-
1
-
-
52049117391
-
On the pitfalls of using high-throughput multicast metrics in adversarial wireless mesh networks
-
J. Dong, R. Curtmola, and C. Nita-Rotaru, "On the Pitfalls of Using High-Throughput Multicast Metrics in Adversarial Wireless Mesh Networks," Proc. Fifth Ann. IEEE Comm. Soc. Conf. Sensor, Mesh and Ad Hoc Comm. and Networks (SECON '08), 2008.
-
(2008)
Proc. Fifth Ann. IEEE Comm. Soc. Conf. Sensor, Mesh and Ad Hoc Comm. and Networks (SECON '08)
-
-
Dong, J.1
Curtmola, R.2
Nita-Rotaru, C.3
-
2
-
-
0036924859
-
Flooding-based geocasting protocols for mobile ad hoc networks
-
Y.B. Ko and N.H. Vaidya, "Flooding-Based Geocasting Protocols for Mobile Ad Hoc Networks," Mobile Networks and Applications, vol. 7, no. 6, pp. 471-480, 2002.
-
(2002)
Mobile Networks and Applications
, vol.7
, Issue.6
, pp. 471-480
-
-
Ko, Y.B.1
Vaidya, N.H.2
-
5
-
-
0035268368
-
Scalable multicasting: The core-assisted mesh protocol
-
DOI 10.1023/A:1011400407314
-
E.L. Madruga and J.J. Garcia-Luna-Aceves, "Scalable Multicasting: the Core-Assisted Mesh Protocol," Mobile Networks and Applications, vol. 6, no. 2, pp. 151-165, 2001. (Pubitemid 32512260)
-
(2001)
Mobile Networks and Applications
, vol.6
, Issue.2
, pp. 151-165
-
-
Madruga, E.L.1
Garcia-Luna-Aceves, J.J.2
-
6
-
-
0036924499
-
On-demand multicast routing protocol in multihop wireless mobile networks
-
S.J. Lee, W. Su, and M. Gerla, "On-Demand Multicast Routing Protocol in Multihop Wireless Mobile Networks," Mobile Networks and Applications, vol. 7, no. 6, pp. 441-453, 2002.
-
(2002)
Mobile Networks and Applications
, vol.7
, Issue.6
, pp. 441-453
-
-
Lee, S.J.1
Su, W.2
Gerla, M.3
-
7
-
-
11144257116
-
Multicast ad-hoc on-demand distance vector (maodv) routing
-
July
-
E.M. Royer and C.E. Perkins, "Multicast Ad-Hoc On-Demand Distance Vector (MAODV) Routing," Internet Draft, July 2000.
-
(2000)
Internet Draft
-
-
Royer, E.M.1
Perkins, C.E.2
-
8
-
-
0035789901
-
Adaptive demand-driven multicast routing in multi-hop wireless ad hoc networks
-
J.G. Jetcheva and D.B. Johnson, "Adaptive Demand-Driven Multicast Routing in Multi-Hop Wireless Ad Hoc Networks," Proc. ACM MobiHoc, 2001.
-
(2001)
Proc. ACM MobiHoc
-
-
Jetcheva, J.G.1
Johnson, D.B.2
-
10
-
-
1542359009
-
A high-throughput path metric for multi-hop wireless routing
-
D.S.J.D. Couto, D. Aguayo, J.C. Bicket, and R. Morris, "A High-Throughput Path Metric for Multi-Hop Wireless Routing," Proc. ACM MobiCom, 2003.
-
(2003)
Proc. ACM MobiCom
-
-
Couto, D.S.J.D.1
Aguayo, D.2
Bicket, J.C.3
Morris, R.4
-
11
-
-
33947641587
-
High-throughput multicast routing metrics in wireless mesh networks
-
S. Roy, D. Koutsonikolas, S. Das, and C. Hu, "High-Throughput Multicast Routing Metrics in Wireless Mesh Networks," Proc. 26th IEEE Int'l Conf. Distributed Computing Systems (ICDCS), 2006.
