-
2
-
-
0000629443
-
Dynamic source routing routing in ad hoc wireless networks
-
Johnson DB, Maltz DA. Dynamic source routing routing in ad hoc wireless networks. Mobile Computing 1996; 353; 153-181.
-
(1996)
Mobile Computing
, vol.353
, pp. 153-181
-
-
Johnson, D.B.1
Maltz, D.A.2
-
3
-
-
0242426103
-
The TESLA broadcast authentication protocol
-
Perrig A, Canetti R, Tygar JD, Song D. The TESLA broadcast authentication protocol. Cryptobytes 2002 5(2), 2002.
-
(2002)
Cryptobytes
, vol.5
, Issue.2
, pp. 2002
-
-
Perrig, A.1
Canetti, R.2
Tygar, J.D.3
Song, D.4
-
4
-
-
15244339622
-
An authenticated routing protocol for secure ad hoc networks
-
Sanzgiri K, Dahill B, LaFlamme D, Levine BN, Shields C, Belding-Royer EM. An authenticated routing protocol for secure ad hoc networks. In Proceedings of Journal Selected Areas in Communication (JSAC), vol. 23, 2005; pp. 598-610.
-
(2005)
In Proceedings of Journal Selected Areas In Communication (JSAC)
, vol.23
, pp. 598-610
-
-
Sanzgiri, K.1
Dahill, B.2
Laflamme, D.3
Levine, B.N.4
Shields, C.5
Belding-Royer, E.M.6
-
7
-
-
0345757359
-
COCA: A secure distributed on-line certification authority
-
Zhou L, Schneider FB, van Renesse R. COCA: a secure distributed on-line certification authority. In Proceedings of ACM Transactions on Computer Systems, vol. 20, no. 4, 2002; 329-368.
-
(2002)
Proceedings of ACM Transactions On Computer Systems
, vol.20
, Issue.4
, pp. 329-368
-
-
Zhou, L.1
Schneider, F.B.2
van Renesse, R.3
-
8
-
-
8344229909
-
Cluster-based security architecture for ad hoc networks
-
Bechler M, Hof H-J, Kraft D, Pahlke F, Wolf L. A Cluster-based security architecture for ad hoc networks. In Proceedings of IEEE INFOCOM'2004, 2004; 2393-2403.
-
(2004)
Proceedings of IEEE INFOCOM'2004
, pp. 2393-2403
-
-
Bechler, M.1
Hof, H.-J.2
Kraft, D.3
Pahlke, F.4
Wolf, L.A.5
-
15
-
-
34548050159
-
Providing distributed certificate authority service in mobile ad hoc networks
-
Dong Y, Go HW, Sui AF, Li VOK, Hui LCK, Yiu SM. Providing distributed certificate authority service in mobile ad hoc networks. In Proceedings of Computer Communication journal, vol. 30, 2007; 2442-2452.
-
(2007)
In Proceedings of Computer Communication Journal
, vol.30
, pp. 2442-2452
-
-
Dong, Y.1
Go, H.W.2
Sui, A.F.3
Li, V.O.K.4
Hui, L.C.K.5
Yiu, S.M.6
-
16
-
-
0035704362
-
Providing robust and ubiquitous security support for mobile Ad hoc networks
-
Kong J, Zerfos P, Luo H, Lu S, Zhang L. Providing robust and ubiquitous security support for mobile Ad hoc networks. In Proceedings of International Conference in Network Protocols (ICNP'01), 2001.
-
(2001)
Proceedings of International Conference In Network Protocols (ICNP'01)
-
-
Kong, J.1
Zerfos, P.2
Luo, H.3
Lu, S.4
Zhang, L.5
-
17
-
-
34047142151
-
Building a virtual hierarchy to simplify certification path discovery in mobile Ad hoc networks
-
Satizabal C, Hernandez-Serrano J, Forné J, Pegueroles J. Building a virtual hierarchy to simplify certification path discovery in mobile Ad hoc networks. In Proceedings of Computer Communication journal, vol. 30, 2007; 1498-1512, 2007.
-
(2007)
In Proceedings of Computer Communication Journal
, vol.30
, Issue.2007
, pp. 1498-1512
-
-
Satizabal, C.1
Hernandez-Serrano, J.2
Forné, J.3
Pegueroles, J.4
-
18
-
-
3142719292
-
Multicluster, mobile, multimedia radio network
-
Gerla M, Tsai JT-C. Multicluster, mobile, multimedia radio network. In Proceedings of ACM/Baltzer Journal of Wireless Networks. vol. 1, (no. 3), 1995; 255-265.
-
(1995)
In Proceedings of ACM/Baltzer Journal of Wireless Networks
, vol.1
, Issue.3
, pp. 255-265
-
-
Gerla, M.1
Tsai, J.T.-C.2
-
19
-
-
0002334456
-
Routing in clustered multihop mobile wireless networks with fading channel
-
Chiang C, Wu H, Liu W, Gerla M. Routing in clustered multihop mobile wireless networks with fading channel. In Proceedings of IEEE SICON'97, 1997; 197-211.
-
(1997)
Proceedings of IEEE SICON'97
, pp. 197-211
-
-
Chiang, C.1
Wu, H.2
Liu, W.3
Gerla, M.4
-
24
-
-
4544324338
-
DOMINO: A system to detect greedy behavior in IEEE 802.11 hotspots
-
Raya M, Hubaux J-P, Aad I. DOMINO: a system to detect greedy behavior in IEEE 802.11 hotspots. In Proceedings of the 2nd international conference on Mobile systems, applications, and services (MobiSys'04), 2004; 84-97.
-
(2004)
Proceedings of The 2nd International Conference On Mobile Systems, Applications, and Services (MobiSys'04)
, pp. 84-97
-
-
Raya, M.1
Hubaux, J.-P.2
Aad, I.3
-
25
-
-
33750915973
-
Modeling and analysis of predictable random backoff in selfish environments
-
Torremolinos, Malaga, Spain
-
Guang L, Assi C, Benslimane A. Modeling and analysis of predictable random backoff in selfish environments. In Proceedings of the 9-th ACM/IEEE international symposium on modeling, analysis and simulation of wireless and mobile systems (MSWiM'2006), Torremolinos, Malaga, Spain, 2006.
-
(2006)
Proceedings of The 9-th Acm/IEEE International Symposium On Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM'2006)
-
-
Guang, L.1
Assi, C.2
Benslimane, A.3
-
27
-
-
84886059094
-
A secure architecture for mobile ad hoc networks
-
Lecture Notes in Computer Science, Hong Kong, China
-
Rachedi A, Benslimane A. A secure architecture for mobile ad hoc networks. In Proceedings of International Conference on Mobile Ad hoc and Sensor Networks (MSN'06), Lecture Notes in Computer Science, vol. 4325, Hong Kong, China, 2006; 424-435.
-
(2006)
Proceedings of International Conference On Mobile Ad hoc and Sensor Networks (MSN'06)
, vol.4325
, pp. 424-435
-
-
Rachedi, A.1
Benslimane, A.2
-
29
-
-
4544297908
-
Critical density threshold in distributed wireless networks
-
Kluwer: Dordrecht
-
Krishnamachari B, Wicker SB, Bejar R, Pearlman M. Critical density threshold in distributed wireless networks. In Communications, Information and Network Security. Kluwer: Dordrecht, 2002; 1-15.
-
(2002)
Communications, Information and Network Security
, pp. 1-15
-
-
Krishnamachari, B.1
Wicker, S.B.2
Bejar, R.3
Pearlman, M.4
|