-
3
-
-
0038059502
-
OSPF with digital signatures
-
"OSPF with Digital Signatures," IETF RFC 2154, http://www.ietf. org/rfc/rfc2154.txt, 1997.
-
(1997)
IETF RFC
, vol.2154
-
-
-
5
-
-
0003247246
-
A border gateway protocol 4 (BGP-4)
-
"A Border Gateway Protocol 4 (BGP-4)," IETF RFC 1771, http://www.ietf.org/rfc/rfc1771.txt, 1995.
-
(1995)
IETF RFC
, vol.1771
-
-
-
6
-
-
35048887476
-
Short group signatures
-
D. Boneh, X. Boyen, and H. Shacham, "Short Group Signatures," Proc. 24th Int'l Conf. Cryptology (CRYPTO '04), pp. 41-55, 2004.
-
(2004)
Proc. 24th Int'l Conf. Cryptology (CRYPTO '04)
, pp. 41-55
-
-
Boneh, D.1
Boyen, X.2
Shacham, H.3
-
8
-
-
18944373619
-
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks
-
DOI 10.1016/j.comcom.2004.07.019, PII S0140366404002762, Performance Issues of Wireless LANs, PANs and Ad Hoc Networks
-
A. Boukerche, K. El-Khatib, L. Xua, and L. Korba, "An Efficient Secure Distributed Anonymous Routing Protocol for Mobile and Wireless Ad Hoc Networks," Computer Comm., vol. 28, pp. 1193-1203, 2005. (Pubitemid 40701646)
-
(2005)
Computer Communications
, vol.28
, Issue.10
, pp. 1193-1203
-
-
Boukerche, A.1
El-Khatib, K.2
Xu, L.3
Korba, L.4
-
9
-
-
3142751410
-
Link state routing in wireless Ad-Hoc networks
-
E. Bacelli, C. Adjih, and P. Jacquet, "Link State Routing in Wireless Ad-Hoc Networks," Proc. IEEE Conf. Military Comm., vol. 2, 2003.
-
(2003)
Proc. IEEE Conf. Military Comm.
, vol.2
-
-
Bacelli, E.1
Adjih, C.2
Jacquet, P.3
-
10
-
-
37849048533
-
Efficient and robust pseudonymous authentication in VANET
-
Sept.
-
G. Calandriello, P. Papadimitratos, J.-P. Hubaux, and A. Lioy, "Efficient and Robust Pseudonymous Authentication in VANET," Proc. ACM Int'l Workshop Vehicular Ad Hoc Networks (VANET '07), pp. 19-28, Sept. 2007.
-
(2007)
Proc. ACM Int'l Workshop Vehicular Ad Hoc Networks (VANET '07)
, pp. 19-28
-
-
Calandriello, G.1
Papadimitratos, P.2
Hubaux, J.-P.3
Lioy, A.4
-
11
-
-
0038675868
-
A survey of mobility models for ad hoc network research
-
DOI 10.1002/wcm.72
-
T. Camp, J. Boleng, and V. Davies, "A Survey of Mobility Models for Ad Hoc Network Research," Wireless Comm. and Mobile Computing, Special Issue on Mobile Ad Hoc Networking: Research, Trends, and Applications, vol. 2, pp. 483-502, 2002. (Pubitemid 135713186)
-
(2002)
Wireless Communications and Mobile Computing
, vol.2
, Issue.5
, pp. 483-502
-
-
Camp, T.1
Boleng, J.2
Davies, V.3
-
14
-
-
77953142354
-
Anonymous multipath routing protocol based on secret sharing in mobile Ad Hoc networks
-
S. Chen and M. Wu, "Anonymous Multipath Routing Protocol Based on Secret Sharing in Mobile Ad Hoc Networks," Proc. Int'l Conf. Measuring Technology and Mechatronics Automation (ICMTMA '10), vol. 1, nos. 13/14, pp. 582-585, 2010.
