-
1
-
-
84894523610
-
-
OPNET™ modeler 14.5. http://www.opnet.com/solutions/network-rd/ modeler.html.
-
OPNET™ Modeler 14.5
-
-
-
2
-
-
0003580691
-
-
IEEE 802.11 standard. http://standards.ieee.org/getieee802/download/802. 11-2007.pdf, 2007.
-
(2007)
IEEE 802.11 Standard
-
-
-
3
-
-
84892617033
-
A survey of tcp over ad hoc networks
-
A. Al Hanbali, E. Altman, and P. Nain. A survey of tcp over ad hoc networks. IEEE Communications Surveys & Tutorials, 7(3):22-36, 2005.
-
(2005)
IEEE Communications Surveys & Tutorials
, vol.7
, Issue.3
, pp. 22-36
-
-
Al Hanbali, A.1
Altman, E.2
Nain, P.3
-
6
-
-
1442310343
-
Commitment schemes and zero-knowledge protocols
-
I. Damgard. Commitment schemes and zero-knowledge protocols. Lecture notes in computer science, 1561:63-86, 1999.
-
(1999)
Lecture Notes in Computer Science
, vol.1561
, pp. 63-86
-
-
Damgard, I.1
-
8
-
-
60449113417
-
Energy-efficient link-layer jamming attacks against WSN MAC protocols
-
Y. W. Law, M. Palaniswami, L. V. Hoesel, J. Doumen, P. Hartel, and P. Havinga. Energy-efficient link-layer jamming attacks against WSN MAC protocols. ACM Transactions on Sensor Networks, 5(1):1-38, 2009.
-
(2009)
ACM Transactions on Sensor Networks
, vol.5
, Issue.1
, pp. 1-38
-
-
Law, Y.W.1
Palaniswami, M.2
Hoesel, L.V.3
Doumen, J.4
Hartel, P.5
Havinga, P.6
-
10
-
-
0017959977
-
Secure communications over insecure channels
-
R. C. Merkle. Secure communications over insecure channels. Communincations of the ACM, 21(4):294-299, 1978.
-
(1978)
Communincations of the ACM
, vol.21
, Issue.4
, pp. 294-299
-
-
Merkle, R.C.1
-
13
-
-
84947912552
-
All-or-nothing encryption and the package transform
-
R. Rivest. All-or-nothing encryption and the package transform. Lecture Notes in Computer Science, pages 210-218, 1997.
-
(1997)
Lecture Notes in Computer Science
, pp. 210-218
-
-
Rivest, R.1
-
18
-
-
51949113065
-
Intelligent jamming in wireless networks with applications to 802.11b and other networks
-
D. Thuente and M. Acharya. Intelligent jamming in wireless networks with applications to 802.11b and other networks. In Proceedings of the IEEE MILCOM, 2006.
-
Proceedings of the IEEE MILCOM, 2006
-
-
Thuente, D.1
Acharya, M.2
-
19
-
-
29844457889
-
The feasibility of launching and detecting jamming attacks in wireless networks
-
W. Xu, W. Trappe, Y. Zhang, and T. Wood. The feasibility of launching and detecting jamming attacks in wireless networks. In Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing, pages 46-57, 2005.
-
(2005)
Proceedings of the 6th ACM International Symposium on Mobile Ad Hoc Networking and Computing
, pp. 46-57
-
-
Xu, W.1
Trappe, W.2
Zhang, Y.3
Wood, T.4
-
20
-
-
11244260535
-
Channel surfing and spatial retreats: Defenses against wireless denial of service
-
W. Xu, T. Wood, W. Trappe, and Y. Zhang. Channel surfing and spatial retreats: defenses against wireless denial of service. In Proceedings of the 3rd ACM workshop on Wireless security, pages 80-89, 2004.
-
(2004)
Proceedings of the 3rd ACM Workshop on Wireless Security
, pp. 80-89
-
-
Xu, W.1
Wood, T.2
Trappe, W.3
Zhang, Y.4
|