-
1
-
-
33751187622
-
Wireless ad hoc networks: Technologies and challenges: Editorials
-
Younis M, Ozer SZ. Wireless ad hoc networks: technologies and challenges: editorials. Wireless Communications & Mobile Computing 2006; 6(7):889-892.
-
(2006)
Wireless Communications & Mobile Computing
, vol.6
, Issue.7
, pp. 889-892
-
-
Younis, M.1
Ozer, S.Z.2
-
2
-
-
0038099200
-
Topology control and routing in ad hoc networks: A survey
-
Rajaraman R. Topology control and routing in ad hoc networks: a survey. SIGACT News 2002; 33(2):60-73.
-
(2002)
SIGACT News
, vol.33
, Issue.2
, pp. 60-73
-
-
Rajaraman, R.1
-
3
-
-
33947228000
-
Qos multicast routing by using multiple paths/trees in wireless ad hoc networks
-
Wu H, Jia X. Qos multicast routing by using multiple paths/trees in wireless ad hoc networks. Ad Hoc Networks 2007; 5(5):600-612.
-
(2007)
Ad Hoc Networks
, vol.5
, Issue.5
, pp. 600-612
-
-
Wu, H.1
Jia, X.2
-
4
-
-
77949576799
-
A load balancing energy efficient clustering algorithm for MANETs
-
Safa H, Mirza O. A load balancing energy efficient clustering algorithm for MANETs. International Journal of Communication Systems 2010; 23(4):463-483. Available from: http://dx.doi.org/10.1002/dac.1084.
-
(2010)
International Journal of Communication Systems
, vol.23
, Issue.4
, pp. 463-483
-
-
Safa, H.1
Mirza, O.2
-
5
-
-
39649101946
-
Research on multicast routing protocols for mobile ad-hoc networks
-
Junhai L, Liu X, Danxia Y. Research on multicast routing protocols for mobile ad-hoc networks. Computer Networks 2008; 52(5):988-997.
-
(2008)
Computer Networks
, vol.52
, Issue.5
, pp. 988-997
-
-
Junhai, L.1
Liu, X.2
Danxia, Y.3
-
6
-
-
79957937447
-
OMAC: A new access control architecture for overlay multicast communications
-
Mohamed EE, Barka E. OMAC: a new access control architecture for overlay multicast communications. International Journal of Communication Systems 2011; 24(6):761-775. Available from: http://dx.doi.org/10.1002/dac. 1185.
-
(2011)
International Journal of Communication Systems
, vol.24
, Issue.6
, pp. 761-775
-
-
Mohamed, E.E.1
Barka, E.2
-
7
-
-
84855316718
-
Qos multicast routing in cognitive radio ad hoc networks
-
Xie L, Jia X, Zhou K. Qos multicast routing in cognitive radio ad hoc networks. International Journal of Communication Systems 2012; 25(1):30-46. Available from: http://dx.doi.org/10.1002/dac.1285.
-
(2012)
International Journal of Communication Systems
, vol.25
, Issue.1
, pp. 30-46
-
-
Xie, L.1
Jia, X.2
Zhou, K.3
-
8
-
-
70349194716
-
Multicast routing protocols in mobile ad hoc networks: A comparative survey and taxonomy
-
Badarneh OS, Kadoch M. Multicast routing protocols in mobile ad hoc networks: a comparative survey and taxonomy. EURASIP Journal on Wireless Communications and Networking 2009; 2009:26:1-26:42. Available from: http://dx.doi.org/10.1155/2009/764047.
-
(2009)
EURASIP Journal on Wireless Communications and Networking
, vol.2009
, pp. 261-2642
-
-
Badarneh, O.S.1
Kadoch, M.2
-
9
-
-
79952768755
-
A survey on security enhanced multicast routing protocols in mobile ad hoc networks
-
Cairo, Egypt, December
-
Abdel AM, Hamza HS, Saroit IA. A survey on security enhanced multicast routing protocols in mobile ad hoc networks. In HONET '07: Proceedings of the 7th Annual International Conference of High-Capacity Optical Networks and Enabling Technologies (HONET), Cairo, Egypt, December 2010; 262-268.
