-
1
-
-
77955890396
-
Misbehaving router detection in link-state routing for wireless mesh networks
-
G. Acs, L. Buttyan, and L. Dora, "Misbehaving router detection in link-state routing for wireless mesh networks," in Proc. IEEE Int. Symp. World Wireless Mobile Multimedia Netw., 2010, pp. 1-6.
-
(2010)
Proc. IEEE Int. Symp. World Wireless Mobile Multimedia Netw
, pp. 1-6
-
-
Acs, G.1
Buttyan, L.2
Dora, L.3
-
2
-
-
39149117709
-
ODSBR: An on-demand secure byzantine resilient routing protocol for wireless Ad Hoc networks
-
B. Awerbuch, R. Curtmola, D. Holmer, C. Nita-Rotaru, and H. Rubens, "ODSBR: An on-demand secure byzantine resilient routing protocol for wireless Ad Hoc networks," ACM Trans. Inform. Syst. Security, vol. 10, no. 4, pp. 11-35, 2008.
-
(2008)
ACM Trans. Inform. Syst. Security
, vol.10
, Issue.4
, pp. 11-35
-
-
Awerbuch, B.1
Curtmola, R.2
Holmer, D.3
Nita-Rotaru, C.4
Rubens, H.5
-
3
-
-
24944539915
-
Twoack: Preventing selfishness in mobile Ad Hoc networks
-
K. Balakrishnan, J. Deng, and P. K. Varshney, "Twoack: Preventing selfishness in mobile Ad Hoc networks," in Proc. IEEE Wireless Commun. Netw. Conf., 2005, pp. 2137-2142.
-
(2005)
Proc. IEEE Wireless Commun. Netw. Conf
, pp. 2137-2142
-
-
Balakrishnan, K.1
Deng, J.2
Varshney, P.K.3
-
4
-
-
0014814325
-
Space/time trade-offs in hash coding with allowable errors
-
B. H. Bloom, "Space/time trade-offs in hash coding with allowable errors," Commun. ACM, vol. 13, no. 7, pp. 422-426, 1970.
-
(1970)
Commun. ACM
, vol.13
, Issue.7
, pp. 422-426
-
-
Bloom, B.H.1
-
5
-
-
24744432675
-
Self-policing mobile Ad-Hoc networks by reputation systems
-
Jul
-
S. Buchegger and J.-Y. L. Boudec, "Self-policing mobile Ad-Hoc networks by reputation systems," IEEE Commun. Mag., vol. 43, no. 7, pp. 101-107, Jul. 2005.
-
(2005)
IEEE Commun. Mag
, vol.43
, Issue.7
, pp. 101-107
-
-
Buchegger, S.1
Boudec, J.-Y.L.2
-
6
-
-
0042660545
-
Stimulating cooperation in selforganizing mobile Ad Hoc networks
-
L. Buttyan and J.-P. Hubaux, "Stimulating cooperation in selforganizing mobile Ad Hoc networks," Mobile Netw. Appl., vol. 8, no. 5, pp. 579-592, 2003.
-
(2003)
Mobile Netw. Appl
, vol.8
, Issue.5
, pp. 579-592
-
-
Buttyan, L.1
Hubaux, J.-P.2
-
7
-
-
3042774583
-
Modelling incentives for collaboration in mobile Ad Hoc networks
-
J. Crowcroft, R. Gibbens, F. Kelly, and S. Östring, "Modelling incentives for collaboration in mobile Ad Hoc networks," in Proc. Workshop Model. Optimization Mobile Ad Hoc Wireless Netw., 2003, pp. 427-439.
-
(2003)
Proc. Workshop Model. Optimization Mobile Ad Hoc Wireless Netw
, pp. 427-439
-
-
Crowcroft, J.1
Gibbens, R.2
Kelly, F.3
Östring, S.4
-
8
-
-
85031728204
-
On playing " twenty questions" with a liar
-
A. Dhagat, P. Gacs, and P. Winkler, "On playing "twenty questions" with a liar," in Proc. 3rd Annul. ACM-SIAM Symp. Discrete Algorithms, 1992, pp. 16-22.
