-
2
-
-
8344236729
-
Highly secure and efficient routing
-
I. Avramopoulos, H. Kobayashi, R. Wang, and A. Krishnamurthy, "Highly secure and efficient routing," in Proceedings of INFOCOM, 2004.
-
Proceedings of INFOCOM, 2004
-
-
Avramopoulos, I.1
Kobayashi, H.2
Wang, R.3
Krishnamurthy, A.4
-
3
-
-
60949111788
-
ODSBR: An on-demand secure Byzantine resilient routing protocol for wireless ad hoc networks
-
B. Awerbuch, R. Curtmola, D. Holmer, C. Nita-Rotaru, and H. Rubens, "ODSBR: An on-demand secure Byzantine resilient routing protocol for wireless ad hoc networks," ACM Transactions on Information Systems Security, 2007.
-
(2007)
ACM Transactions on Information Systems Security
-
-
Awerbuch, B.1
Curtmola, R.2
Holmer, D.3
Nita-Rotaru, C.4
Rubens, H.5
-
4
-
-
33947624156
-
An acknowledgment-based approach for the detection of routing misbehavior in MANETs
-
May
-
K. Liu, J. Deng, P. K. Varshney, and K. Balakrishnan, "An acknowledgment-based approach for the detection of routing misbehavior in MANETs," IEEE Transactions on Mobile Computing, vol. 6, no. 5, pp. 488-502, May 2007.
-
(2007)
IEEE Transactions on Mobile Computing
, vol.6
, Issue.5
, pp. 488-502
-
-
Liu, K.1
Deng, J.2
Varshney, P.K.3
Balakrishnan, K.4
-
5
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
S. Marti, T. J. Giuli, K. Lai, and M. Baker, "Mitigating routing misbehavior in mobile ad hoc networks," in Proceedings of the ACM Conference on Mobile Computing and Networking (MobiCom), Boston, Massachusetts, USA, 2000.
-
Proceedings of the ACM Conference on Mobile Computing and Networking (MobiCom), Boston, Massachusetts, USA, 2000
-
-
Marti, S.1
Giuli, T.J.2
Lai, K.3
Baker, M.4
-
6
-
-
0031703272
-
Detecting disruptive routers: A distributed network monitoring approach
-
K. A. Bradley, S. Cheung, N. Puketza, B. Mukherjee, and R. A. Olsson, "Detecting disruptive routers: A distributed network monitoring approach," in Proceedings of the IEEE Symposium on Security and Privacy (Oakland), 1998.
-
Proceedings of the IEEE Symposium on Security and Privacy (Oakland), 1998
-
-
Bradley, K.A.1
Cheung, S.2
Puketza, N.3
Mukherjee, B.4
Olsson, R.A.5
-
7
-
-
33748117052
-
Detecting and isolating malicious routers
-
July/September
-
A. T. Mizrak, Y. Cheng, K. Marzullo, and S. Savage, "Detecting and isolating malicious routers," IEEE Transactions on Dependable and Secure Computing, vol. 3, no. 3, pp. 230-244, July/September 2006.
-
(2006)
IEEE Transactions on Dependable and Secure Computing
, vol.3
, Issue.3
, pp. 230-244
-
-
Mizrak, A.T.1
Cheng, Y.2
Marzullo, K.3
Savage, S.4
-
8
-
-
70449436623
-
Detection and accusation of packet forwarding misbehavior in mobile ad-hoc networks
-
June
-
O. F. Gonzalez, G. Ansa, M. Howarth, and G. Pavlou, "Detection and accusation of packet forwarding misbehavior in mobile ad-hoc networks," Journal of Internet Engineering, vol. 2, no. 1, June 2008.
-
(2008)
Journal of Internet Engineering
, vol.2
, Issue.1
-
-
Gonzalez, O.F.1
Ansa, G.2
Howarth, M.3
Pavlou, G.4
-
9
-
-
38449113759
-
Reputation-based routing in hybrid ad hoc networks
-
B. Tourolle, S. Laniepce, and M. Achemlal, "Reputation-based routing in hybrid ad hoc networks," in Mobile Ad-Hoc and Sensor Networks, Third International Conference 2007, 2007, pp. 101-112.
-
Mobile Ad-Hoc and Sensor Networks, Third International Conference 2007, 2007
, pp. 101-112
-
-
Tourolle, B.1
Laniepce, S.2
Achemlal, M.3
|