-
3
-
-
35048869579
-
-
Springer-Verlag, Berlin/Heidelberg, Germany,; LNCS.
-
Mueller S, Tsang RP, Ghosal D,. Multipath routing in mobile ad hoc networks: issues and challenges. Performance Tools and Applications to Networked Systems, Springer-Verlag, Berlin/Heidelberg, Germany, 2004; LNCS 2965: 209-234.
-
(2004)
Multipath Routing in Mobile Ad Hoc Networks: Issues and Challenges. Performance Tools and Applications to Networked Systems
, vol.2965
, pp. 209-234
-
-
Mueller, S.1
Tsang, R.P.2
Ghosal, D.3
-
4
-
-
13444280292
-
Solutions to performance problems in VoIP over a 802.11 wireless LAN
-
DOI 10.1109/TVT.2004.838890
-
Wang W, Liew SC, Li VOK,. Solutions to performance problems in VoIP over a 802.11 wireless LAN. IEEE Transactions on Vehicular Technology 2005; 54: 366-384. (Pubitemid 40211114)
-
(2005)
IEEE Transactions on Vehicular Technology
, vol.54
, Issue.1
, pp. 366-384
-
-
Wang, W.1
Liew, S.C.2
Li, V.O.K.3
-
5
-
-
0036287151
-
SNR and bandwidth scalable speech coding
-
Phoenix-Scottsdale, AZ, USA
-
Dong H, Gibson JD, Kokes MG,. SNR and bandwidth scalable speech coding. In Proceedings of IEEE International Symposium on Circuits and Systems (ISCAS 2002), Phoenix-Scottsdale, AZ, USA, 2002; 2: 859-862.
-
(2002)
Proceedings of IEEE International Symposium on Circuits and Systems (ISCAS 2002)
, vol.2
, pp. 859-862
-
-
Dong, H.1
Gibson, J.D.2
Kokes, M.G.3
-
6
-
-
27744568755
-
Selective encryption and scalable speech coding for voice communications over multi-hop wireless links
-
MILCOM 2004 - 2004 IEEE Military Communications Conference
-
Gibson JD, Servetti A, Dong H, Gersho A, Lookabaugh T, De Martin JC,. Selective encryption and scalable speech coding for voice communications over multi-hop wireless links. In Proceedings of IEEE Military Communications Conference, (MILCOM 2004), Monterey, CA, USA, 2004; 2: 792-798. (Pubitemid 41609946)
-
(2004)
Proceedings - IEEE Military Communications Conference MILCOM
, vol.2
, pp. 792-798
-
-
Gibson, J.D.1
Servetti, A.2
Dong, H.3
Gersho, A.4
Lookabaugh, T.5
De Martin, J.C.6
-
7
-
-
35048864915
-
-
Computational Science and Its Applications-ICCSA 2004, Springer-Verlag; LNCS 3043
-
Lindskog S, Strandbergh J, Hackman M, Jonsson E,. A content-independent scalable encryption model. Computational Science and Its Applications-ICCSA 2004, Springer-Verlag 2004; LNCS 3043: 821-830.
-
(2004)
A Content-independent Scalable Encryption Model
, pp. 821-830
-
-
Lindskog, S.1
Strandbergh, J.2
Hackman, M.3
Jonsson, E.4
-
9
-
-
7744233199
-
A routing framework for providing robustness to node failures in mobile ad hoc networks
-
Ye Z, Krishnamurthy SV, Tripathi SK,. A routing framework for providing robustness to node failures in mobile ad hoc networks. Elsevier Ad hoc Networks Journal 2004; 2 (1): 87-107.
-
(2004)
Elsevier Ad Hoc Networks Journal
, vol.2
, Issue.1
, pp. 87-107
-
-
Ye, Z.1
Krishnamurthy, S.V.2
Tripathi, S.K.3
-
10
-
-
27744454844
-
Multipath video transport over ad hoc networks
-
DOI 10.1109/MWC.2005.1497857, Advances in Wireless Video
-
Mao S, Lin S, Wang Y, Panwar SS, Li Y,. Multipath video transport over ad hoc networks. IEEE Wireless Communications 2005; 12 (4): 42-49. (Pubitemid 41595368)
-
(2005)
IEEE Wireless Communications
, vol.12
, Issue.4
, pp. 42-49
-
-
Mao, S.1
Lin, S.2
Wang, Y.3
Panwar, S.S.4
Li, Y.5
-
11
-
-
11244275670
-
-
Robust multipath source routing protocol (RMPSR) for video communication over wireless ad hoc networks (ICME04), Taipei, Taiwan, June
-
Wei W, Zakhor A,. Robust multipath source routing protocol (RMPSR) for video communication over wireless ad hoc networks. In Proceedings of IEEE International Conference on Multimedia and Expo, (ICME04), Taipei, Taiwan, June 2004; 2: 1379-1382.
