-
1
-
-
34547610382
-
Secure routing for mobile ad hoc networks
-
doi:10.1109/SNPD.2007.223
-
Argyroudis, P., & O'Mahony, D. (2005). Secure routing for mobile ad hoc networks. IEEE Communications Surveys and Tutorials, 7(3), 2-21. doi:10.1109/SNPD.2007.223.
-
(2005)
IEEE Communications Surveys and Tutorials
, vol.7
, Issue.3
, pp. 2-21
-
-
Argyroudis, P.1
O'Mahony, D.2
-
2
-
-
51949118509
-
-
IETF Internet Draft. Work in progress, November 2007
-
Baset, S., Schulzrinne, H., & Matuszewski, M. (2007). Peerto-peer protocol (P2PP). IETF Internet Draft.http://tools. ietf.org/html/draft-baset- p2psip-p2pp-01. Work in progress, November 2007.
-
(2007)
Peerto-Peer Protocol (P2PP)
-
-
Baset, S.1
Schulzrinne, H.2
Matuszewski, M.3
-
3
-
-
84865351333
-
-
IETF Internet Draft. Work in progress, March 2010
-
Birkos, K., et al. (2010). Security mechanisms and key refresh for P2PSIP overlays. IETF Internet Draft.http://www.ietf.org/id/draft-birkos-p2psip- security-key-refresh-00.txt. Work in progress, March 2010.
-
(2010)
Security Mechanisms and Key Refresh for P2PSIP Overlays
-
-
Birkos, K.1
-
4
-
-
36849050321
-
A survey of routing protocols that support QoS in mobile ad hoc networks
-
DOI 10.1109/MNET.2007.4395108
-
Chen, L., & Heinzelman, W. B. (2007). A survey of routing protocols that support QoS in mobile ad hoc networks. IEEE Network Magazine, 21(6), 30-38. doi:10.1109/MNET.2007.4395108. (Pubitemid 350226928)
-
(2007)
IEEE Network
, vol.21
, Issue.6
, pp. 30-38
-
-
Chen, L.1
Heinzelman, W.B.2
-
7
-
-
57449099847
-
Securing QoS signaling in IP-based military ad hoc networks
-
doi:10.1109/MCOM.2008.4689243
-
Hegland, A., & Winjum, E. (2008). Securing QoS signaling in IP-based military ad hoc networks. IEEE Communications Magazine, 46(11), 42-48. doi:10.1109/MCOM.2008.4689243.
-
(2008)
IEEE Communications Magazine
, vol.46
, Issue.11
, pp. 42-48
-
-
Hegland, A.1
Winjum, E.2
-
8
-
-
84865351332
-
-
IETF, P2PSIP Working Group
-
IETF (2010). P2PSIP Working Group.http://www.ietf.org/dyn/wg/charter/ p2psip-charter.html.
-
(2010)
-
-
-
9
-
-
62649104662
-
-
IETF Internet Draft. Work in progress, July 2009
-
Jennings, C., Lowekamp, B., Rescorla, E., Baset, S., & Schulzrinne, H. (2009). Resource location and discovery (RELOAD) base protocol. IETF Internet Draft.http://tools. ietf.org/html/draft-ietf-p2psip-base-08. Work in progress, July 2009.
-
(2009)
Resource Location and Discovery (RELOAD) Base Protocol
-
-
Jennings, C.1
Lowekamp, B.2
Rescorla, E.3
Baset, S.4
Schulzrinne, H.5
-
11
-
-
67549118440
-
Design and implementation of MobiSEC: A complete security architecture for wireless mesh networks
-
Elsevier doi:10.1016/j.comnet.2009.04.002
-
Martigon, F., Paris, S., & Capone, A. (2009). Design and implementation of MobiSEC: A complete security architecture for wireless mesh networks. Computer Networks (Elsevier), 53(12), 2192-2207. doi:10.1016/j.comnet. 2009.04.002.
-
(2009)
Computer Networks
, vol.53
, Issue.12
, pp. 2192-2207
-
-
Martigon, F.1
Paris, S.2
Capone, A.3
-
12
-
-
77951287085
-
A game theoretic approach for securing AODV in emergency mobile ad hoc networks
-
Zurich, Switzerland doi:10.1109/LCN.2009.5355020
-
Panaousis, E. A., & Politis, C. (2009). A game theoretic approach for securing AODV in emergency mobile ad hoc networks. In Proc. 34th IEEE conference on local computer networks (IEEE LCN), Zurich, Switzerland (pp. 985-992). doi:10.1109/LCN.2009.5355020.
-
(2009)
Proc. 34th IEEE Conference on Local Computer Networks (IEEE LCN)
, pp. 985-992
-
-
Panaousis, E.A.1
Politis, C.2
-
13
-
-
84885477893
-
Adaptive and secure routing for emergency mobile ad-hoc networks
-
Panaousis, E. A., Ramrekha, T. A., Millar, G. P., & Politis, C. (2010). Adaptive and secure routing for emergency mobile ad-hoc networks. International Journal of Wireless and Mobile Networks (IJWMN), 2, 62-78.
-
(2010)
International Journal of Wireless and Mobile Networks (IJWMN)
, vol.2
, pp. 62-78
-
-
Panaousis, E.A.1
Ramrekha, T.A.2
Millar, G.P.3
Politis, C.4
-
17
-
-
39049116456
-
A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks
-
Catalunya, Spain doi:10.1109/INFOCOM.2006154
-
Sun, Y. L., Han, Z., Yu, W., & Liu, K. J. R. (2006). A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks. In Proc. 25th IEEE international conference on computer communications, Catalunya, Spain (pp. 1-13). doi:10.1109/INFOCOM.2006.154.
-
(2006)
Proc. 25th IEEE International Conference on Computer Communications
, pp. 1-13
-
-
Sun, Y.L.1
Han, Z.2
Yu, W.3
Liu, K.J.R.4
-
18
-
-
33144479525
-
SCAN: Self-organized network-layer security in mobile ad hoc networks
-
DOI 10.1109/JSAC.2005.861384
-
Yang, H., Meng, X., & Lu, S. (2006). SCAN: Self-organized network-layer security in mobile ad hoc networks. IEEE Journal on Selected Areas in Communications, 24(2), 261-273. doi:10.1109/JSAC.2005.861384. (Pubitemid 43269748)
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, Issue.2
, pp. 261-273
-
-
Yang, H.1
Shu, J.2
Meng, X.3
Lu, S.4
-
19
-
-
2442582716
-
Secure ad hoc on-demand distance vector routing
-
doi:10.1145/581291.581312
-
Zapata, M. G. (2002). Secure ad hoc on-demand distance vector routing. In Proc. ACM mobile computing and communications review (MC2R) (Vol 6., No. 3, pp. 106-107). doi:10.1145/581291.581312.
-
(2002)
Proc. ACM Mobile Computing and Communications Review (MC2R)
, vol.6
, Issue.3
, pp. 106-107
-
-
Zapata, M.G.1
|