-
(2010)
Proc. Int'l Conf. Measuring Technology and Mechatronics Automation (ICMTMA '10)
, vol.1
, Issue.13-14
, pp. 582-585
-
-
Chen, S.1
Wu, M.2
-
15
-
-
39049114200
-
Distributed anonymous secure routing protocol in wireless mobile Ad Hoc networks
-
Y. Cheng and D. Agrawal, "Distributed Anonymous Secure Routing Protocol in Wireless Mobile Ad Hoc Networks," Proc. OPNETWORK, 2005.
-
(2005)
Proc. OPNETWORK
-
-
Cheng, Y.1
Agrawal, D.2
-
16
-
-
0017018484
-
New directions in cryptography
-
Nov.
-
W. Diffie and M. Hellman, "New Directions in Cryptography," IEEE Trans. Information Theory, vol. 22, no. 6, pp. 644-654, Nov. 1976.
-
(1976)
IEEE Trans. Information Theory
, vol.22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.2
-
17
-
-
67650409732
-
ARMR: Anonymous routing protocol with multiple routes for communications in mobile Ad Hoc networks
-
Y. Dong, T. Wing Chim, V.O.K. Li, S.M. Yiu, and C.K. Hui, "ARMR: Anonymous Routing Protocol with Multiple Routes for Communications in Mobile Ad Hoc Networks," Ad Hoc Networks, vol. 7, no. 8, pp. 1536-1550, 2009.
-
(2009)
Ad Hoc Networks
, vol.7
, Issue.8
, pp. 1536-1550
-
-
Dong, Y.1
Wing Chim, T.2
Li, V.O.K.3
Yiu, S.M.4
Hui, C.K.5
-
20
-
-
0041438387
-
IMPORTANT: A framework to systematically analyze the impact of mobility on performance of routing protocols for Adhoc networks
-
N. Sadagopan Fan Bai and A. Helmy, "IMPORTANT: A Framework to Systematically Analyze the Impact of Mobility on Performance of Routing Protocols for Adhoc Networks," Proc. IEEE INFOCOM, vol. 2, pp. 825-835, 2003.
-
(2003)
Proc. IEEE INFOCOM
, vol.2
, pp. 825-835
-
-
Sadagopan Fan Bai, N.1
Helmy, A.2
-
21
-
-
39749100457
-
-
technical report, AT&T Labs-Research
-
T. Farley, P. McDaniel, and K. Butler, "A Survey of BGP Security Issues and Solutions," technical report, AT&T Labs-Research, 2004.
-
(2004)
A Survey of BGP Security Issues and Solutions
-
-
Farley, T.1
McDaniel, P.2
Butler, K.3
-
22
-
-
85017404375
-
A group mobility model for Ad Hoc wireless networks
-
X. Hong, M. Gerla, G. Pei, and C. Chinag, "A Group Mobility Model for Ad Hoc Wireless Networks," Proc. Second ACM Int'l Workshop Modeling, Analysis, and Simulation of Wireless and Mobile Systems (MSWiM '99), pp. 53-60, 1999.
-
(1999)
Proc. Second ACM Int'l Workshop Modeling, Analysis, and Simulation of Wireless and Mobile Systems (MSWiM '99)
, pp. 53-60
-
-
Hong, X.1
Gerla, M.2
Pei, G.3
Chinag, C.4
-
23
-
-
84961572484
-
SEAD: Secure efficient distance vector routing for mobile wireless Ad Hoc networks
-
Y.-C. Hu, D.B. Johnson, and A. Perrig, "SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks," Proc. Fourth IEEE Workshop Mobile Computing Systems and Applications, pp. 3-13, 2002.
-
(2002)
Proc. Fourth IEEE Workshop Mobile Computing Systems and Applications
, pp. 3-13
-
-
Hu, Y.-C.1
Johnson, D.B.2
Perrig, A.3
-
24
-
-
3042647758
-
A survey of secure wireless Ad Hoc routing
-
Y.-C. Hu and A. Perrig, "A Survey of Secure Wireless Ad Hoc Routing," IEEE Security and Privacy, vol. 2, no. 3, pp. 28-39, 2004.
