-
1
-
-
0041468485
-
Routing security and data confidentiality for mobile Ad-hoc networks
-
In, (VTC 2003-Spring)
-
K. S. Ng and W. K. G. Seah, "Routing security and data confidentiality for mobile Ad-hoc networks," In Proc. of the 57th IEEE Semiannual Vehicular Technology Conf. (VTC 2003-Spring), 2003, pp. 1821-1825 vol.3.
-
(2003)
Proc. of the 57th IEEE Semiannual Vehicular Technology Conf
, vol.3
, pp. 1821-1825
-
-
Ng, K.S.1
Seah, W.K.G.2
-
2
-
-
0034541756
-
Mitigating routing misbehavior in mobile Adhoc networks
-
In, Boston, Massachusetts, United States
-
A. S. Marti, A. T. J. Giuli, A. K. Lai, and A. M. Baker, "Mitigating routing misbehavior in mobile Adhoc networks," In Proc. of the 6th Int. Conf. on Mobile computing and networking, Boston, Massachusetts, United States, 2000, pp. 255-265.
-
(2000)
Proc. of the 6th Int. Conf. on Mobile computing and networking
, pp. 255-265
-
-
Marti, A.S.1
Giuli, A.T.J.2
Lai, A.K.3
Baker, A.M.4
-
3
-
-
1842815887
-
Security in mobile Ad-hoc networks: challenges and solutions
-
H. Yang, H. Luo, F. Ye, S. Lu, and L. Zhang, "Security in mobile Ad-hoc networks: challenges and solutions," Wireless Communications, IEEE, 2004, vol. 11, pp. 38-47.
-
(2004)
Wireless Communications, IEEE
, vol.11
, pp. 38-47
-
-
Yang, H.1
Luo, H.2
Ye, F.3
Lu, S.4
Zhang, L.5
-
4
-
-
22944471143
-
Performance Evaluation and Simulation Verification for Wireless Ad-hoc Networks
-
H. Hallani and S. A. Shahrestani, "Performance Evaluation and Simulation Verification for Wireless Ad-hoc Networks," WSEAS Transactions on Communications, 2005, vol. 4, pp. 355-362.
-
(2005)
WSEAS Transactions on Communications
, vol.4
, pp. 355-362
-
-
Hallani, H.1
Shahrestani, S.A.2
-
5
-
-
0037086890
-
Wireless sensor networks: a survey
-
I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, "Wireless sensor networks: a survey," Computer Networks, 2002, vol. 38, pp. 393-422.
-
(2002)
Computer Networks
, vol.38
, pp. 393-422
-
-
Akyildiz, I.F.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
6
-
-
0036804761
-
Routing security in wireless Ad-hoc networks
-
H. Deng, W. Li, and D. P. Agrawal, "Routing security in wireless Ad-hoc networks," Communications Magazine, IEEE, 2002, vol. 40, pp. 70-75.
-
(2002)
Communications Magazine, IEEE
, vol.40
, pp. 70-75
-
-
Deng, H.1
Li, W.2
Agrawal, D.P.3
-
7
-
-
24744469215
-
A framework for key management in mobile Adhoc networks
-
In Proc. of the Int. Conf. on Information Technology: Coding and Computing, (ITCC 2005)
-
G. C. Hadjichristofi, W. J. Adams, and N. J. Davis, IV, "A framework for key management in mobile Adhoc networks," In Proc. of the Int. Conf. on Information Technology: Coding and Computing, (ITCC 2005), 2005, pp. 568-573 Vol. 2.
-
(2005)
, vol.2
, pp. 568-573
-
-
Hadjichristofi, G.C.1
Adams, W.J.2
Davis Iv, N.J.3
-
8
-
-
33646552392
-
Secure Routing and Intrusion Detection in Ad-hoc Networks
-
In Proc. of the 3rd IEEE Int. Conf. on Pervasive Computing and Communications, (PerCom 2005)
-
A. Patwardhan, J. Parker, A. Joshi, M. Iorga, and T. Karygiannis, "Secure Routing and Intrusion Detection in Ad-hoc Networks," In Proc. of the 3rd IEEE Int. Conf. on Pervasive Computing and Communications, (PerCom 2005), 2005, pp. 191-199.