-
(2010)
HONET '07: Proceedings of the 7th Annual International Conference of High-Capacity Optical Networks and Enabling Technologies (HONET)
, pp. 262-268
-
-
Abdel, A.M.1
Hamza, H.S.2
Saroit, I.A.3
-
10
-
-
84860659191
-
Mobile device integration of a fingerprint biometric remote authentication scheme
-
Chen C-L, Lee C-C, Hsu C-Y. Mobile device integration of a fingerprint biometric remote authentication scheme. International Journal of Communication Systems 2012; 25(5):585-597. Available from: http://dx.doi.org/10.1002/dac.1277.
-
(2012)
International Journal of Communication Systems
, vol.25
, Issue.5
, pp. 585-597
-
-
Chen, C.-L.1
Lee, C.-C.2
Hsu, C.-Y.3
-
11
-
-
84860700540
-
Effective allied network security system based on designed scheme with conditional legitimate probability against distributed network attacks and intrusions
-
Chen R-M, Hsieh K-T. Effective allied network security system based on designed scheme with conditional legitimate probability against distributed network attacks and intrusions. International Journal of Communication Systems 2012; 25(5):672-688. Available from: http://dx.doi.org/10.1002/dac.1289.
-
(2012)
International Journal of Communication Systems
, vol.25
, Issue.5
, pp. 672-688
-
-
Chen, R.-M.1
Hsieh, K.-T.2
-
12
-
-
84859165094
-
Cryptanalysis of mCryptonA lightweight block cipher for security of RFID tags and sensors
-
Mala H, Dakhilalian M, Shakiba M. Cryptanalysis of mCryptonA lightweight block cipher for security of RFID tags and sensors. International Journal of Communication Systems 2012; 25(4):415-426. Available from: http://dx.doi.org/10.1002/dac.1248.
-
(2012)
International Journal of Communication Systems
, vol.25
, Issue.4
, pp. 415-426
-
-
Mala, H.1
Dakhilalian, M.2
Shakiba, M.3
-
13
-
-
84857647179
-
Server-less RFID authentication and searching protocol with enhanced security
-
Lee C-F, Chien H-Y, Laih C-S. Server-less RFID authentication and searching protocol with enhanced security. International Journal of Communication Systems 2012; 25(3):376-385. Available from: http://dx.doi.org/10.1002/dac.1246.
-
(2012)
International Journal of Communication Systems
, vol.25
, Issue.3
, pp. 376-385
-
-
Lee, C.-F.1
Chien, H.-Y.2
Laih, C.-S.3
-
14
-
-
80052632132
-
A pairing-free certificateless authenticated key agreement protocol
-
He D, Chen J, Hu J. A pairing-free certificateless authenticated key agreement protocol. International Journal of Communication Systems 2012; 25(2):221-230. Available from: http://dx.doi.org/10.1002/dac.1265.
-
(2012)
International Journal of Communication Systems
, vol.25
, Issue.2
, pp. 221-230
-
-
He, D.1
Chen, J.2
Hu, J.3
-
15
-
-
73849138981
-
Performance of joint multilevel/AES-LDPCC-CPFSK schemes over wireless sensor networks
-
Cam H, Ucan ON, Odabasioglu N, Sonmez AC. Performance of joint multilevel/AES-LDPCC-CPFSK schemes over wireless sensor networks. International Journal of Communication Systems 2010; 23(1):77-90. Available from: http://dx.doi.org/10.1002/dac.1047.
-
(2010)
International Journal of Communication Systems
, vol.23
, Issue.1
, pp. 77-90
-
-
Cam, H.1
Ucan, O.N.2
Odabasioglu, N.3
Sonmez, A.C.4
-
16
-
-
79952059658
-
Lightweight and provably secure user authentication with anonymity for the global mobility network
-
Chen C, He D, Chan S, Bu J, Gao Y, Fan R. Lightweight and provably secure user authentication with anonymity for the global mobility network. International Journal of Communication Systems 2011; 24(3):347-362. Available from: http://dx.doi.org/10.1002/dac.1158.