-
(2004)
IEEE Security and Privacy
, vol.2
, Issue.3
, pp. 28-39
-
-
Hu, Y.-C.1
Perrig, A.2
-
25
-
-
17444426121
-
Ariadne: A secure on-demand routing protocol for ad hoc networks
-
DOI 10.1007/s11276-004-4744-y
-
Y.-C. Hu, A. Perrig, and D.B. Johnson, "Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks," Wireless Networks, vol. 11, nos. 1/2, pp. 21-38, 2005. (Pubitemid 40536374)
-
(2005)
Wireless Networks
, vol.11
, Issue.1-2
, pp. 21-38
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
26
-
-
24944489750
-
Enhancing wireless location privacy using silent period
-
PHY53-4, 2005 IEEE Wireless Communications and Networking Conference, WCNC 2005: Broadband Wireless for the Masses - Ready for Take-off
-
L. Huang, K. Matsuura, H. Yamane, and K. Sezaki, "Enhancing Wireless Location Privacy Using Silent Period," Proc. IEEE Wireless Comm. and Networking Conf., vol. 2, pp. 1187-1192, 2005. (Pubitemid 41311089)
-
(2005)
IEEE Wireless Communications and Networking Conference, WCNC
, vol.2
, pp. 1187-1192
-
-
Huang, L.1
Matsuura, K.2
Yamanet, H.3
Sezaki, K.4
-
27
-
-
84883873534
-
Voronoi diagram and convex hull based geocasting and routing in wireless networks
-
A. Ruhil, I. Stojmenovic, and D. Lobiyal, "Voronoi Diagram and Convex Hull Based Geocasting and Routing in Wireless Networks," Proc. Eighth IEEE Int'l Symp. Computers and Comm. (ISCC '03), vol. 1, pp. 51-56, 2003.
-
(2003)
Proc. Eighth IEEE Int'l Symp. Computers and Comm. (ISCC '03)
, vol.1
, pp. 51-56
-
-
Ruhil, A.1
Stojmenovic, I.2
Lobiyal, D.3
-
28
-
-
84968616624
-
-
P. Jacquet, P. Muhlethaler, T. Clausen, A. Laouiti, A. Qayyum, and L. Viennot, "Optimized Link State Routing Protocol for Ad Hoc Networks," pp. 62-68, 2001.
-
(2001)
Optimized Link State Routing Protocol for Ad Hoc Networks
, pp. 62-68
-
-
Jacquet, P.1
Muhlethaler, P.2
Clausen, T.3
Laouiti, A.4
Qayyum, A.5
Viennot, L.6
-
29
-
-
34548359387
-
-
May
-
W. jen Hsu, T. Spyropoulos, K. Psounis, and A. Helmy, "Modeling Time-Variant User Mobility in Wireless Mobile Networks," pp. 758-766, May 2007.
-
(2007)
Modeling Time-Variant User Mobility in Wireless Mobile Networks
, pp. 758-766
-
-
Jen Hsu, W.1
Spyropoulos, T.2
Psounis, K.3
Helmy, A.4
-
30
-
-
33749514463
-
SRDP: Securing route discovery in DSR
-
J. Kim and G. Tsudik, "SRDP: Securing Route Discovery in DSR," Proc. Mobiquitous, 2005.
-
(2005)
Proc. Mobiquitous
-
-
Kim, J.1
Tsudik, G.2
-
31
-
-
0034266911
-
Location-aided routing (LAR) in mobile ad hoc networks
-
DOI 10.1023/A:1019106118419
-
Y.-B. Ko and N.H. Vaidya, "Location-Aided Routing (LAR) in Mobile Ad Hoc Networks," Wireless Networks, vol. 6, no. 4, pp. 307-321, 2000. (Pubitemid 32018664)
-
(2000)
Wireless Networks
, vol.6
, Issue.4
, pp. 307-321
-
-
Ko, Y.-B.1
Vaidya, N.H.2
-
32
-
-
0242696170
-
ANODR: Anonymous on demand routing with untraceable routes for mobile Ad-Hoc networks
-
J. Kong and X. Hong, "ANODR: Anonymous on Demand Routing with Untraceable Routes for Mobile Ad-Hoc Networks," Proc. ACM MobiHoc, pp. 291-302, 2003.
