-
1
-
-
35048850522
-
On Trust Establishment in Mobile Ad-hoc Networks
-
L. Eschenauer, V. D. Gligor, and J. Baras, "On Trust Establishment in Mobile Ad-hoc Networks," Lecture Notes in Computer Science: Security Protocols, 2004, vol. 2845, pp. 47-66.
-
(2004)
Lecture Notes in Computer Science: Security Protocols
, vol.2845
, pp. 47-66
-
-
Eschenauer, L.1
Gligor, V.D.2
Baras, J.3
-
3
-
-
34547407799
-
Robust cooperative trust establishment for MANETs
-
C. Zouridaki, B. L. Mark, M. Hejmo, and R. K. Thomas, "Robust cooperative trust establishment for MANETs," In Proc. of the 4th ACM workshop on Security of Ad-hoc and sensor networks, 2006, pp. 23-34.
-
(2006)
Proc. of the 4th ACM workshop on Security of Ad-hoc and sensor networks
, pp. 23-34
-
-
Zouridaki, C.1
Mark, B.L.2
Hejmo, M.3
Thomas, R.K.4
-
4
-
-
0034286541
-
Using Trust For Detecting Deceitful Agents In Artificial Societies
-
M. SCHILLO, "Using Trust For Detecting Deceitful Agents In Artificial Societies," Applied Artificial Intelligence, 2000, vol. 14, pp. 825-848.
-
(2000)
Applied Artificial Intelligence
, vol.14
, pp. 825-848
-
-
Schillo, M.1
-
5
-
-
0036793924
-
Denial of service in sensor networks
-
A. D. Wood and J. A. Stankovic, "Denial of service in sensor networks," Computer, 2002, vol. 35 No.10, pp. 54-62.
-
(2002)
Computer
, vol.35
, Issue.10
, pp. 54-62
-
-
Wood, A.D.1
Stankovic, J.A.2
-
6
-
-
0037003792
-
Denial of Service Attacks at the MAC Layer in Wireless Ad Hoc Networks
-
V. Gupta, S. Krishnamurthy, and M. Faloutsos, "Denial of Service Attacks at the MAC Layer in Wireless Ad Hoc Networks," MILCOM, 2002, pp. 1118-1123.
-
(2002)
MILCOM
, pp. 1118-1123
-
-
Gupta, V.1
Krishnamurthy, S.2
Faloutsos, M.3
-
7
-
-
84961572484
-
SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks
-
WMCSA'02
-
Y.-C. Hu, D. B. Johnson, and A. Perrig, "SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks," In Proc. of the Fourth IEEE Workshop on Mobile Computing Systems and Applications (WMCSA'02), 2002, pp. 3-13.
-
(2002)
Proc. of the Fourth IEEE Workshop on Mobile Computing Systems and Applications
, pp. 3-13
-
-
Hu, Y.-C.1
Johnson, D.B.2
Perrig, A.3
-
8
-
-
17444426121
-
Ariadne: A secure on-demand routing protocol for Ad-hoc networks
-
Y. Hu, A. Perrig, and D. Johnson., "Ariadne: A secure on-demand routing protocol for Ad-hoc networks," Wireless Networks, 2005, vol. 11, pp. 21-38.
-
(2005)
Wireless Networks
, vol.11
, pp. 21-38
-
-
Hu, Y.1
Perrig, A.2
Johnson, D.3
-
9
-
-
11244252132
-
Denial of service resilience in ad hoc networks
-
Philadelphia, PA, USA
-
A. I. Aad, A. J.-P. Hubaux, and A. E. W. Knightly, "Denial of service resilience in ad hoc networks," In Proc. of the Proceedings of the 10th annual international conference on Mobile computing and networking, Philadelphia, PA, USA, 2004, pp. 202-215.
-
(2004)
Proc. of the Proceedings of the 10th annual international conference on Mobile computing and networking
, pp. 202-215
-
-
Aad, A.I.1
Hubaux, A.J.-P.2
Knightly, A.E.W.3
-
10
-
-
84905121025
-
Security Scheme for Malicious Node Detection in Mobile Ad Hoc Networks
-
P. Rathod, N. Mody, D. Gada, R. Gogri, Z. Dedhia, S. Sanyal, and A. Abraham, "Security Scheme for Malicious Node Detection in Mobile Ad Hoc Networks," Lecture Notes in Computer Science, 2004, vol. 3326, pp. 541-542.