-
(1992)
Proc. 3rd Annul. ACM-SIAM Symp. Discrete Algorithms
, pp. 16-22
-
-
Dhagat, A.1
Gacs, P.2
Winkler, P.3
-
9
-
-
33847291930
-
Providing distributed certificate authority service in mobile Ad Hoc networks
-
Y. Dong, H. Go, A. Sui, V. Li, L. Hui, and S. Yiu, "Providing distributed certificate authority service in mobile Ad Hoc networks," in Proc. 1st Int. Conf. Security Privacy Emerging Areas Commun. Netw., 2005, pp. 149-156.
-
(2005)
Proc. 1st Int. Conf. Security Privacy Emerging Areas Commun. Netw
, pp. 149-156
-
-
Dong, Y.1
Go, H.2
Sui, A.3
Li, V.4
Hui, L.5
Yiu, S.6
-
10
-
-
0035015898
-
Investigating the energy consumption of a wireless network interface in an Ad Hoc networking environment
-
L. M. Feeney and M. Nilsson, "Investigating the energy consumption of a wireless network interface in an Ad Hoc networking environment," in Proc. 20th Annu. Joint Conf. IEEE Comput. Commun. Soc., 2001, pp. 1548-1557.
-
(2001)
Proc. 20th Annu. Joint Conf. IEEE Comput. Commun. Soc
, pp. 1548-1557
-
-
Feeney, L.M.1
Nilsson, M.2
-
11
-
-
44849093503
-
Reputation-based framework for high integrity sensor networks
-
S. Ganeriwal, L. Balzano, and M. Srivastava, "Reputation-based framework for high integrity sensor networks, "ACM Trans. Sensor Netw., vol. 4, no. 3, pp. 1-37, 2008.
-
(2008)
ACM Trans. Sensor Netw
, vol.4
, Issue.3
, pp. 1-37
-
-
Ganeriwal, S.1
Balzano, L.2
Srivastava, M.3
-
12
-
-
84859095287
-
On the efficiency of fast RSA variants in modern mobile phones
-
K. Hansen, T. Larsen, and K. Olsen, "On the efficiency of fast RSA variants in modern mobile phones," Int. J. Computer Sci. Inf. Security, vol. 6, no. 3, 2009, pp. 136-140.
-
(2009)
Int. J. Computer Sci. Inf. Security
, vol.6
, Issue.3
, pp. 136-140
-
-
Hansen, K.1
Larsen, T.2
Olsen, K.3
-
13
-
-
4544283175
-
SORI: A secure and objective reputation-based incentive scheme for Ad Hoc networks
-
Q. He, D. Wu, and P. Khosla, "SORI: A secure and objective reputation-based incentive scheme for Ad Hoc networks," in Proc. IEEE Wireless Commun. Netw. Conf., 2004, pp. 825-830.
-
(2004)
Proc. IEEE Wireless Commun. Netw. Conf
, pp. 825-830
-
-
He, Q.1
Wu, D.2
Khosla, P.3
-
14
-
-
0001341422
-
DSR: The dynamic source routing protocol for multihop wireless ad hoc networks
-
Longman Publishing Co., Inc., Boston, MA, USA
-
D. Johnson, D. Maltz, and J. Broch, "DSR: the dynamic source routing protocol for multihop wireless ad hoc networks," In Ad hoc Netw., Addison-Wesley Longman Publishing Co., Inc., Boston, MA, USA, 2001, pp. 139-172.
-
(2001)
Ad Hoc Netw., Addison-Wesley
, pp. 139-172
-
-
Johnson, D.1
Maltz, D.2
Broch, J.3
-
16
-
-
2942656255
-
Secure routing in wireless sensor networks: Attacks and countermeasures
-
C. Karlof and D. Wagner, "Secure routing in wireless sensor networks: Attacks and countermeasures," Ad Hoc Netw., vol. 1, no. 2/3, pp. 293-315, 2003.
-
(2003)
Ad Hoc Netw
, vol.1
, Issue.2-3
, pp. 293-315
-
-
Karlof, C.1
Wagner, D.2
-
18
-
-
70349161605
-
REAct: Resource-efficient accountability for node misbehavior in Ad Hoc networks based on random audits
-
W. Kozma Jr. and L. Lazos, "REAct: Resource-efficient accountability for node misbehavior in Ad Hoc networks based on random audits," in Proc. 2nd ACM Conf. Wireless Netw. Security, 2009, pp. 103-110.
