-
1
-
-
2342625273
-
Analysis of multipath routing, part2: Mitigation of the effects of frequently changing network topologies
-
Mar.
-
A. Tsirigos and Z.J. Haas, "Analysis of multipath routing, part2: Mitigation of the effects of frequently changing network topologies," IEEE Transactions on Wireless Communications, vol. 3, no. 2, pp. 500-511, Mar. 2004.
-
(2004)
IEEE Transactions on Wireless Communications
, vol.3
, Issue.2
, pp. 500-511
-
-
Tsirigos, A.1
Haas, Z.J.2
-
2
-
-
15244339622
-
Authenticated Routing for Ad Hoc Networks
-
Mar.
-
K. Sanzgiri ea al., "Authenticated Routing for Ad Hoc Networks," IEEE journal on selected areas in communications, vol. 23, no. 3, pp. 598-610, Mar. 2005.
-
(2005)
IEEE Journal on Selected Areas in Communications
, vol.23
, Issue.3
, pp. 598-610
-
-
Sanzgiri, K.1
-
3
-
-
33750029995
-
SecMR - A secure multipath routing protocol for ad hoc networks
-
Jan.
-
R. Mavropodi et al., "SecMR - a secure multipath routing protocol for ad hoc networks," Ad Hoc Networks, vol. 5, no. 1, pp. 87-99, Jan. 2007.
-
(2007)
Ad Hoc Networks
, vol.5
, Issue.1
, pp. 87-99
-
-
Mavropodi, R.1
-
4
-
-
60049091288
-
SPREAD: Improving network security by multipath routing in mobile ad hoc networks
-
Apr.
-
W. Lou et al., "SPREAD: Improving network security by multipath routing in mobile ad hoc networks," Wireless Networks, vol. 15, no.3, pp. 279-294, Apr. 2009.
-
(2009)
Wireless Networks
, vol.15
, Issue.3
, pp. 279-294
-
-
Lou, W.1
-
7
-
-
33748622050
-
MASK: Anonymous On-Demand Routing in Mobile Ad Hoc Networks
-
Sep.
-
Y. Zhang et al., "MASK: Anonymous On-Demand Routing in Mobile Ad Hoc Networks," IEEE transactions on wireless communication, vol. 5, no. 9, pp. 2376-2385, Sep. 2006.
-
(2006)
IEEE Transactions on Wireless Communication
, vol.5
, Issue.9
, pp. 2376-2385
-
-
Zhang, Y.1
-
9
-
-
34347244961
-
An Identity-Free and On-Demand Routing Scheme against Anonymity Threats in Mobile Ad Hoc Networks
-
Aug.
-
J. Kong et al., "An Identity-Free and On-Demand Routing Scheme against Anonymity Threats in Mobile Ad Hoc Networks," IEEE transactions on mobile computing, vol. 6, no. 8, pp. 888-902, Aug. 2007.
-
(2007)
IEEE Transactions on Mobile Computing
, vol.6
, Issue.8
, pp. 888-902
-
-
Kong, J.1
-
11
-
-
34248678132
-
A secure anonymous routing protocol with authenticated key exchange for ad hoc networks
-
Jul.
-
R. Lu et al., "A secure anonymous routing protocol with authenticated key exchange for ad hoc networks," Computer Standards and Interfaces, vol. 29, no. 5, pp. 521-527, Jul. 2007.
-
(2007)
Computer Standards and Interfaces
, vol.29
, Issue.5
, pp. 521-527
-
-
Lu, R.1
-
12
-
-
49549085074
-
Improving the security of a secure anonymous routing protocol with authenticated key exchange for ad hoc networks
-
May.
-
H. MS et al., "Improving the security of a secure anonymous routing protocol with authenticated key exchange for ad hoc networks," Computer Systems Science and Engineering, vol. 23, no. 3, pp. 227-234, May. 2008.
-
(2008)
Computer Systems Science and Engineering
, vol.23
, Issue.3
, pp. 227-234
-
-
Ms, H.1
-
13
-
-
58249118260
-
Trust Enhanced Anonymous Routing in Mobile Ad-Hoc Networks
-
M. Shao and S. Huang, "Trust Enhanced Anonymous Routing in Mobile Ad-Hoc Networks," in Proc. the Ninth International Conference on Parallel and Distributed Computing, Applications and Technologies, 2008, pp. 335-341.
-
Proc. the Ninth International Conference on Parallel and Distributed Computing, Applications and Technologies, 2008
, pp. 335-341
-
-
Shao, M.1
Huang, S.2
-
14
-
-
54849405011
-
Improving security and performance of an Ad Hoc network through a multipath routing strategy
-
Nov.
-
H. Aiache et al., "Improving security and performance of an Ad Hoc network through a multipath routing strategy," Journal in Computer Virology, vol. 4, no. 4, pp. 267-278, Nov. 2008.
-
(2008)
Journal in Computer Virology
, vol.4
, Issue.4
, pp. 267-278
-
-
Aiache, H.1
-
15
-
-
67650409732
-
ARMR: Anonymous routing protocol with multiple routes for communications in mobile ad hoc networks
-
doi:10.1016/j.adhoc.2009.04.010
-
Y. Dong et al., "ARMR: Anonymous routing protocol with multiple routes for communications in mobile ad hoc networks," Ad Hoc Networks (2009), doi:10.1016/j.adhoc.2009.04.010.
-
(2009)
Ad Hoc Networks
-
-
Dong, Y.1
-
16
-
-
0018545449
-
How to Share a Secret
-
Nov.
-
A. Shamir, "How to Share a Secret," Communications of the ACM, vol. 22, no. 11, pp. 612-613, Nov. 1979.
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
18
-
-
0041473688
-
Intrusion detection techniques for mobile wireless networks
-
Sep.
-
Y. Zhang et al., "Intrusion detection techniques for mobile wireless networks," Wireless Networks, vol. 9, no. 5, pp. 545-556, Sep. 2003.
-
(2003)
Wireless Networks
, vol.9
, Issue.5
, pp. 545-556
-
-
Zhang, Y.1
|