-
(2005)
, pp. 191-199
-
-
Patwardhan, A.1
Parker, J.2
Joshi, A.3
Iorga, M.4
Karygiannis, T.5
-
9
-
-
0003582910
-
Ad-hoc Networking
-
Addison-Wesley
-
C. E. Perkins, "Ad-hoc Networking," Addison-Wesley, 2000.
-
(2000)
-
-
Perkins, C.E.1
-
10
-
-
17444426121
-
Ariadne: A secure on-demand routing protocol for Ad-hoc networks
-
Wireless Networks
-
Y. Hu, A. Perrig, and D. Johnson., "Ariadne: A secure on-demand routing protocol for Ad-hoc networks," Wireless Networks, 2005, vol. 11, pp. 21-38.
-
(2005)
, vol.11
, pp. 21-38
-
-
Hu, Y.1
Perrig, A.2
Johnson, D.3
-
11
-
-
21844459458
-
Ad-hoc Wireless Networks: Architectures and Protocols
-
First ed: Prentice Hall PTR
-
C. Siva Ram Murthy and B. S. Manoj, Ad-hoc Wireless Networks: Architectures and Protocols, First ed: Prentice Hall PTR, 2004.
-
(2004)
-
-
Siva Ram Murthy, C.1
Manoj, B.S.2
-
12
-
-
1842665110
-
Intrusion detection in wireless Ad-hoc networks
-
IEEE [see also IEEE Personal Communications]
-
A. Mishra, K. Nadkarni, and A. Patcha, "Intrusion detection in wireless Ad-hoc networks," Wireless Communications, IEEE [see also IEEE Personal Communications], 2004, vol. 11, pp. 48-60.
-
(2004)
Wireless Communications
, vol.11
, pp. 48-60
-
-
Mishra, A.1
Nadkarni, K.2
Patcha, A.3
-
13
-
-
34347349933
-
Ad-hoc ondemand distance vector routing
-
In Proc. of the Mobile Computing Systems and Applications
-
C. E. Perkins and E. M. Royer, "Ad-hoc ondemand distance vector routing," In Proc. of the Mobile Computing Systems and Applications, 1999, pp. 90-100.
-
(1999)
, pp. 90-100
-
-
Perkins, C.E.1
Royer, E.M.2
-
14
-
-
24144437206
-
How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols
-
Ad Hoc Networks
-
P. Ning and K. Sun, "How to misuse AODV: a case study of insider attacks against mobile ad-hoc routing protocols," Ad Hoc Networks, 2005, vol. 3, pp. 795-819.
-
(2005)
, vol.3
, pp. 795-819
-
-
Ning, P.1
Sun, K.2
-
15
-
-
84905093872
-
-
OPNET Modeler
-
OPNET Modeler, "http://www.opnet.com."
-
-
-
-
16
-
-
84948991468
-
A link adaptation scheme for improving throughput in the IEEE 802.11 wireless LAN
-
In Proc. of the 27th Annual IEEE Conf. on Local Computer Networks (LCN 2002)
-
S. Ci and H. Sharif, "A link adaptation scheme for improving throughput in the IEEE 802.11 wireless LAN," In Proc. of the 27th Annual IEEE Conf. on Local Computer Networks (LCN 2002). 2002, pp. 205-208.
-
(2002)
, pp. 205-208
-
-
Ci, S.1
Sharif, H.2
-
17
-
-
0004220542
-
Computer Networks and Internets with Internet Applications
-
fourth edition). Upper Saddle River, NJ: Prentice Hall
-
D. Comer, Computer Networks and Internets with Internet Applications (fourth edition). Upper Saddle River, NJ: Prentice Hall, 2004.
-
(2004)
-
-
Comer, D.1
-
18
-
-
0242696192
-
Performance analysis of the CONFIDANT protocol
-
In Proc. of the 3rd ACM , Lausanne, Switzerland
-
S. Buchegger and J.-Y. L. Boudec, "Performance analysis of the CONFIDANT protocol," In Proc. of the 3rd ACM Int. Symposium on Mobile Ad-hoc networking & computing (MobiHoc 02), Lausanne, Switzerland, 2002, pp. 226-236.
-
(2002)
Int. Symposium on Mobile Ad-hoc networking & computing (MobiHoc 02)
, pp. 226-236
-
-
Buchegger, S.1
Boudec, J.-Y.L.2
|