-
(2004)
Proceedings of IEEE International Conference on Multimedia and Expo
, vol.2
, pp. 1379-1382
-
-
Wei, W.1
Zakhor, A.2
-
13
-
-
33750029995
-
SecMR - A secure multipath routing protocol for ad hoc networks
-
DOI 10.1016/j.adhoc.2006.05.020, PII S1570870506000515, Security Issues in Sensor and Ad Hoc Networks
-
Mavropodi R, Kotzanikolaoua P, Douligerisa C,. SecMRa a secure multipath routing protocol for ad hoc networks. Elsevier Ad hoc Networks 2007; 5 (1): 87-99. (Pubitemid 44573009)
-
(2007)
Ad Hoc Networks
, vol.5
, Issue.1
, pp. 87-99
-
-
Mavropodi, R.1
Kotzanikolaou, P.2
Douligeris, C.3
-
14
-
-
38649120863
-
Secure, Disjoint, Multipath Source Routing Protocol(SDMSR) for Mobile Ad-hoc Networks
-
DOI 10.1109/GCC.2006.86, 4031486, Proceedings - Fifth International Conference on Grid and Cooperative Computing, GCC 2006
-
Berton S, Yin H, Lin C, Min G,. Secure, disjoint, multipath source routing protocol(SDMSR) for mobile ad hoc networks. In Proceedings of the Fifth International Conference on Grid and Cooperative Computing (GCC06), Changsha, Hunan, China, 2006; 387-394. (Pubitemid 351165010)
-
(2006)
Proceedings - Fifth International Conference on Grid and Cooperative Computing, GCC 2006
, pp. 387-394
-
-
Berton, S.1
Yin, H.2
Lin, C.3
Min, G.4
-
15
-
-
60049091288
-
SPREAD: Improving network security by multipath routing in mobile ad hoc networks
-
Lou W, Liu W, Zhang Y, Fang Y,. SPREAD: improving network security by multipath routing in mobile ad hoc networks. Springers Wireless Networks 2009; 15 (3): 279-294.
-
(2009)
Springers Wireless Networks
, vol.15
, Issue.3
, pp. 279-294
-
-
Lou, W.1
Liu, W.2
Zhang, Y.3
Fang, Y.4
-
16
-
-
34248372444
-
-
Density-based multipath secure communication over mobile ad hoc networks Melbourne, FL, USA
-
Chen L, Lee CW, Yeh JH,. Density-based multipath secure communication over mobile ad hoc networks. In Proceedings of the 44th Annual Southeast Regional Conference, Melbourne, FL, USA, 2006; 107-112.
-
(2006)
Proceedings of the 44th Annual Southeast Regional Conference
, pp. 107-112
-
-
Chen, L.1
Lee, C.W.2
Yeh, J.H.3
-
18
-
-
24944520460
-
-
Neighbor stability routing in MANETs New Orleans, LA, USA
-
Chen L, Lee CW,. Neighbor stability routing in MANETs. In Proceedings of the IEEE Wireless Communications and Networking Conference WCNC 2005, New Orleans, LA, USA, 2005; 4: 1964-1969.
-
(2005)
Proceedings of the IEEE Wireless Communications and Networking Conference WCNC 2005
, vol.4
, pp. 1964-1969
-
-
Chen, L.1
Lee, C.W.2
-
19
-
-
54249107420
-
-
Computational Science and Its Applications-ICCSA 2008, Springer-Verlag; LNCS 5073(II)
-
Vaidya B, Choi DY, Park JA, Han SJ,. Multipath routing scheme for wireless multihop network. Computational Science and Its Applications-ICCSA 2008, Springer-Verlag 2008; LNCS 5073(II): 433-445.
