-
2
-
-
1842815887
-
Security in mobile ad hoc networks: Challenges and solutions
-
1536-1284
-
Yang, H., Luo, H.Y., Ye, F., Lu, S.W., and Zhang, L.: ' Security in mobile ad hoc networks: challenges and solutions ', IEEE Wirel. Commun., 2004, p. 38-47 1536-1284
-
(2004)
IEEE Wirel. Commun.
, pp. 38-47
-
-
Yang, H.1
Luo, H.Y.2
Ye, F.3
Lu, S.W.4
Zhang, L.5
-
3
-
-
34548323745
-
Attack analysis and detection for ad hoc routing protocols
-
Huang, Y.A., and Lee, W.: ' Attack analysis and detection for ad hoc routing protocols ', Lecture Notes in Computer Science, 2004, p. 125-145
-
(2004)
Lecture Notes in Computer Science
, pp. 125-145
-
-
Huang, Y.A.1
Lee, W.2
-
4
-
-
33947166858
-
DH-based communication method for cluster-based ad hoc networks
-
Chang, C.C., Lin, K.C., and Lee, J.S.: ' DH-based communication method for cluster-based ad hoc networks ', Proc. Second Asia Pacific Conf. on Mobile Technology, Applications and Systems, 2005, p. 1-8
-
(2005)
Proc. Second Asia Pacific Conf. on Mobile Technology, Applications and Systems
, pp. 1-8
-
-
Chang, C.C.1
Lin, K.C.2
Lee, J.S.3
-
5
-
-
33845753004
-
Inter-cluster routing authentication for ad hoc networks by a hierarchical key scheme
-
Huang, Y.M., Lin, H.Y., and Wang, T.I.: ' Inter-cluster routing authentication for ad hoc networks by a hierarchical key scheme ', J. Comput. Sci. Technol., 2006, 21, (6), p. 997-1011
-
(2006)
J. Comput. Sci. Technol.
, vol.21
, Issue.6
, pp. 997-1011
-
-
Huang, Y.M.1
Lin, H.Y.2
Wang, T.I.3
-
6
-
-
50249157930
-
Key management and distribution for authenticating group communication
-
Shantharajah, S.P., Duraiswamy, K., and Kadhar Nawaz, G.M.: ' Key management and distribution for authenticating group communication ', First Int. Conf. Industrial and Information Systems, 2006, p. 133-137
-
(2006)
First Int. Conf. Industrial and Information Systems
, pp. 133-137
-
-
Shantharajah, S.P.1
Duraiswamy, K.2
Kadhar Nawaz, G.M.3
-
7
-
-
1342306709
-
Security for cluster based ad hoc networks
-
Varadharajan, V., Shankaran, R., and Hitchens, M.: ' Security for cluster based ad hoc networks ', Comput. Commun., 2004, 27, (5), p. 488-501
-
(2004)
Comput. Commun.
, vol.27
, Issue.5
, pp. 488-501
-
-
Varadharajan, V.1
Shankaran, R.2
Hitchens, M.3
-
8
-
-
36849013480
-
A hierarchy-based key management for secure group communications in mobile ad hoc networks
-
Wang, N.C., Li, M., and Fang, S.Z.: ' A hierarchy-based key management for secure group communications in mobile ad hoc networks ', Int. Conf. Wireless Communications and Mobile Computing, 2007, p. 571-576
-
(2007)
Int. Conf. Wireless Communications and Mobile Computing
, pp. 571-576
-
-
Wang, N.C.1
Li, M.2
Fang, S.Z.3
-
9
-
-
84944878354
-
-
(CRC Press)
-
Menezes, A.J., Oorschot, P.C.V., and Vanstone, S.A.: ' Handbook of applied cryptography ', (CRC Press, 1996)
-
(1996)
Handbook of Applied Cryptography
-
-
Menezes, A.J.1
Oorschot, P.C.V.2
Vanstone, S.A.3
-
10
-
-
0003843664
-
-
IETF RFC 3561, 2003
-
Perkins, C., Royer, E., and Das, S.: ' Ad hoc on-demand distance vector (AODV) routing ', IETF RFC 3561, 2003
-
Ad Hoc On-demand Distance Vector (AODV) Routing
-
-
Perkins, C.1
Royer, E.2
Das, S.3
-
11
-
-
0242678584
-
Self-organized public-key management for mobile ad hoc networks
-
Capkun, S., Buttyan, L., and Hubaux, J.P.: ' Self-organized public-key management for mobile ad hoc networks ', IEEE Trans. Mobile Comput., 2003, 2, (1), p. 52-64
-
(2003)
IEEE Trans. Mobile Comput.
, vol.2
, Issue.1
, pp. 52-64
-
-
Capkun, S.1
Buttyan, L.2
Hubaux, J.P.3
-
13
-
-
0031234161
-
Adaptive clustering for mobile wireless networks
-
0733-8716
-
Lin, C.R., and Gerla, M.: ' Adaptive clustering for mobile wireless networks ', IEEE J. Sel. Areas Commun., 1997, 15, (7), p. 1265-1275 0733-8716
-
(1997)
IEEE J. Sel. Areas Commun.
, vol.15
, Issue.7
, pp. 1265-1275
-
-
Lin, C.R.1
Gerla, M.2
-
14
-
-
34548020232
-
Adaptive security design with malicious node detection in cluster-based sensor networks
-
Hsieh, M.Y., Huang, Y.M., and Chao, H.C.: ' Adaptive security design with malicious node detection in cluster-based sensor networks ', Comput. Commun., 2007, 30, (11-12), p. 2385-2400
-
(2007)
Comput. Commun.
, vol.30
, Issue.1112
, pp. 2385-2400
-
-
Hsieh, M.Y.1
Huang, Y.M.2
Chao, H.C.3
-
15
-
-
3042647758
-
A survey of secure wireless ad hoc routing
-
Hu, Y.C., and Perrig, A.: ' A survey of secure wireless ad hoc routing ', IEEE Security Privacy, 2004, 2, (3), p. 28-39
-
(2004)
IEEE Security Privacy
, vol.2
, Issue.3
, pp. 28-39
-
-
Hu, Y.C.1
Perrig, A.2
|