-
(2011)
International Journal of Communication Systems
, vol.24
, Issue.3
, pp. 347-362
-
-
Chen, C.1
He, D.2
Chan, S.3
Bu, J.4
Gao, Y.5
Fan, R.6
-
17
-
-
79953301762
-
Mobile ad hoc network broadcasting: A multi-criteria approach
-
Barritt BJ, Sheikh S, Al-Najjar C, Malakooti B. Mobile ad hoc network broadcasting: a multi-criteria approach. International Journal of Communication Systems 2011; 24(4):438-460. Available from: http://dx.doi.org/10.1002/dac.1162.
-
(2011)
International Journal of Communication Systems
, vol.24
, Issue.4
, pp. 438-460
-
-
Barritt, B.J.1
Sheikh, S.2
Al-Najjar, C.3
Malakooti, B.4
-
18
-
-
36348984836
-
Security in wireless ad hoc networks
-
Ilyas M, Dorf RC (eds) CRC Press, Inc.: Boca Raton, FL, USA
-
Mishra A, Nadkarni KM. Security in wireless ad hoc networks. In The Handbook of Ad Hoc Wireless Networks, Ilyas M, Dorf RC (eds). CRC Press, Inc.: Boca Raton, FL, USA, 2003; 499-549.
-
(2003)
The Handbook of Ad Hoc Wireless Networks
, pp. 499-549
-
-
Mishra, A.1
Nadkarni, K.M.2
-
20
-
-
84859161671
-
Towards generalized id-based user authentication for mobile multi-server environment
-
Chuang Y-H, Tseng Y-M. Towards generalized id-based user authentication for mobile multi-server environment. International Journal of Communication Systems 2012; 25(4):447-460. Available from: http://dx.doi.org/10.1002/dac.1268.
-
(2012)
International Journal of Communication Systems
, vol.25
, Issue.4
, pp. 447-460
-
-
Chuang, Y.-H.1
Tseng, Y.-M.2
-
21
-
-
33845506425
-
Fisheye zone routing protocol: A multi-level zone routing protocol for mobile ad hoc networks
-
Yang C-C, Tseng L-P. Fisheye zone routing protocol: A multi-level zone routing protocol for mobile ad hoc networks. Computer Communications 2007; 30(2):261-268.
-
(2007)
Computer Communications
, vol.30
, Issue.2
, pp. 261-268
-
-
Yang, C.-C.1
Tseng, L.-P.2
-
23
-
-
1542317831
-
Rushing attacks and defense in wireless ad hoc network routing protocols
-
ACM: New York, NY, USA
-
Hu Y-C, Perrig A, Johnson DB. Rushing attacks and defense in wireless ad hoc network routing protocols. In WiSe '03: Proceedings of the 2nd ACM Workshop on Wireless Security. ACM: New York, NY, USA, 2003; 30-40.
-
(2003)
WiSe '03: Proceedings of the 2nd ACM Workshop on Wireless Security
, pp. 30-40
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
24
-
-
34548827597
-
A study of different types of attacks on multicast in mobile ad hoc networks
-
Nguyen HL, Nguyen UT. A study of different types of attacks on multicast in mobile ad hoc networks. Ad Hoc Networks 2008; 6(1):32-46. ISSN 1570-8705, DOI: 10.1016/j.adhoc.2006.07.005.
-
(2008)
Ad Hoc Networks
, vol.6
, Issue.1
, pp. 32-46
-
-
Nguyen, H.L.1
Nguyen, U.T.2
-
25
-
-
11244252132
-
Denial of service resilience in ad hoc networks
-
ACM: New York, NY, USA
-
Aad I, Hubaux J-P, Knightly EW. Denial of service resilience in ad hoc networks. In MobiCom '04: Proceedings of the 10th Annual International Conference on Mobile Computing and Networking. ACM: New York, NY, USA, 2004; 202-215.
-
(2004)
MobiCom '04: Proceedings of the 10th Annual International Conference on Mobile Computing and Networking
, pp. 202-215
-
-
Aad, I.1
Hubaux, J.-P.2
Knightly, E.W.3
-
26
-
-
24944539915
-
TWOACK: Preventing selfishness in mobile ad hoc networks
-
Balakrishnan K, Deng J, Varshney PK. TWOACK: preventing selfishness in mobile ad hoc networks. Proceeding of IEEE Wireless Communication and Networking Conference, New Orleans, LA, USA, 2005.