-
(2003)
Proc. ACM MobiHoc
, pp. 291-302
-
-
Kong, J.1
Hong, X.2
-
35
-
-
0003020952
-
GeoGRID: A geocasting protocol for mobile Ad Hoc networks based on GRID
-
W. Liao et al., "GeoGRID: A Geocasting Protocol for Mobile Ad Hoc Networks Based on GRID," J. Internet Technology, vol. 1, no. 2, 2000.
-
(2000)
J. Internet Technology
, vol.1
, Issue.2
-
-
Liao, W.1
-
36
-
-
35048877778
-
Sequential aggregate signatures from trapdoor permutations
-
A. Lysyanskaya, S. Micali, L. Reyzin, and H. Shacham, "Sequential Aggregate Signatures from Trapdoor Permutations," Proc. Advances in Cryptology (EUROCRYPT '04), pp. 74-90, 2004.
-
(2004)
Proc. Advances in Cryptology (EUROCRYPT '04)
, pp. 74-90
-
-
Lysyanskaya, A.1
Micali, S.2
Reyzin, L.3
Shacham, H.4
-
38
-
-
79960826843
-
-
Nokia 6110 Navigator, http://europe.nokia.com/A4344146, 2011.
-
(2011)
Nokia 6110 Navigator
-
-
-
39
-
-
79960766191
-
Mobile Ad Hoc network (MANET) extension of OSPF
-
"Mobile Ad Hoc Network (MANET) Extension of OSPF," IETF RFC 5614, http://www.ietf.org/rfc/rfc5614.txt, 2009.
-
(2009)
IETF RFC
, vol.5614
-
-
-
40
-
-
0003828107
-
-
PhD dissertation, Massachusetts Inst. of Technology
-
R. Perlman, "Network Layer Protocols with Byzantine Robustness," PhD dissertation, Massachusetts Inst. of Technology, http://www.vendian.org/mncharity/dir3/perlman-thesis, 1988.
-
(1988)
Network Layer Protocols with Byzantine Robustness
-
-
Perlman, R.1
-
41
-
-
0242426103
-
The tesla broadcast authentication protocol
-
A. Perrig, R. Canetti, J.D. Tygar, and D. Song, "The Tesla Broadcast Authentication Protocol," RSA CryptoBytes, vol. 5, 2002.
-
(2002)
RSA CryptoBytes
, vol.5
-
-
Perrig, A.1
Canetti, R.2
Tygar, J.D.3
Song, D.4
-
42
-
-
79960801509
-
SPM: Source privacy for mobile Ad Hoc networks
-
J. Ren, Y. Li, and T. Li, "SPM: Source Privacy for Mobile Ad Hoc Networks," EURASIP J. Wireless Comm. Networks, vol. 2010, p. 5, 2010.
-
(2010)
EURASIP J. Wireless Comm. Networks
, vol.2010
, pp. 5
-
-
Ren, J.1
Li, Y.2
Li, T.3
-
43
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
DOI 10.1145/359340.359342
-
R.L. Rivest, A. Shamir, and L. Adleman, "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems," Comm. ACM, vol. 21, no. 2, pp. 120-126, 1978. (Pubitemid 8591219)
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
44
-
-
84876396429
-
Impact of pseudonym changes on geographic Ad Hoc routing
-
E. Schoch, F. Kargl, T. Leinmüller, S. Schlott, and P. Papadimitratos, "Impact of Pseudonym Changes on Geographic Ad Hoc Routing," Proc. Third European Workshop Security and Privacy in Ad Hoc and Sensor Networks (ESAS '06), vol. 4357, pp. 43-57, 2006.