-
(2008)
Multipath Routing Scheme for Wireless Multihop Network
, pp. 433-445
-
-
Vaidya, B.1
Choi, D.Y.2
Park, J.A.3
Han, S.J.4
-
20
-
-
33751409131
-
SMORT: Scalable multipath on-demand routing for mobile ad hoc networks
-
DOI 10.1016/j.adhoc.2005.10.002, PII S1570870505000983
-
Reddy LR, Raghavan SV,. SMORT: Scalable multipath on-demand routing for mobile ad hoc networks. Elsevier Ad hoc Networks 2007; 5 (2): 162-188. (Pubitemid 44821020)
-
(2007)
Ad Hoc Networks
, vol.5
, Issue.2
, pp. 162-188
-
-
Reddeppa Reddy, L.1
Raghavan, S.V.2
-
21
-
-
69949188858
-
Robust and secure routing scheme for wireless multihop network
-
Vaidya B, Yeo SS, Choi DY, Han SJ,. Robust and secure routing scheme for wireless multihop network. ACM/Springer Journal of Personal and Ubiquitous Computing 2009; 13 (7): 457-469.
-
(2009)
ACM/Springer Journal of Personal and Ubiquitous Computing
, vol.13
, Issue.7
, pp. 457-469
-
-
Vaidya, B.1
Yeo, S.S.2
Choi, D.Y.3
Han, S.J.4
-
22
-
-
0025023289
-
Reasoning about belief in cryptographic protocols
-
1990 IEEE Comput Soc Symp Res Secur Privacy
-
Gong L, Needham R, Yahalom R,. Reasoning about belief in cryptographic protocols. In Proceedings of the IEEE Symposium on Research in Security and Privacy, Oakland, CA, USA, 1990; 234-248. (Pubitemid 20739291)
-
(1990)
Proceedings of the Symposium on Security and Privacy
, pp. 234-248
-
-
Gong, L.1
Needham, R.2
Yahalom, R.3
-
24
-
-
13244276488
-
Secure routing in mobile wireless ad hoc networks
-
DOI 10.1016/S1570-8705(03)00017-9
-
Gupte S, Singhal M,. Secure routing in mobile wireless ad hoc networks. Elsevier Ad hoc Networks 2003; 1 (1): 151-174. (Pubitemid 40421400)
-
(2003)
Ad Hoc Networks
, vol.1
, Issue.1
, pp. 151-174
-
-
Gupte, S.1
Singhal, M.2
-
26
-
-
85029731561
-
A survey of attacks and countermeasures in mobile ad hoc networks
-
In, Xiao Y., Shen X., Du D-Z (eds). Springer: New York, NY, USA.
-
Wu B, Chen J, Wu J, Cardei M,. A survey of attacks and countermeasures in mobile ad hoc networks. In Wireless Network Security, Xiao Y, Shen X, Du D-Z, (eds). Springer: New York, NY, USA, 2007; 103-135.
-
(2007)
Wireless Network Security
, pp. 103-135
-
-
Wu, B.1
Chen, J.2
Wu, J.3
Cardei, M.4
-
27
-
-
15244339622
-
Authenticated routing for ad hoc networks
-
Sanzgiri K, LaFlamme D, Dahill B, Levine BN, Shields C, Belding-Royer EM,. Authenticated routing for ad hoc networks. IEEE Journal on Selected Areas in Communications 2005; 23 (3): 598-610.
-
(2005)
IEEE Journal on Selected Areas in Communications
, vol.23
, Issue.3
, pp. 598-610
-
-
Sanzgiri, K.1
Laflamme, D.2
Dahill, B.3
Levine, B.N.4
Shields, C.5
Belding-Royer, E.M.6
-
28
-
-
3042647758
-
A survey of secure wireless ad hoc routing
-
Hu Y, Perrig A,. A survey of secure wireless ad hoc routing. IEEE Security & Privacy 2004; 2 (3): 28-39.
-
(2004)
IEEE Security & Privacy
, vol.2
, Issue.3
, pp. 28-39
-
-
Hu, Y.1
Perrig, A.2
-
30
-
-
79951994579
-
-
OPNET Modeler Simulation Software
-
OPNET Modeler Simulation Software
-
-
-
|