-
3
-
-
85106319926
-
A performance comparison of multi-hop wireless ad hoc network routing protocols
-
Oct
-
J. Broch, D. A. Maltz, D. B. Johnson, Y. Hu, and J. Jetcheva. A performance comparison of multi-hop wireless ad hoc network routing protocols. Proceedings of the Fourth Annual ACM/IEEE International Conference on Mobile Computing and Networking, pages 85-97, Oct 1998.
-
(1998)
Proceedings of the Fourth Annual ACM/IEEE International Conference on Mobile Computing and Networking
, pp. 85-97
-
-
Broch, J.1
Maltz, D.A.2
Johnson, D.B.3
Hu, Y.4
Jetcheva, J.5
-
4
-
-
84944743988
-
A secure routing protocol for ad hoc networks
-
Nov/Dec
-
B. Dahill, B. Levine, E. Royer, and C. Shields. A secure routing protocol for ad hoc networks. IEEE Network Magazine, 13(6), Nov/Dec 1999.
-
(1999)
IEEE Network Magazine
, vol.13
, Issue.6
-
-
Dahill, B.1
Levine, B.2
Royer, E.3
Shields, C.4
-
6
-
-
0004194997
-
-
The VINT Project, UC Berkeley, LBL, USC/ISI and Xerox PARC Nov
-
K. Fall and K. V. (Eds.). ns notes and documentation. The VINT Project, UC Berkeley, LBL, USC/ISI and Xerox PARC : http://www.isi.edu/nsnam/ns/, Nov 1997.
-
(1997)
ns Notes and Documentation
-
-
Fall, K.1
V, K.2
-
7
-
-
0003339136
-
The digital distributed systems security architecture
-
M. Gasser, A. Goldstein, C. Kaufman, and B. Lampson. The digital distributed systems security architecture. Proceedings of the 1989 National Computer Security Conference, pages 305-319, 1989.
-
(1989)
Proceedings of the 1989 National Computer Security Conference
, pp. 305-319
-
-
Gasser, M.1
Goldstein, A.2
Kaufman, C.3
Lampson, B.4
-
8
-
-
0001341422
-
DSR: The dynamic source routing protocol for multi-hop wireless ad hoc networks
-
edited by Charles E. Perkins
-
D. B. Johnson, D. A. Maltz, and J. Broch. DSR: The dynamic source routing protocol for multi-hop wireless ad hoc networks. Ad Hoc Networking, edited by Charles E. Perkins, pages 139-172, 2001.
-
(2001)
Ad Hoc Networking
, pp. 139-172
-
-
Johnson, D.B.1
Maltz, D.A.2
Broch, J.3
-
10
-
-
0035704362
-
Providing robust and ubiquitous security support for mobile ad-hoc networks
-
J. Kong, P. Zerfos, H. Luo, S. Lu, and L. Zhang. Providing robust and ubiquitous security support for mobile ad-hoc networks. International Conference on Network Protocols (ICNP), pages 251-260, 2001.
-
(2001)
International Conference on Network Protocols (ICNP)
, pp. 251-260
-
-
Kong, J.1
Zerfos, P.2
Luo, H.3
Lu, S.4
Zhang, L.5
-
11
-
-
0037022137
-
A new wireless ad hoc multicast routing protocol
-
Feb
-
S. Lee and C. Kim. A new wireless ad hoc multicast routing protocol. Computer Networks, 38(2):121-135, Feb 2002.
-
(2002)
Computer Networks
, vol.38
, Issue.2
, pp. 121-135
-
-
Lee, S.1
Kim, C.2
-
14
-
-
84944721340
-
Secure routing for mobile ad hoc networks
-
Nov/Dec
-
P. Papadimitratos and Z. Hass. Secure routing for mobile ad hoc networks. IEEE Network Magazine, 13(6), Nov/Dec 1999.
-
(1999)
IEEE Network Magazine
, vol.13
, Issue.6
-
-
Papadimitratos, P.1
Hass, Z.2
-
18
-
-
85056059061
-
Multicast operation of the ad hoc on-demand distance vector routing protocol
-
Aug
-
E. M. Royer and C. E. Perkins. Multicast operation of the ad hoc on-demand distance vector routing protocol. Proceeding of MOBICOM, pages 207-218, Aug 1999.
-
(1999)
Proceeding of MOBICOM
, pp. 207-218
-
-
Royer, E.M.1
Perkins, C.E.2
-
19
-
-
0018545449
-
How to share a secret
-
A. Shamir. How to share a secret. Communication of the ACM, 22:612-613, 1979.
-
(1979)
Communication of the ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
-
20
-
-
0012986160
-
Intrusion detection in wireless ad hoc networks
-
Aug
-
Y. Zhang and W. Lee. Intrusion detection in wireless ad hoc networks. Proceeding of MOBICOM, Aug 2001.
-
(2001)
Proceeding of MOBICOM
-
-
Zhang, Y.1
Lee, W.2
-
21
-
-
0033357103
-
Securing ad hoc networks
-
Nov/Dec
-
L. Zhou and Z. Haas. Securing ad hoc networks. IEEE Network Magazine, 13(6), Nov/Dec 1999.
-
(1999)
IEEE Network Magazine
, vol.13
, Issue.6
-
-
Zhou, L.1
Haas, Z.2
|