-
(2006)
Proc. 26th IEEE Int'l Conf. Distributed Computing Systems (ICDCS)
-
-
Roy, S.1
Koutsonikolas, D.2
Das, S.3
Hu, C.4
-
12
-
-
39049136524
-
Himac: High throughput mac layer multicasting in wireless networks
-
A. Chen, D. Lee, G. Chandrasekaran, and P. Sinha, "HIMAC: High Throughput MAC Layer Multicasting in Wireless Networks," Proc. IEEE Int'l Conf. Mobile Adhoc and Sensor Systems (MASS '06), 2006.
-
(2006)
Proc. IEEE Int'l Conf. Mobile Adhoc and Sensor Systems (MASS '06)
-
-
Chen, A.1
Lee, D.2
Chandrasekaran, G.3
Sinha, P.4
-
13
-
-
34347254802
-
The medium time metric: High throughput route selection in multirate ad hoc wireless networks
-
B. Awerbuch, D. Holmer, and H. Rubens, "The Medium Time Metric: High Throughput Route Selection in Multirate Ad Hoc Wireless Networks," Mobile Networks and Applications, Special Issue on Internet Wireless Access: 802.11 and Beyond, vol. 11, no. 2, pp. 253-266, 2005.
-
(2005)
Mobile Networks and Applications, Special Issue on Internet Wireless Access: 802.11 and beyond
, vol.11
, Issue.2
, pp. 253-266
-
-
Awerbuch, B.1
Holmer, D.2
Rubens, H.3
-
14
-
-
19544389145
-
A multi-radio unification protocol for IEEE 802.11 wireless networks
-
A. Adya, P. Bahl, J. Padhye, A. Wolman, and L. Zhou, "A Multi-Radio Unification Protocol for IEEE 802.11 Wireless Networks," Proc. First Int'l Conf. Broadband Networks (BroadNets '04), 2004.
-
(2004)
Proc. First Int'l Conf. Broadband Networks (BroadNets '04)
-
-
Adya, A.1
Bahl, P.2
Padhye, J.3
Wolman, A.4
Zhou, L.5
-
15
-
-
0002529141
-
A control-theoretic approach to flow control
-
S. Keshav, "A Control-Theoretic Approach to Flow Control," Proc. ACM SIGCOMM, 1993.
-
(1993)
Proc. ACM SIGCOMM
-
-
Keshav, S.1
-
16
-
-
11244335412
-
Routing in multi-radio, multi-hop wireless mesh networks
-
R. Draves, J. Padhye, and B. Zill, "Routing in Multi-Radio, Multi-Hop Wireless Mesh Networks," Proc. ACM MobiCom, 2004.
-
(2004)
Proc. ACM MobiCom
-
-
Draves, R.1
Padhye, J.2
Zill, B.3
-
19
-
-
84904904836
-
A secure routing protocol for ad hoc networks
-
K. Sanzgiri, B. Dahill, B.N. Levine, C. Shields, and E. Belding-Royer, "A Secure Routing Protocol for Ad Hoc Networks," Proc. 10th IEEE Int'l Conf. Network Protocols (ICNP), 2002.
-
(2002)
Proc. 10th IEEE Int'l Conf. Network Protocols (ICNP)
-
-
Sanzgiri, K.1
Dahill, B.2
Levine, B.N.3
Shields, C.4
Belding-Royer, E.5
-
20
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
Aug
-
S. Marti, T. Giuli, K. Lai, and M. Baker, "Mitigating Routing Misbehavior in Mobile Ad Hoc Networks," Proc. ACM MobiCom, Aug. 2000.
-
(2000)
Proc. ACM MobiCom
-
-
Marti, S.1
Giuli, T.2
Lai, K.3
Baker, M.4
-
22
-
-
0036957315
-
Ariadne: A secure on-demand routing protocol for ad hoc networks
-
Y.-C. Hu, A. Perrig, and D.B. Johnson, "Ariadne: A Secure on-Demand Routing Protocol for Ad Hoc Networks," Proc. ACM MobiCom, 2002.
-
(2002)
Proc. ACM MobiCom
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
23
-
-
39149117709
-
Odsbr: An on-demand secure byzantine resilient routing protocol for wireless ad hoc networks
-
B. Awerbuch, R. Curtmola, D. Holmer, C. Nita-Rotaru, and H. Rubens, "ODSBR: An On-Demand Secure Byzantine Resilient Routing Protocol for Wireless Ad Hoc Networks," ACM Trans. Information Systems Security, vol. 10, no. 4, pp. 1-35, 2007.
