-
1
-
-
84892079749
-
-
J. Barkley, NIST Special Publication: Symmetric Key Cryptography, http://csrc.nist.gov/publications/nistpubs/800-7/node208.html
-
-
-
Barkley, J.1
-
3
-
-
3042562089
-
The optimized link state routing protocol, evaluation through experiments and simulation
-
Sep
-
T. H. Clausen, G. Hansen, L. Christensen, and G. Behrmann, The Optimized Link State Routing Protocol, Evaluation Through Experiments and Simulation, Proc. of IEEE Symp. on Wireless Personal Mobile Communications 2001, Sep. 2001.
-
(2001)
Proc. of IEEE Symp. on Wireless Personal Mobile Communications 2001
-
-
Clausen, T.H.1
Hansen, G.2
Christensen, L.3
Behrmann, G.4
-
4
-
-
3042783638
-
A pairwise key pre-distribution scheme for wireless sensor networks
-
Oct
-
W. Du, J. Deng, Y. S. Han, and P. K. Varshney, A Pairwise Key Pre-distribution Scheme for Wireless Sensor Networks, ACM CCS 2003, Oct. 2003, pp. 42-51.
-
(2003)
ACM CCS 2003
, pp. 42-51
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Varshney, P.K.4
-
5
-
-
0031381841
-
The routing algorithm for the reconfigurable wireless networks
-
Oct
-
Z. J. Haas, The Routing Algorithm for the Reconfigurable Wireless Networks, Proc. of ICUPC 1997, Vol 2, Oct. 1997, pp. 562-566.
-
(1997)
Proc. of ICUPC 1997
, vol.2
, pp. 562-566
-
-
Haas, Z.J.1
-
7
-
-
0036957315
-
Ariadne: A secure on-demand routing protocol for ad hoc networks
-
Y.-C. Hu, D. B. Johnson, and A. Perrig, Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks, Mobicom'02, 2002.
-
(2002)
Mobicom'02
-
-
Hu, Y.-C.1
Johnson, D.B.2
Perrig, A.3
-
8
-
-
3042667172
-
Rushing attacks and defense in wireless ad hoc network routing protocols
-
Y.-C. Hu, D. B. Johnson, and A. Perrig, Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols, WiSe 2003, 2003.
-
(2003)
WiSe 2003
-
-
Hu, Y.-C.1
Johnson, D.B.2
Perrig, A.3
-
10
-
-
0041973497
-
Packet leashes: A defense against wormhole attacks in wireless networks
-
Y.-C. Hu, A. Perrig, and D. B. Johnson, Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks, Infocom 2003.
-
(2003)
Infocom
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
11
-
-
0000629443
-
Dynamic source routing in ad hoc wireless networks
-
Kluwer, Dordrecht
-
D. B. Johnson and D. A. Maltz, Dynamic Source Routing in Ad Hoc Wireless Networks, Mobile Computing, Kluwer, Dordrecht, Vol 353, 1996, pp. 153-181.
-
(1996)
Mobile Computing
, vol.353
, pp. 153-181
-
-
Johnson, D.B.1
Maltz, D.A.2
-
13
-
-
0030264587
-
An efficient routing protocol for wireless networks
-
Oct
-
S. Murthy and J. J. Garcia-Luna-Aceves, An Efficient Routing Protocol for Wireless Networks, ACM Mobile Networks and Applications Journal, Special Issue on Routing in Mobile Communication Networks, Vol 1, No 2, Oct. 1996, pp. 183-197.
-
(1996)
ACM Mobile Networks and Applications Journal, Special Issue on Routing in Mobile Communication Networks
, vol.1
, Issue.2
, pp. 183-197
-
-
Murthy, S.1
Garcia-Luna-Aceves, J.J.2
-
15
-
-
3042785862
-
The sybil attack in sensor networks: Analysis & defenses
-
J. Newsome, E. Shi, D. Song, and A. Perrig, The Sybil Attack in Sensor Networks: Analysis & Defenses, Proc. of the 3rd Intl. Symp. on Information Processing in Sensor Networks, 2004.
