-
1
-
-
0742294233
-
Mobile ad hoc networking: Imperatives and challenges
-
Chlamtac I, Conti M, Liu JJ-N. Mobile ad hoc networking: imperatives and challenges. Ad Hoc Networks 2003; 1(1): 13-64.
-
(2003)
Ad Hoc Networks
, vol.1
, Issue.1
, pp. 13-64
-
-
Chlamtac, I.1
Conti, M.2
Liu, J.J.-N.3
-
2
-
-
84937555407
-
Traffic analysis: Protocols, attacks, design issues, and open problems
-
Anonymity 2000
-
Raymond J-F. Traffic analysis: protocols, attacks, design issues, and open problems. In Anonymity 2000, LNCS 2009, 2001; pp. 10-29.
-
(2001)
LNCS
, vol.2009
, pp. 10-29
-
-
Raymond, J.-F.1
-
3
-
-
85008543309
-
Provably secure on-demand source routing in mobile ad hoc networks
-
Acs G, Buttyán L, Vajda I. Provably secure on-demand source routing in mobile ad hoc networks. IEEE Transactions on Mobile Computing 2006; 5(11): 1533-1546.
-
(2006)
IEEE Transactions on Mobile Computing
, vol.5
, Issue.11
, pp. 1533-1546
-
-
Acs, G.1
Buttyán, L.2
Vajda, I.3
-
4
-
-
17444426121
-
Ariadne: A secure on-demand routing protocol for ad hoc networks
-
Hu Y-C, Perrig A, Johnson DB. Ariadne: a secure on-demand routing protocol for ad hoc networks. Wireless Networks 2005; 11(1-2): 21-38.
-
(2005)
Wireless Networks
, vol.11
, Issue.1-2
, pp. 21-38
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
13
-
-
27544485427
-
Leap-frog packet linking and diverse key distributions for improved integrity in network broadcasts
-
May
-
Goodrich MT. Leap-frog packet linking and diverse key distributions for improved integrity in network broadcasts. In Proceedings of IEEE Symposium on Security and Privacy, May 2005; pp. 196-207.
-
(2005)
Proceedings of IEEE Symposium on Security and Privacy
, pp. 196-207
-
-
Goodrich, M.T.1
-
15
-
-
85071707831
-
-
IEEE Computer Society LAN/MAN Standards Committee. Part 11: Wireless LAN, medium access control (MAC) and physical layer (PHY) specifications. Standard ANSI/IEEE 802.11, IEEE, Inc., 1999.
-
IEEE Computer Society LAN/MAN Standards Committee. Part 11: Wireless LAN, medium access control (MAC) and physical layer (PHY) specifications. Standard ANSI/IEEE 802.11, IEEE, Inc., 1999.
-
-
-
-
17
-
-
0034771605
-
SPINS: Security protocols for sensor networks
-
July
-
Perrig A, Szewczyk R, Wen V, Culler D, Tygar JD. SPINS: security protocols for sensor networks. In Proceedings of the Seventh Annual International Conference on Mobile Computing and Networking (MobiCom), July 2001; pp. 189-199.
-
(2001)
Proceedings of the Seventh Annual International Conference on Mobile Computing and Networking (MobiCom)
, pp. 189-199
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, J.D.5
-
18
-
-
85071700774
-
-
Dierks T, Allen C. The TLS protocol version 1.0. RFC 2246, January 1999
-
Dierks T, Allen C. The TLS protocol version 1.0. RFC 2246, January 1999.
-
-
-
-
20
-
-
84943553152
-
Establishing pair-wise keys for secure communication in ad hoc networks: A probabilistic approach
-
Zhu S, Xu S, Setia S, Jajodia S. Establishing pair-wise keys for secure communication in ad hoc networks: a probabilistic approach. In Proceedings of IEEE ICNP, 2003.
-
(2003)
Proceedings of IEEE ICNP
-
-
Zhu, S.1
Xu, S.2
Setia, S.3
Jajodia, S.4
-
24
-
-
0003417978
-
Glomosim: A scalable network simulation environment, v2.03
-
Los Angeles, CA, December
-
Zeng X, Bagrodia R, Gerla M. Glomosim: a scalable network simulation environment, v2.03. Parallel Computing Lab, UC Los Angeles, CA, December 2000.
-
(2000)
Parallel Computing Lab, UC
-
-
Zeng, X.1
Bagrodia, R.2
Gerla, M.3
-
25
-
-
25644450392
-
Perfect simulation and stationarity of a class of mobility models
-
Le Boudec J-Y, Vojnovic M. Perfect simulation and stationarity of a class of mobility models. In Proceedings of IEEE INFOCOM, 2005; pp. 2743-2754.
-
(2005)
Proceedings of IEEE INFOCOM
, pp. 2743-2754
-
-
Le Boudec, J.-Y.1
Vojnovic, M.2
|