-
(2005)
Proceeding of IEEE Wireless Communication and Networking Conference, New Orleans, LA, USA
-
-
Balakrishnan, K.1
Deng, J.2
Varshney, P.K.3
-
27
-
-
85083937286
-
Securing AODV against wormhole attacks in emergency MANET multimedia communications
-
Panaousis EA, Nazaryan L, Politis C. Securing AODV against wormhole attacks in emergency MANET multimedia communications. In Mobimedia '09: Proceedings of the 5th International ICST Mobile Multimedia Communications Conference. ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering): ICST, Brussels, Belgium, Belgium, 2009; 1-7.
-
(2009)
Mobimedia '09: Proceedings of the 5th International ICST Mobile Multimedia Communications Conference. ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering): ICST, Brussels, Belgium, Belgium
, pp. 1-7
-
-
Panaousis, E.A.1
Nazaryan, L.2
Politis, C.3
-
28
-
-
33845497487
-
Securing MAODV: Attacks and countermeasures
-
September
-
Roy S, Addada V, Setia S, Jajodia S. Securing MAODV: attacks and countermeasures. Proceedings of the 2nd IEEE International Conference on Sensor and Ad Hoc Communications and Networks, Santa Clara, California, September 2005; 521-532.
-
(2005)
Proceedings of the 2nd IEEE International Conference on Sensor and Ad Hoc Communications and Networks, Santa Clara, California
, pp. 521-532
-
-
Roy, S.1
Addada, V.2
Setia, S.3
Jajodia, S.4
-
33
-
-
18144391542
-
Foundations of security for hash chains in ad hoc networks
-
Bradford PG, Gavrylyako OV. Foundations of security for hash chains in ad hoc networks. Cluster Computing 2005; 8:189-195. Available from: http://portal.acm.org/citation.cfm?id=1058043.1058061.
-
(2005)
Cluster Computing
, vol.8
, pp. 189-195
-
-
Bradford, P.G.1
Gavrylyako, O.V.2
-
34
-
-
4544326206
-
Secure multicast groups on ad hoc networks
-
ACM: New York, NY, USA
-
Kaya T, Lin G, Noubir G, Yilmaz A. Secure multicast groups on ad hoc networks. In SASN '03: Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks. ACM: New York, NY, USA, 2003; 94-102.
-
(2003)
SASN '03: Proceedings of the 1st ACM Workshop on Security of Ad Hoc and Sensor Networks
, pp. 94-102
-
-
Kaya, T.1
Lin, G.2
Noubir, G.3
Yilmaz, A.4
-
35
-
-
60949084324
-
BSMR: Byzantine-resilient secure multicast routing in multihop wireless networks
-
Curtmola R, Nita-Rotaru C. BSMR: byzantine-resilient secure multicast routing in multihop wireless networks. IEEE Transactions on Mobile Computing 2009; 8:445-459. Available from: http://dx.doi.org/10.1109/TMC. 2008.134.
-
(2009)
IEEE Transactions on Mobile Computing
, vol.8
, pp. 445-459
-
-
Curtmola, R.1
Nita-Rotaru, C.2
-
36
-
-
84911979862
-
-
NATO IST-083: Symposium on Military Communication with a Special Focus on Tactical Communications, Prague, Czech Republic
-
Bongartz HH-J, Ginzler T, Bachran T, Tuset P. SEAMAN: a security-enabled anonymous MANET protocol. In NATO IST-083: Symposium on Military Communication with a Special Focus on Tactical Communications, Prague, Czech Republic, 2008.
-
(2008)
SEAMAN: A Security-enabled Anonymous MANET Protocol
-
-
Hh-J, B.1
Ginzler, T.2
Bachran, T.3
Tuset, P.4
-
38
-
-
28044452892
-
Application versus network layer multicasting in ad hoc networks: The alma routing protocol
-
Ge M, Krishnamurthy SV, Faloutsos M. Application versus network layer multicasting in ad hoc networks: the alma routing protocol. Ad Hoc Networks 2006; 4(2):283-300.
-
(2006)
Ad Hoc Networks
, vol.4
, Issue.2
, pp. 283-300
-
-
Ge, M.1
Krishnamurthy, S.V.2
Faloutsos, M.3
-
40
-
-
33847356523
-
Optimization technique for military multicast key management
-
IEEE: Atlantic City
-
Aurisch T. Optimization technique for military multicast key management. In Unclassified Proceedings of the IEEE MILCOM, Vol. 4. IEEE: Atlantic City, 2005; 2570-2576.