-
(2007)
ACM Trans. Information Systems Security
, vol.10
, Issue.4
, pp. 1-35
-
-
Awerbuch, B.1
Curtmola, R.2
Holmer, D.3
Nita-Rotaru, C.4
Rubens, H.5
-
24
-
-
33847279913
-
On the survivability of routing protocols in ad hoc wireless networks
-
B. Awerbuch, R. Curtmola, D. Holmer, C. Nita-Rotaru, and H. Rubens, "On the Survivability of Routing Protocols in Ad Hoc Wireless Networks," Proc. First Int'l Conf. Security and Privacy for Emerging Areas in Comm. Networks (SecureComm '05), 2005.
-
(2005)
Proc. First Int'l Conf. Security and Privacy for Emerging Areas in Comm. Networks (SecureComm '05)
-
-
Awerbuch, B.1
Curtmola, R.2
Holmer, D.3
Nita-Rotaru, C.4
Rubens, H.5
-
25
-
-
33845497487
-
Securing maodv: Attacks and countermeasures
-
S. Roy, V.G. Addada, S. Setia, and S. Jajodia, "Securing MAODV: Attacks and Countermeasures," Proc. Second Ann. IEEE Comm. Soc. Conf. Sensor, Mesh and Ad Hoc Comm. and Networks (SECON '05), 2005.
-
(2005)
Proc. Second Ann. IEEE Comm. Soc. Conf. Sensor, Mesh and Ad Hoc Comm. and Networks (SECON '05)
-
-
Roy, S.1
Addada, V.G.2
Setia, S.3
Jajodia, S.4
-
26
-
-
60949084324
-
Bsmr: Byzantine-resilient secure multicast routing in multi-hop wireless networks
-
Apr.
-
R. Curtmola and C. Nita-Rotaru, "BSMR: Byzantine-Resilient Secure Multicast Routing in Multi-Hop Wireless Networks," IEEE Trans. Mobile Computing, vol. 8, no. 4, pp. 445-459, Apr. 2009.
-
(2009)
IEEE Trans. Mobile Computing
, vol.8
, Issue.4
, pp. 445-459
-
-
Curtmola, R.1
Nita-Rotaru, C.2
-
27
-
-
13844302260
-
Comparison of routing metrics for static multi-hop wireless networks
-
R. Draves, J. Padhye, and B. Zill, "Comparison of Routing Metrics for Static Multi-Hop Wireless Networks," Proc. ACM SIGCOMM, 2004.
-
(2004)
Proc. ACM SIGCOMM
-
-
Draves, R.1
Padhye, J.2
Zill, B.3
-
28
-
-
44149122830
-
High-throughput multicast routing metrics in wireless mesh networks
-
S. Roy, D. Koutsonikolas, S. Das, and C. Hu, "High-Throughput Multicast Routing Metrics in Wireless Mesh Networks," Ad Hoc Networks, vol. 6, no. 6, pp. 878-899, 2007.
-
(2007)
Ad Hoc Networks
, vol.6
, Issue.6
, pp. 878-899
-
-
Roy, S.1
Koutsonikolas, D.2
Das, S.3
Hu, C.4
-
29
-
-
34548493227
-
On designing incentive-compatible routing and forwarding protocols in wireless ad-hoc networks : AAAAn integrated approach using game theoretic and cryptographic techniques
-
DOI 10.1007/s11276-006-9855-1, Special Issue: Selected Papers on MOBICOM 2005
-
S. Zhong, L.E. Li, Y.G. Liu, and Y.R. Yang, "On Designing Incentive-Compatible Routing and Forwarding Protocols in Wireless Ad-Hoc Networks: An Integrated Approach Using Game Theoretic and Cryptographic Techniques," Wireless Networks, vol. 13, no. 6, pp. 799-816, 2007. (Pubitemid 47373423)
-
(2007)
Wireless Networks
, vol.13
, Issue.6
, pp. 799-816
-
-
Zhong, S.1
Li, L.E.2
Liu, Y.G.3
Yang, Y.R.4
-
30
-
-
0042660545
-
Stimulating cooperation in self-organizing mobile ad hoc networks
-
L. Buttyan and J.-P. Hubaux, "Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks," Mobile Networks and Applications, vol. 8, no. 5, pp. 579-592, 2003.