-
(2006)
Proc. Third European Workshop Security and Privacy in Ad Hoc and Sensor Networks (ESAS '06)
, vol.4357
, pp. 43-57
-
-
Schoch, E.1
Kargl, F.2
Leinmüller, T.3
Schlott, S.4
Papadimitratos, P.5
-
45
-
-
70350090613
-
ARM: Anonymous routing protocol for mobile Ad Hoc networks
-
S. Seys and B. Preneel, "ARM: Anonymous Routing Protocol for Mobile Ad Hoc Networks," Int'l J. Wireless and Mobile Computing, vol. 3, no. 3, pp. 145-155, 2009.
-
(2009)
Int'l J. Wireless and Mobile Computing
, vol.3
, Issue.3
, pp. 145-155
-
-
Seys, S.1
Preneel, B.2
-
46
-
-
79960797735
-
-
Simpy Simulator, http://simpy.sourceforge.net, 2010.
-
(2010)
Simpy Simulator
-
-
-
47
-
-
33745945444
-
AnonDSR: Efficient anonymous dynamic source routing for mobile ad-hoc networks
-
DOI 10.1145/1102219.1102226, SASN'05 - Proceedings of the 2005 ACM Workshop on Security of Ad Hoc and Sensor Networks
-
R. Song, L. Korba, and G. Yee, "AnonDSR: Efficient Anonymous Dynamic Source Routing for Mobile Ad-Hoc Networks," Proc. Third ACM Workshop Security of Ad Hoc and Sensor Networks (SASN '05), pp. 33-42, 2005. (Pubitemid 44059928)
-
(2005)
SASN'05 - Proceedings of the 2005 ACM Workshop on Security of Ad Hoc and Sensor Networks
, vol.2005
, pp. 33-42
-
-
Song, R.1
Korba, L.2
Yee, G.3
-
48
-
-
0036811662
-
k-anonymity: A model for protecting privacy
-
DOI 10.1142/S0218488502001648
-
L. Sweeney, "k-Anonymity: A Model for Protecting Privacy," Int'l J. Uncertainty, Fuzziness and Knowledge-Based Systems, vol. 10, no. 5, pp. 557-570, Oct. 2002. (Pubitemid 35384857)
-
(2002)
International Journal of Uncertainty, Fuzziness and Knowlege-Based Systems
, vol.10
, Issue.5
, pp. 557-570
-
-
Sweeney, L.1
-
49
-
-
39049096786
-
ODAR: On-demand anonymous routing in Ad Hoc networks
-
Oct.
-
D. Sy, R. Chen, and L. Bao, "ODAR: On-Demand Anonymous Routing in Ad Hoc Networks," Proc. IEEE Int'l Conf. Mobile Ad Hoc and Sensor Systems (MASS '06), pp. 267-276, Oct. 2006.
-
(2006)
Proc. IEEE Int'l Conf. Mobile Ad Hoc and Sensor Systems (MASS '06)
, pp. 267-276
-
-
Sy, D.1
Chen, R.2
Bao, L.3
-
50
-
-
0030407583
-
Optimal transmission ranges for randomly distributed packet radio terminals
-
H. Takagi and L. Kleinrock, "Optimal Transmission Ranges for Randomly Distributed Packet Radio Terminals," J. Wireless Networks, vol. 2, no. 4, pp. 329-342 Dec. 1996.
