-
1
-
-
0036986441
-
An on-demand secure routing protocol resilient to Byzantine failures
-
AHNRR02 und Atlanta, Georgia. September auch verfgbar unter
-
Awerbuch, B., Holmer, D., Nita-Rotaru, C., und Rubens, H.: An On-Demand Secure Routing Protocol Resilient to Byzantine Failures. In: ACM Workshop on Wireless Security (WiSe). Atlanta, Georgia. September 2002. auch verfgbar unter http://citeseer.nj.nec.com/article/awerbuch02demand.html.
-
(2002)
ACM Workshop on Wireless Security (WiSe)
-
-
Awerbuch, B.1
Holmer, D.2
Nita-Rotaru, C.3
Rubens, H.4
-
2
-
-
0002380073
-
Tamper resistance - A cautionary note
-
AK96 und S. November auch verfgbar unter
-
Anderson, R. und Kuhn, M.: Tamper Resistance - a Cautionary Note. In: Proceedings of the Second Usenix Workshop on Electronic Commerce. S. 1-11. November 1996. auch verfgbar unter http://citeseer.nj.nec.com/article/anderson96tamper.html.
-
(1996)
Proceedings of the Second Usenix Workshop on Electronic Commerce
, pp. 1-11
-
-
Anderson, R.1
Kuhn, M.2
-
4
-
-
0037885580
-
Nodes bearing grudges: Towards routing security, fairness, and robustness in mobile ad hoc networks
-
BB02a und S. Canary Islands, Spain. January IEEE Computer Society
-
Buchegger, S. und Boudec, J.-Y. L.: Nodes Bearing Grudges: Towards Routing Security, Fairness, and Robustness in Mobile Ad Hoc Networks. In: Proceedings of the Tenth Euromicro Workshop on Parallel, Distributed and Network-based Processing. S. 403-410. Canary Islands, Spain. January 2002. IEEE Computer Society. http://citeseer.nj.nec.com/article/buchegger02nodes.html.
-
(2002)
Proceedings of the Tenth Euromicro Workshop on Parallel, Distributed and Network-Based Processing
, pp. 403-410
-
-
Buchegger, S.1
Boudec, J.-Y.L.2
-
7
-
-
0042660545
-
Stimulating cooperation in self-organizing mobile ad hoc networks
-
BH03 und October
-
Buttyn, L. und Hubaux, J.-P.: Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks. ACM/Kluwer Mobile Networks and Applications. 8(5). October 2003.
-
(2003)
ACM/Kluwer Mobile Networks and Applications
, vol.8
, Issue.5
-
-
Buttyn, L.1
Hubaux, J.-P.2
-
9
-
-
2442582716
-
Secure ad hoc on-demand distance vector routing
-
Gu02 July auch verfgbar unter
-
Guerrero Zapata, M.: Secure Ad hoc On-Demand Distance Vector Routing. ACM Mobile Computing and Communications Review (MC2R). 6(3):106-107. July 2002. auch verfgbar unter http://doi.acm.org/10.1145/581291.581312.
-
(2002)
ACM Mobile Computing and Communications Review (MC2R)
, vol.6
, Issue.3
, pp. 106-107
-
-
Guerrero Zapata, M.1
-
10
-
-
0036957315
-
Ariadne: A secure On-Demand Routing Protocol for Ad hoc Networks
-
HPJ02 und Atlanta, Georgia, USA. September
-
Hu, Y.-C., Perrig, A., und Johnson, D. B.: Ariadne: A secure On-Demand Routing Protocol for Ad hoc Networks. In: Proceedings of MobiCom 2002. Atlanta, Georgia, USA. September 2002.
-
(2002)
Proceedings of MobiCom 2002
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
11
-
-
0003597247
-
-
JMHJ03 und April
-
Johnson, D. B., Maltz, D. A., Hu, Y.-C., und Jetcheva, J. G. The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks (DSR). http://www.ietf.org/internet-drafts/draft-ietf-manet-dsr-09.txt. April 2003.