-
(2005)
Unclassified Proceedings of the IEEE MILCOM
, vol.4
, pp. 2570-2576
-
-
Aurisch, T.1
-
42
-
-
78651563017
-
A reliable multicast routing protocol for highspeed mobile ad hoc networks: R-ODMRP
-
Zhiming X, Yu W, Jingguo Z. A reliable multicast routing protocol for highspeed mobile ad hoc networks: R-ODMRP. Journal of Software 2009; 5(1):20-27.
-
(2009)
Journal of Software
, vol.5
, Issue.1
, pp. 20-27
-
-
Zhiming, X.1
Yu, W.2
Jingguo, Z.3
-
44
-
-
78650009257
-
Securing MANET multicast using DIPLOMA
-
Alicherry M, Keromytis AD. Securing MANET multicast using DIPLOMA. IWSEC: Proceedings of the The 5th International Workshop on Security, IWSEC2010, Kobe, Japan, 2010; 232-250.
-
(2010)
IWSEC: Proceedings of the the 5th International Workshop on Security, IWSEC2010, Kobe, Japan
, pp. 232-250
-
-
Alicherry, M.1
Keromytis, A.D.2
-
45
-
-
84870660405
-
Dynamic clustering for QoS based secure multicast key distribution in mobile ad hoc networks
-
Devaraju S, Ganapathi P. Dynamic clustering for QoS based secure multicast key distribution in mobile ad hoc networks. IJCSI International Journal of Computer Science 2010; 7(1-2):30-37.
-
(2010)
IJCSI International Journal of Computer Science
, vol.7
, Issue.1-2
, pp. 30-37
-
-
Devaraju, S.1
Ganapathi, P.2
-
47
-
-
0036924499
-
On-demand multicast routing protocol in multihop wireless mobile networks
-
Lee SJ, Su W, Gerla M. On-demand multicast routing protocol in multihop wireless mobile networks. Mobile Networks and Applications 2002; 7(6):441-453. Available from: http://dx.doi.org/10.1023/A:1020756600187.
-
(2002)
Mobile Networks and Applications
, vol.7
, Issue.6
, pp. 441-453
-
-
Lee, S.J.1
Su, W.2
Gerla, M.3
-
48
-
-
0003762054
-
-
RFC Editor: United States
-
Estrin D, Farinacci D, Helmy A, Thaler D, Deering S, Handley M, Jacobson V, Liu C, Sharma P, Wei L. Protocol Independent Multicast-Sparse Mode (PIM-SM): Protocol Specification. RFC Editor: United States, 1998.
-
(1998)
Protocol Independent Multicast-Sparse Mode (PIM-SM): Protocol Specification
-
-
Estrin, D.1
Farinacci, D.2
Helmy, A.3
Thaler, D.4
Deering, S.5
Handley, M.6
Jacobson, V.7
Liu, C.8
Sharma, P.9
Wei, L.10
-
50
-
-
2942614531
-
The MMARP protocol for efficient support of standard ip multicast communications in mobile ad hoc access networks
-
Ruiz PM, Gomez-Skarmeta A, Groves I. The MMARP protocol for efficient support of standard ip multicast communications in mobile ad hoc access networks. IST: Proceedings of the IST Mobile and Wireless Communications Summit, aveiro, Portugal, 2003; 478-482.
-
(2003)
IST: Proceedings of the IST Mobile and Wireless Communications Summit, Aveiro, Portugal
, pp. 478-482
-
-
Ruiz, P.M.1
Gomez-Skarmeta, A.2
Groves, I.3
-
51
-
-
33748564921
-
A generic characterization of the overheads imposed by IPsec and associated cryptographic algorithms
-
Xenakis C, Laoutaris N, Merakos L, Stavrakakis I. A generic characterization of the overheads imposed by IPsec and associated cryptographic algorithms. Computer Networks 2006; 50(17):3225-3241.
-
(2006)
Computer Networks
, vol.50
, Issue.17
, pp. 3225-3241
-
-
Xenakis, C.1
Laoutaris, N.2
Merakos, L.3
Stavrakakis, I.4
|