K. El Defrawy and G. Tsudik, "Alarm: Anonymous locationaided routing in suspicious manets," IEEE ICNP, 2007.
-
(2007)
IEEE ICNP
-
-
El Defrawy, K.1
Tsudik, G.2
-
7
-
-
4544304744
-
The sybil attack
-
J. R. Douceur, "The sybil attack," IPTPS, 2001.
-
(2001)
IPTPS
-
-
Douceur, J.R.1
-
8
-
-
38049094878
-
Privacy-preserving set operations
-
L. Kissner and D. Song, "Privacy-preserving set operations," CRYPTO, 2005.
-
(2005)
CRYPTO
-
-
Kissner, L.1
Song, D.2
-
9
-
-
33749514463
-
Srdp: Securing route discovery in dsr
-
J. Kim and G. Tsudik, "Srdp: Securing route discovery in dsr," MobiQuitous, 2005.
-
(2005)
MobiQuitous
-
-
Kim, J.1
Tsudik, G.2
-
10
-
-
17444426121
-
Ariadne: A secure on-demand routing protocol for ad hoc networks
-
DOI 10.1007/s11276-004-4744-y
-
Y.-C. Hu, A. Perrig, and D. B. Johnson, "Ariadne: A secure on-demand routing protocol for ad hoc networks," Wirel. Netw., vol.11, no. 1-2, pp. 21-38, 2005. (Pubitemid 40536374)
-
(2005)
Wireless Networks
, vol.11
, Issue.1-2
, pp. 21-38
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
13
-
-
6344227625
-
Secure position-aided ad hoc routing
-
S. Carter and A. Yasinsac, "Secure position-aided ad hoc routing," CCN, 2002.
-
(2002)
CCN
-
-
Carter, S.1
Yasinsac, A.2
-
17
-
-
0242696170
-
Anodr: Anonymous on demand routing with untraceable routes for mobile ad-hoc networks
-
J. Kong and X. Hong, "Anodr: anonymous on demand routing with untraceable routes for mobile ad-hoc networks," MobiHoc, 2003.
-
(2003)
MobiHoc
-
-
Kong, J.1
Hong, X.2
-
18
-
-
50049110705
-
Discount anonymous on demand routing for mobile ad hoc networks
-
M. J. L. Yang and S. Wetzel, "Discount anonymous on demand routing for mobile ad hoc networks," SECURECOMM, 2006.
-
(2006)
SECURECOMM
-
-
Yang, M.J.L.1
Wetzel, S.2
-
20
-
-
39049114200
-
Distributed anonymous secure routing protocol in wireless mobile ad hoc networks
-
Y. Cheng and D. Agrawal, "Distributed anonymous secure routing protocol in wireless mobile ad hoc networks," OPNETWORK, 2005.
-
(2005)
OPNETWORK
-
-
Cheng, Y.1
Agrawal, D.2
-
21
-
-
67249117045
-
Odar: On-demand anonymous routing in ad hoc networks
-
D. Sy, R. Chen, and L. Bao, "Odar: On-demand anonymous routing in ad hoc networks," IEEE MASS, 2006.
-
(2006)
IEEE MASS
-
-
Sy, D.1
Chen, R.2
Bao, L.3
-
22
-
-
18944373619
-
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks
-
A. Boukerche and K. E.-K. et al., "An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks," Elsevier Computer Communications, 2005.
-
(2005)
Elsevier Computer Communications
-
-
Boukerche, A.K.E.-K.1
-
23
-
-
0038675868
-
A survey of mobility models for ad hoc network research
-
T. Camp, J. Boleng, and V. Davies, "A survey of mobility models for ad hoc network research," Wireless Communications & Mobile Computing (WCMC), no. 5, pp. 483-502.
-
Wireless Communications & Mobile Computing (WCMC)
, Issue.5
, pp. 483-502
-
-
Camp, T.1
Boleng, J.2
Davies, V.3
-
24
-
-
85017404375
-
A group mobility model for ad hoc wireless networks
-
X. Hong, M. Gerla, G. Pei, and C. Chinag, "A group mobility model for ad hoc wireless networks," ACM/IEEE MSWiM, 1999.
-
(1999)
ACM/IEEE MSWiM
-
-
Hong, X.1
Gerla, M.2
Pei, G.3
Chinag, C.4
-
27
-
-
24944577209
-
Signature schemes and anonymous credentials from bilinear maps
-
J. Camenisch and A. Lysyanskaya, "Signature schemes and anonymous credentials from bilinear maps," CRYPTO, 2004.
-
(2004)
CRYPTO
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
28
-
-
67249091868
-
Leak-free group signatures with immediate revocation
-
X. Ding, G. Tsudik, and S. Xu, "Leak-free group signatures with immediate revocation," IEEE ICDCS, 2004.
-
(2004)
IEEE ICDCS
-
-
Ding, X.1
Tsudik, G.2
Xu, S.3
-
29
-
-
67249124250
-
An efficient group signature scheme from bilinear maps
-
J. Furukawa and H. Imai, "An efficient group signature scheme from bilinear maps," IEICE TFECCS, 2005.
-
(2005)
IEICE TFECCS
-
-
Furukawa, J.1
Imai, H.2
|