-
(1996)
J. Wireless Networks
, vol.2
, Issue.4
, pp. 329-342
-
-
Takagi, H.1
Kleinrock, L.2
-
52
-
-
22944492132
-
AO2P: Ad hoc on-demand position-based private routing protocol
-
DOI 10.1109/TMC.2005.50
-
X. Wu and B. Bhargava, "AO2P: Ad Hoc On-Demand Position-Based Private Routing Protocol," IEEE Trans. Mobile Computing, vol. 4, no. 4, pp. 335-348, July/Aug. 2005. (Pubitemid 41049891)
-
(2005)
IEEE Transactions on Mobile Computing
, vol.4
, Issue.4
, pp. 335-348
-
-
Wu, X.1
Bhargava, B.2
-
53
-
-
0003308762
-
Internet X.509 public key infrastructure certificate and CRL profile
-
"Internet X.509 Public Key Infrastructure Certificate and CRL Profile," IETF RFC 2459, http://www.ietf.org/rfc/rfc2459.txt, 1999.
-
(1999)
IETF RFC
, vol.2459
-
-
-
54
-
-
74049149243
-
An efficient anonymous routing protocol for mobile Ad Hoc networks
-
H. Li, J. Ma, X. Li, and W. Zhang, "An Efficient Anonymous Routing Protocol for Mobile Ad Hoc Networks," Proc. Information Assurance and Security Conf. (IAS '09), pp. 287-290, 2009.
-
(2009)
Proc. Information Assurance and Security Conf. (IAS '09)
, pp. 287-290
-
-
Li, H.1
Ma, J.2
Li, X.3
Zhang, W.4
-
55
-
-
50049110705
-
Discount anonymous on demand routing for mobile Ad Hoc Networks
-
Sept.
-
L. Yang, M. Jakobsson, and S. Wetzel, "Discount Anonymous on Demand Routing for Mobile Ad Hoc Networks," Proc. SECURECOMM, vol. 28, pp. 1-10, Sept. 2006.
-
(2006)
Proc. SECURECOMM
, vol.28
, pp. 1-10
-
-
Yang, L.1
Jakobsson, M.2
Wetzel, S.3
-
56
-
-
29844452647
-
Link-layer salvaging for making routing progress in mobile Ad Hoc networks
-
C. Yu, K.G. Shin, and L. Song, "Link-Layer Salvaging for Making Routing Progress in Mobile Ad Hoc Networks," Proc. Sixth ACM Int'l Symp. Mobile Ad Hoc Networking and Computing, pp. 242-254, 2005.
-
(2005)
Proc. Sixth ACM Int'l Symp. Mobile Ad Hoc Networking and Computing
, pp. 242-254
-
-
Yu, C.1
Shin, K.G.2
Song, L.3
-
57
-
-
33748622050
-
MASK: Anonymous on-demand routing in mobile Ad Hoc networks
-
DOI 10.1109/TWC.2006.1687761, 1687761
-
Y. Zhang, W. Liu, W. Lou, and Y. Fang, "MASK: Anonymous On-Demand Routing in Mobile Ad Hoc Networks," IEEE Trans. Wireless Comm., vol. 5, no. 9, pp. 2376-2385, Sept. 2006. (Pubitemid 44376150)
-
(2006)
IEEE Transactions on Wireless Communications
, vol.5
, Issue.9
, pp. 2376-2385
-
-
Zhang, Y.1
Liu, W.2
Lou, W.3
Fang, Y.4
-
58
-
-
20544465052
-
Anonymous secure routing in mobile ad-hoc networks
-
Proceedings - 29th Annual IEEE International Conference on Local Computer Networks, LCN 2004
-
B. Zhu, Z. Wan, M.S. Kankanhalli, F. Bao, and R.H. Deng, "Anonymous Secure Routing in Mobile Ad-Hoc Networks," Proc. 29th Ann. IEEE Int'l Conf. Local Computer Networks, pp. 102-108, Nov. 2004. (Pubitemid 40845199)
-
(2004)
Proceedings - Conference on Local Computer Networks, LCN
, pp. 102-108
-
-
Zhu, B.1
Wan, Z.2
Kankanhalli, M.S.3
Bao, F.4
Deng, R.H.5
|