-
(2004)
Lecture Notes in Computer Science
, vol.3326
, pp. 541-542
-
-
Rathod, P.1
Mody, N.2
Gada, D.3
Gogri, R.4
Dedhia, Z.5
Sanyal, S.6
Abraham, A.7
-
11
-
-
84905125680
-
The Impact of Malicious Nodes on the Performance of Wireless Ad-hoc Networks
-
IBIMA'06, Bonn, Germany, 19-21 June
-
H. Hallani and S. A. Shahrestani, "The Impact of Malicious Nodes on the Performance of Wireless Ad-hoc Networks," In Proc. of the 6th International Business Information Management Association (IBIMA'06), Bonn, Germany, 19-21 June 2006, pp. 596-601.
-
(2006)
Proc. of the 6th International Business Information Management Association
, pp. 596-601
-
-
Hallani, H.1
Shahrestani, S.A.2
-
12
-
-
24744469215
-
A framework for key management in mobile Ad-hoc networks
-
ITCC 2005
-
G. C. Hadjichristofi, W. J. Adams, and N. J. Davis, IV, "A framework for key management in mobile Ad-hoc networks," In Proc. of the Int. Conf. on Information Technology: Coding and Computing, (ITCC 2005), 2005, pp. 568-573 Vol. 2.
-
(2005)
Proc. of the Int. Conf. on Information Technology: Coding and Computing
, vol.2
, pp. 568-573
-
-
Hadjichristofi, G.C.1
Adams, W.J.2
Davis, N.J.3
-
13
-
-
33646552392
-
Secure Routing and Intrusion Detection in Ad-hoc Networks
-
PerCom 2005
-
A. Patwardhan, J. Parker, A. Joshi, M. Iorga, and T. Karygiannis, "Secure Routing and Intrusion Detection in Ad-hoc Networks," In Proc. of the 3rd IEEE Int. Conf. on Pervasive Computing and Communications, (PerCom 2005), 2005, pp. 191-199.
-
(2005)
Proc. of the 3rd IEEE Int. Conf. on Pervasive Computing and Communications
, pp. 191-199
-
-
Patwardhan, A.1
Parker, J.2
Joshi, A.3
Iorga, M.4
Karygiannis, T.5
-
15
-
-
4544235014
-
Stimulating Cooperative Behavior of Autonomous Devices - An Analysis of requirements and Existing Approaches
-
WIS2003), Angers, France April
-
P. Obreiter, B. Koenig-Ries, and M. Klein, "Stimulating Cooperative Behavior of Autonomous Devices - An Analysis of requirements and Existing Approaches", 2nd Int. Workshop on Wireless Information Systems (WIS2003), Angers, France April 2003.
-
(2003)
2nd Int. Workshop on Wireless Information Systems
-
-
Obreiter, P.1
Koenig-Ries, B.2
Klein, M.3
-
16
-
-
15244339622
-
Authenticated routing for ad hoc networks
-
K. Sanzgiri, D. LaFlamme, B. Dahill, B. N. Levine, C. Shields, and E. M. Belding-Royer, "Authenticated routing for ad hoc networks," Selected Areas in Communications, IEEE Journal on, 2005, vol. 23, pp. 598-610.
-
(2005)
Selected Areas in Communications, IEEE Journal
, vol.23
, pp. 598-610
-
-
Sanzgiri, K.1
LaFlamme, D.2
Dahill, B.3
Levine, B.N.4
Shields, C.5
Belding-Royer, E.M.6
-
17
-
-
0003456435
-
Secure ad hoc on-demand distance vector (saodv) routing Internet Engineering Task Force (IETF) Draft
-
M. G. Zapata, Secure ad hoc on-demand distance vector (saodv) routing Internet Engineering Task Force (IETF) Draft, 2004.
-
(2004)
-
-
Zapata, M.G.1
-
18
-
-
0034541756
-
Mitigating routing misbehavior in mobile Ad-hoc networks
-
Boston, Massachusetts, United States
-
A. S. Marti, A. T. J. Giuli, A. K. Lai, and A. M. Baker, "Mitigating routing misbehavior in mobile Ad-hoc networks," In Proc. of the 6th Int. Conf. on Mobile computing and networking, Boston, Massachusetts, United States, 2000, pp. 255-265.
-
(2000)
Proc. of the 6th Int. Conf. on Mobile computing and networking
, pp. 255-265
-
-
Marti, A.S.1
Giuli, A.T.J.2
Lai, A.K.3
Baker, A.M.4
-
19
-
-
4544226115
-
On using reputations in Ad-hoc networks to counter malicious nodes
-
ICPADS 04
-
P. Dewan, P. Dasgupta, and A. Bhattacharya, "On using reputations in Ad-hoc networks to counter malicious nodes," In Proc. of the 10th Int. Conf. on Parallel and Distributed Systems, (ICPADS 04). 2004, pp. 665-672.
-
(2004)
Proc. of the 10th Int. Conf. on Parallel and Distributed Systems
, pp. 665-672
-
-
Dewan, P.1
Dasgupta, P.2
Bhattacharya, A.3
|