-
(2004)
Proc. of the 3rd Intl. Symp. on Information Processing in Sensor Networks
-
-
Newsome, J.1
Shi, E.2
Song, D.3
Perrig, A.4
-
17
-
-
0031353437
-
A highly adaptive distributed routing algorithm for mobile wireless networks
-
Apr
-
V. D. Park and M. S. Corson, A Highly Adaptive Distributed Routing Algorithm for Mobile Wireless Networks, IEEE Infocom 1997, Apr. 1997, pp. 1405-1413.
-
(1997)
IEEE Infocom 1997
, pp. 1405-1413
-
-
Park, V.D.1
Corson, M.S.2
-
20
-
-
0242426103
-
The TESLA broadcast authentication protocol
-
Summer/Fall
-
A. Perrig, R. Canetti, D. Tygar, and D. Song, The TESLA Broadcast Authentication Protocol, RSA Cryptobytes (RSA Laboratories), Vol 5, No 2, Summer/Fall 2002, pp. 2-13.
-
(2002)
RSA Cryptobytes (RSA Laboratories)
, vol.5
, Issue.2
, pp. 2-13
-
-
Perrig, A.1
Canetti, R.2
Tygar, D.3
Song, D.4
-
21
-
-
84904904836
-
A secure routing protocol for ad hoc networks
-
Nov
-
K. Sanzgiri, B. Dahill, B. N. Levine, C. Shields, and E. M. Belding-Royer, A Secure Routing Protocol for Ad hoc Networks, The 10th IEEE Intl. Conf. on Network Protocol (ICNP), Nov. 2002.
-
(2002)
The 10th IEEE Intl. Conf. on Network Protocol (ICNP)
-
-
Sanzgiri, K.1
Dahill, B.2
Levine, B.N.3
Shields, C.4
Belding-Royer, E.M.5
-
22
-
-
0032690749
-
CEDAR: A core extraction distributed ad hoc routing algorithm
-
Aug
-
P. Sinha, R. Sivakumar, and V. Bharghavan, CEDAR: A Core Extraction Distributed Ad Hoc Routing Algorithm, IEEE Journal On Selected Areas in Communications, Vol 17, No 8, Aug. 1999, pp. 1454-1466.
-
(1999)
IEEE Journal on Selected Areas in Communications
, vol.17
, Issue.8
, pp. 1454-1466
-
-
Sinha, P.1
Sivakumar, R.2
Bharghavan, V.3
-
24
-
-
0034771605
-
SPINS: Security protocols for sensor networks
-
R. Szewczyk, V. Wen, D. Culler, J. D. Tygar, and A. Perrig, SPINS: Security Protocols for Sensor Networks, In 7th Annual ACM Intl. Conf. on Mobile Computing and Networks (Mobicom 2001), 2001.
-
(2001)
7th Annual ACM Intl. Conf. on Mobile Computing and Networks (Mobicom 2001)
-
-
Szewczyk, R.1
Wen, V.2
Culler, D.3
Tygar, J.D.4
Perrig, A.5
-
25
-
-
0036498659
-
The broadcast storm problem in a mobile ad hoc network
-
Mar
-
Y.-C. Tseng, S.-Y. Ni, Y.-S. Chen, and J.-P. Sheu, The Broadcast Storm Problem in a Mobile Ad Hoc Network, ACM Wireless Networks, Vol 8, No 2, Mar. 2002, pp. 153-167.
-
(2002)
ACM Wireless Networks
, vol.8
, Issue.2
, pp. 153-167
-
-
Tseng, Y.-C.1
Ni, S.-Y.2
Chen, Y.-S.3
Sheu, J.-P.4
-
26
-
-
11944253975
-
A generic distributed broadcast scheme in ad hoc wireless networks
-
Oct
-
J. Wu and F. Dai, A Generic Distributed Broadcast Scheme in Ad Hoc Wireless Networks, IEEE Transactions on Computers, Vol 53, No 10, Oct. 2004, pp. 1343-1354.
-
(2004)
IEEE Transactions on Computers
, vol.53
, Issue.10
, pp. 1343-1354
-
-
Wu, J.1
Dai, F.2
|