-
(2003)
Mobile Networks and Applications
, vol.8
, Issue.5
, pp. 579-592
-
-
Buttyan, L.1
Hubaux, J.-P.2
-
31
-
-
0020128340
-
Theory of spread-spectrum communications-a tutorial
-
May
-
R. Pickholtz, D. Schilling, and L. Milstein, "Theory of Spread-Spectrum Communications-A Tutorial," IEEE Trans. Comm., vol. 30, no. 5, pp. 855-884, May 1982.
-
(1982)
IEEE Trans. Comm.
, vol.30
, Issue.5
, pp. 855-884
-
-
Pickholtz, R.1
Schilling, D.2
Milstein, L.3
-
32
-
-
0002431508
-
The aloha system-another alternative for computer communications
-
N. Abramson, "The Aloha System-Another Alternative for Computer Communications," Proc. AFIPS Fall Joint Computer Conf., 1970.
-
(1970)
Proc. AFIPS Fall Joint Computer Conf.
-
-
Abramson, N.1
-
33
-
-
3042785862
-
The sybil attack in sensor networks: Analysis & defenses
-
J. Newsome, E. Shi, D. Song, and A. Perrig, "The Sybil Attack in Sensor Networks: Analysis & Defenses," Proc. Third Int'l Symp. Information Processing in Sensor Networks (IPSN '04), 2004.
-
(2004)
Proc. Third Int'l Symp. Information Processing in Sensor Networks (IPSN '04)
-
-
Newsome, J.1
Shi, E.2
Song, D.3
Perrig, A.4
-
35
-
-
22944432884
-
Contention-aware admission control for ad hoc networks
-
DOI 10.1109/TMC.2005.52
-
Y. Yang and R. Kravets, "Contention-Aware Admission Control for Ad Hoc Networks," IEEE Trans. Mobile Computing, vol. 4, no. 4, pp. 363-377, July/Aug. 2005. (Pubitemid 41049893)
-
(2005)
IEEE Transactions on Mobile Computing
, vol.4
, Issue.4
, pp. 363-377
-
-
Yang, Y.1
Kravets, R.2
-
37
-
-
0041973497
-
Packet leashes: A defenseagainst wormhole attacks in wireless ad hoc networks
-
Y.-C. Hu, A. Perrig, and D.B. Johnson, "Packet Leashes: A DefenseAgainst Wormhole Attacks in Wireless Ad Hoc Networks," Proc.IEEE INFOCOM, 2003.
-
(2003)
Proc. IEEE INFOCOM
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
40
-
-
15744368857
-
Efficient and securesource authentication for multicast
-
Feb.
-
A. Perrig, R. Canetti, D. Song, and D. Tygar, "Efficient and SecureSource Authentication for Multicast," Proc. Network and DistributedSystem Security Symp. (NDSS), Feb. 2001.
-
(2001)
Proc. Network and DistributedSystem Security Symp. (NDSS)
-
-
Perrig, A.1
Canetti, R.2
Song, D.3
Tygar, D.4
-
41
-
-
58049188696
-
Secureneighbor discovery in wireless networks: Formal investigationof possibility
-
M. Poturalski, P. Papadimitratos, and J.-P. Hubaux, "SecureNeighbor Discovery in Wireless Networks: Formal Investigationof Possibility," Proc. ACM Symp. Information, Computer and Comm.Security (ASIACCS '08), 2008.
-
(2008)
Proc. ACM Symp. Information, Computer and Comm.Security (ASIACCS '08)
-
-
Poturalski, M.1
Papadimitratos, P.2
Hubaux, J.-P.3
-
47
-
-
50649121289
-
A dynamic secure qos routing protocol forwireless ad hoc networks
-
T. Zhu and M. Yu, "A Dynamic Secure QoS Routing Protocol forWireless Ad Hoc Networks," Proc. IEEE Sarnoff Symp., 2006.
-
(2006)
Proc. IEEE Sarnoff Symp.
-
-
Zhu, T.1
Yu, M.2
|