-
(2003)
The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks (DSR)
-
-
Johnson, D.B.1
Maltz, D.A.2
Hu, Y.-C.3
Jetcheva, J.G.4
-
12
-
-
11844293124
-
-
Ka03 PhD thesis. University of Ulm. Ulm, Germany. also available as
-
Kargl, F.: Sicherheit in Mobilen Ad hoc Netzwerken. PhD thesis. University of Ulm. Ulm, Germany. 2003. also available as http://medien.informatik.uni-ulm.de/frank/research/dissertation.pdf.
-
(2003)
Sicherheit in Mobilen Ad Hoc Netzwerken
-
-
Kargl, F.1
-
13
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
MGLB00 und S. auch verfgbar unter
-
Marti, S., Giuli, T. J., Lai, K., und Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: Mobile Computing and Networking. S. 255-265. 2000. auch verfgbar unter http://citeseer.nj.nec.com/marti00mitigating.html.
-
(2000)
Mobile Computing and Networking
, pp. 255-265
-
-
Marti, S.1
Giuli, T.J.2
Lai, K.3
Baker, M.4
-
18
-
-
1542451215
-
Secure routing for mobile ad hoc networks. Working session on security in wireless ad hoc networks, EPFL
-
PH02b und published in June
-
Papadimitratos, P. und Haas, Z. J. Secure Routing for Mobile Ad Hoc Networks. Working Session on Security in Wireless Ad Hoc Networks, EPFL, (published in Mobile Computing and Communications Review, vol.6, no.4). June 2002.
-
(2002)
Mobile Computing and Communications Review
, vol.6
, Issue.4
-
-
Papadimitratos, P.1
Haas, Z.J.2
-
22
-
-
0002670359
-
Modeling security threats
-
Sc99 December auch verfgbar unter
-
Schneier, B.: Modeling security threats. Dr Dobb's Journal. December 1999. auch verfgbar unter http://www.ddj.com/documents/s=896/ddj9912a/9912a.htm.
-
(1999)
Dr Dobb's Journal
-
-
Schneier, B.1
-
23
-
-
0842283101
-
A secure routing protocol for ad hoc networks
-
SDL+02 und November auch verfgbar unter
-
Sanzgiri, K., Dahill, B., Levine, B. N., Shields, C., und Belding-Royer, E. M.: A Secure Routing Protocol for Ad Hoc Networks. In: Proceedings of 2002 IEEE International Conference on Network Protocols (ICNP). November 2002. auch verfgbar unter http://signl.cs.umass.edu/pubs/aran.icnp02.ps.
-
(2002)
Proceedings of 2002 IEEE International Conference on Network Protocols (ICNP)
-
-
Sanzgiri, K.1
Dahill, B.2
Levine, B.N.3
Shields, C.4
Belding-Royer, E.M.5
-
24
-
-
0042933944
-
Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks
-
ZCY03 und San Francisco, CA. April
-
Zhong, S., Chen, J., und Yang, Y. R.: Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks. In: Proceedings of IEEE Infocom'03. San Francisco, CA. April 2003.
-
(2003)
Proceedings of IEEE Infocom'03
-
-
Zhong, S.1
Chen, J.2
Yang, Y.R.3
-
25
-
-
0034546898
-
Intrusion detection in wireless ad-hoc networks
-
ZL00 und S. auch verfgbar unter
-
Zhang, Y. und Lee, W.: Intrusion detection in wireless ad-hoc networks. In: Mobile Computing and Networking. S. 275-283. 2000. auch verfgbar unter http://citeseer.nj.nec.com/zhang00intrusion.html.
-
(2000)
Mobile Computing and Networking
, pp. 275-283
-
-
Zhang, Y.1
Lee, W.2
-
26
-
-
0041473688
-
Intrusion detection techniques for mobile wireless networks
-
ZLH03 und to appear in 9. auch verfgbar unter
-
Zhang, Y., Lee, W., und Huang, Y.-A.: Intrusion Detection Techniques for Mobile Wireless Networks. to appear in ACM Wireless Networks (WINET). 9. 2003. auch verfgbar unter http://www.wins.hrl.com/people/ygz/papers/winet03.pdf.
-
(2003)
ACM Wireless Networks (WINET)
-
-
Zhang, Y.1
Lee, W.2
Huang, Y.-A.3
|