-
1
-
-
39149090875
-
A survey on intrusion detection in mobile Ad Hoc networks
-
Springer
-
T. Anantvalee and J. Wu, "A Survey on Intrusion Detection in Mobile Ad Hoc Networks", Wireless/Mobile Network Security, Springer, 2006.
-
(2006)
Wireless/Mobile Network Security
-
-
Anantvalee, T.1
Wu, J.2
-
2
-
-
1542299118
-
Ad Hoc-VCG: A truthful and cost-efficient routing protocol for mobile Ad Hoc networks with selfish agents
-
L. Anderegg and S. Eidenbenz, "Ad Hoc-VCG: A Truthful and Cost-Efficient Routing Protocol for Mobile Ad Hoc Networks with Selfish Agents", Proc. ACM MobiCom, 2003.
-
(2003)
Proc. ACM MobiCom
-
-
Anderegg, L.1
Eidenbenz, S.2
-
4
-
-
79952179081
-
Distributed and mobility-adaptive clustering for multimedia support in multi-hop wireless networks
-
S. Basagni, "Distributed and Mobility-Adaptive Clustering for Multimedia Support in Multi-Hop Wireless Networks", Proc. IEEE Int'l Vehicular Technology Conf. (VTC), 1999.
-
(1999)
Proc. IEEE Int'l Vehicular Technology Conf. (VTC)
-
-
Basagni, S.1
-
6
-
-
8344229909
-
A cluster-based security architecture for Ad Hoc networks
-
M. Bechler, H. Hof, D. Kraft, F. Pahlke, and L. Wolf, "A Cluster-Based Security Architecture for Ad Hoc Networks", Proc. IEEE INFOCOM, 2004.
-
(2004)
Proc. IEEE INFOCOM
-
-
Bechler, M.1
Hof, H.2
Kraft, D.3
Pahlke, F.4
Wolf, L.5
-
8
-
-
0242696192
-
Performance analysis of the CONFIDANT protocol (cooperation of nodes-fairness in dynamic Ad-Hoc networks)
-
S. Buchegger and J. L. Boudec, "Performance Analysis of the CONFIDANT Protocol (Cooperation of Nodes-Fairness in Dynamic Ad-Hoc Networks)", Proc. ACM MOBIHOC, 2002.
-
(2002)
Proc. ACM MOBIHOC
-
-
Buchegger, S.1
Boudec, J.L.2
-
9
-
-
2442479712
-
IPass: An incentive compatible auction scheme to enable packet forwarding service in MANET
-
K. Chen and K. Nahrstedt, "iPass: An Incentive Compatible Auction Scheme to Enable Packet Forwarding Service in MANET", Proc. Int'l Conf. Distributed Computing Systems, 2004.
-
(2004)
Proc. Int'l Conf. Distributed Computing Systems
-
-
Chen, K.1
Nahrstedt, K.2
-
10
-
-
0035728669
-
Secure group communications for wireless networks
-
B. DeCleene, L. Dondeti, S. Griffin, T. Hardjono, D. Kiwior, J. Kurose, D. Towsley, S. Vasudevan, and C. Zhang, "Secure Group Communications for Wireless Networks", Proc. IEEE Military Comm. Conf. (MILCOM), 2001.
-
(2001)
Proc. IEEE Military Comm. Conf. (MILCOM)
-
-
DeCleene, B.1
Dondeti, L.2
Griffin, S.3
Hardjono, T.4
Kiwior, D.5
Kurose, J.6
Towsley, D.7
Vasudevan, S.8
Zhang, C.9
-
11
-
-
0036957186
-
A BGP based mechanism for lowest-cost routing
-
J. Feigenbaum, C. Papadimitriou, R. Sami, and S. Shenker, "A BGP Based Mechanism for Lowest-Cost Routing", Proc. ACM Symp. Principles of Distributed Computing (PODC), 2002.
-
(2002)
Proc. ACM Symp. Principles of Distributed Computing (PODC)
-
-
Feigenbaum, J.1
Papadimitriou, C.2
Sami, R.3
Shenker, S.4
-
13
-
-
27244436587
-
Comparing elliptic curve cryptography and RSA on 8-Bit CPUs
-
N. Gura, A. Patel, A. Wander, H. Eberle, and S. C. Shantz, "Comparing Elliptic Curve Cryptography and RSA on 8-Bit CPUs", Proc. Workshop Cryptographic Hardware and Embedded Systems (CHES), 2004.
-
(2004)
Proc. Workshop Cryptographic Hardware and Embedded Systems (CHES)
-
-
Gura, N.1
Patel, A.2
Wander, A.3
Eberle, H.4
Shantz, S.C.5
-
14
-
-
21644441634
-
An intrusion detection tool for AODV-based Ad Hoc wireless networks
-
S. Gwalani, K. Srinivasan, G. Vigna, E. M. Beding-Royer, and R. Kemmerer, "An Intrusion Detection Tool for AODV-Based Ad Hoc Wireless Networks", Proc. IEEE Computer Security Applications Conf. (CSAC), 2004.
-
(2004)
Proc. IEEE Computer Security Applications Conf. (CSAC)
-
-
Gwalani, S.1
Srinivasan, K.2
Vigna, G.3
Beding-Royer, E.M.4
Kemmerer, R.5
-
15
-
-
0036957315
-
Ariadne: A secure on-demand routing protocol for Ad Hoc networks
-
Y. Hu, A. Perrig, and D. B. Johnson, "Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks", Proc. ACM MOBICOM, 2002.
-
(2002)
Proc. ACM MOBICOM
-
-
Hu, Y.1
Perrig, A.2
Johnson, D.B.3
-
20
-
-
0031126049
-
A cluster-based approach for routing in dynamic networks
-
P. Krishna, N. H. Vaidya, M. Chatterjee, and D. K. Pradhan, "A Cluster-Based Approach for Routing in Dynamic Networks", Proc. ACM SIGCOMM Computer Comm. Rev., 1997.
-
(1997)
Proc. ACM SIGCOMM Computer Comm. Rev.
-
-
Krishna, P.1
Vaidya, N.H.2
Chatterjee, M.3
Pradhan, D.K.4
-
22
-
-
12244292723
-
Analysis of coalition formaton and cooperation strategies in mobile adhoc networks
-
P. Michiardi and R. Molva, "Analysis of Coalition Formaton and Cooperation Strategies in Mobile Adhoc Networks", J. Ad Hoc Networks, vol. 3, no. 2, pp. 193-219, 2005.
-
(2005)
J. Ad Hoc Networks
, vol.3
, Issue.2
, pp. 193-219
-
-
Michiardi, P.1
Molva, R.2
-
23
-
-
1842665110
-
Intrusion detection in wireless Ad Hoc networks
-
Feb
-
A. Mishra, K. Nadkarni, and A. Patcha, "Intrusion Detection in Wireless Ad Hoc Networks", IEEE Wireless Comm., vol. 11, no. 1, pp. 48-60, Feb. 2004.
-
(2004)
IEEE Wireless Comm.
, vol.11
, Issue.1
, pp. 48-60
-
-
Mishra, A.1
Nadkarni, K.2
Patcha, A.3
-
24
-
-
51649090164
-
A mechanism design-based multi-leader election scheme for intrusion detection in manet
-
N. Mohammed, H. Otrok, L. Wang, M. Debbabi, and P. Bhattacharya, "A Mechanism Design-Based Multi-Leader Election Scheme for Intrusion Detection in Manet", Proc. IEEE Wireless Comm. and Networking Conf. (WCNC), 2008.
-
(2008)
Proc. IEEE Wireless Comm. and Networking Conf. (WCNC)
-
-
Mohammed, N.1
Otrok, H.2
Wang, L.3
Debbabi, M.4
Bhattacharya, P.5
-
26
-
-
84903836776
-
How to misuse AODV: A case study of insider attacks against mobile Ad-Hoc routing protocols
-
P. Ning and K. Sun, "How to Misuse AODV: A Case Study of Insider Attacks against Mobile Ad-Hoc Routing Protocols", Proc. IEEE Information Assurance Workshop, 2003.
-
(2003)
Proc. IEEE Information Assurance Workshop
-
-
Ning, P.1
Sun, K.2
-
28
-
-
84926080684
-
-
Cambridge Univ. Press
-
N. Nisan, T. Roughgarden, E. Tardos, and V. V. Vazirani, Algorithmic Game Theory, first ed. Cambridge Univ. Press, 2007.
-
(2007)
Algorithmic Game Theory, First Ed.
-
-
Nisan, N.1
Roughgarden, T.2
Tardos, E.3
Vazirani, V.V.4
-
29
-
-
39149117050
-
A game-theoretic intrusion detection model for mobile Ad-Hoc networks
-
H. Otrok, N. Mohammed, L. Wang, M. Debbabi, and P. Bhattacharya, "A Game-Theoretic Intrusion Detection Model for Mobile Ad-Hoc Networks", J. Computer Comm., vol. 31, no. 4, pp. 708-721, 2008.
-
(2008)
J. Computer Comm.
, vol.31
, Issue.4
, pp. 708-721
-
-
Otrok, H.1
Mohammed, N.2
Wang, L.3
Debbabi, M.4
Bhattacharya, P.5
-
30
-
-
0242426103
-
The TESLA broadcast authentication protocol
-
A. Perrig, R. Canetti, D. Tygar, and D. Song, "The TESLA Broadcast Authentication Protocol", RSA Cryptobytes, vol. 5, no. 2, pp. 2-13, 2002.
-
(2002)
RSA Cryptobytes
, vol.5
, Issue.2
, pp. 2-13
-
-
Perrig, A.1
Canetti, R.2
Tygar, D.3
Song, D.4
-
32
-
-
38349181460
-
Secure distributed cluster formation in wireless sensor networks
-
K. Sun, P. Peng, P. Ning, and C. Wang, "Secure Distributed Cluster Formation in Wireless Sensor Networks", Proc. IEEE Computer Security Applications Conf. (ACSAC), 2006.
-
(2006)
Proc. IEEE Computer Security Applications Conf. (ACSAC)
-
-
Sun, K.1
Peng, P.2
Ning, P.3
Wang, C.4
-
33
-
-
79952569372
-
Leader election algorithms for wireless Ad Hoc networks
-
S. Vasudevan, B. DeCleene, N. Immerman, J. Kurose, and D. Towsley, "Leader Election Algorithms for Wireless Ad Hoc Networks", Proc. IEEE DARPA Information Survivability Conf. and Exposition (DISCEX III), 2003.
-
(2003)
Proc. IEEE DARPA Information Survivability Conf. and Exposition (DISCEX III)
-
-
Vasudevan, S.1
DeCleene, B.2
Immerman, N.3
Kurose, J.4
Towsley, D.5
-
35
-
-
0034546898
-
Intrusion detection in wireless Ad-Hoc networks
-
Y. Zhang and W. Lee, "Intrusion Detection in Wireless Ad-Hoc Networks", Proc. ACM MobiCom, 2000.
-
(2000)
Proc. ACM MobiCom
-
-
Zhang, Y.1
Lee, W.2
|