-
(2009)
Proc. 2nd ACM Conf. Wireless Netw. Security
, pp. 103-110
-
-
Kozma, W.1
Lazos, L.2
-
19
-
-
33947624156
-
An acknowledgment- based approach for the detection of routing misbehavior in manets
-
May
-
K. Liu, J. Deng, P. Varshney, and K. Balakrishnan, "An acknowledgment- based approach for the detection of routing misbehavior in manets," IEEE Trans. Mobile Comput., vol. 6, no. 5, pp. 536-550, May 2007.
-
(2007)
IEEE Trans. Mobile Comput
, vol.6
, Issue.5
, pp. 536-550
-
-
Liu, K.1
Deng, J.2
Varshney, P.3
Balakrishnan, K.4
-
20
-
-
84907706128
-
Reputation propagation and agreement in mobile Ad-Hoc networks
-
Y. Liu and Y. R. Yang, "Reputation propagation and agreement in mobile Ad-Hoc networks," in Proc. IEEE Wireless Commun. Netw., 2003, pp. 1510-1515.
-
(2003)
Proc. IEEE Wireless Commun. Netw
, pp. 1510-1515
-
-
Liu, Y.1
Yang, Y.R.2
-
21
-
-
0034541756
-
Mitigating routing misbehavior in mobile Ad Hoc networks
-
S. Marti, T. Giuli, K. Lai, and M. Baker, "Mitigating routing misbehavior in mobile Ad Hoc networks," in Proc. 6th Annu. Int. Conf. Mobile Comput. Netw., 2000, pp. 255-265.
-
(2000)
Proc. 6th Annu. Int. Conf. Mobile Comput. Netw
, pp. 255-265
-
-
Marti, S.1
Giuli, T.2
Lai, K.3
Baker, M.4
-
22
-
-
85113133621
-
CORE: A collaborative reputation mechanism to enforce node cooperation in mobile Ad Hoc networks
-
P. Michiardi and R. Molva, "CORE: A collaborative reputation mechanism to enforce node cooperation in mobile Ad Hoc networks," in Proc. 6th Joint Working Conf. Commun. Multimed. Security, 2002, pp. 107-121.
-
(2002)
Proc. 6th Joint Working Conf. Commun. Multimed. Security
, pp. 107-121
-
-
Michiardi, P.1
Molva, R.2
-
23
-
-
2342630172
-
Secure traceroute to detect faulty or malicious routing
-
V.-N. Padmanabhan and D.-R. Simon, "Secure traceroute to detect faulty or malicious routing," SIGCOMM Comput. Commun. Rev., vol. 33, no. 1, pp. 77-82, 2003.
-
(2003)
SIGCOMM Comput. Commun. Rev
, vol.33
, Issue.1
, pp. 77-82
-
-
Padmanabhan, V.-N.1
Simon, D.-R.2
-
24
-
-
0003104638
-
Detecting errors in searching games
-
A. Pelc, "Detecting errors in searching games," J. Combinatorial Theory Series A, vol. 51, no. 1, pp. 43-54, 1989.
-
(1989)
J. Combinatorial Theory Series A
, vol.51
, Issue.1
, pp. 43-54
-
-
Pelc, A.1
-
26
-
-
84860678494
-
Detection of malicious packet dropping in wireless Ad Hoc networks based on privacy-preserving public auditing
-
T. Shu and M. Krunz, "Detection of malicious packet dropping in wireless Ad Hoc networks based on privacy-preserving public auditing," in Proc. 5th ACM Conf. Security Privacy Wireless Mobile Netw., 2012, pp. 87-98.
-
(2012)
Proc. 5th ACM Conf. Security Privacy Wireless Mobile Netw
, pp. 87-98
-
-
Shu, T.1
Krunz, M.2
-
27
-
-
47049106826
-
An efficient scheme to motivate cooperation in mobile ad hoc networks
-
S. Soltanali, S. Pirahesh, S. Niksefat, and M. Sabaei, "an efficient scheme to motivate cooperation in mobile ad hoc networks," in Proc. 3rd Int. Conf. Netw. Services, 2007, pp. 92-98.
-
(2007)
Proc. 3rd Int. Conf. Netw. Services
, pp. 92-98
-
-
Soltanali, S.1
Pirahesh, S.2
Niksefat, S.3
Sabaei, M.4
-
30
-
-
26844467743
-
On digital signatures in Ad Hoc networks
-
D. Westhoff, B. Lamparter, C. Paar, and A. Weimerskirch, "On digital signatures in Ad Hoc networks," Eur. Trans. Telecommun., vol. 16, no. 5, pp. 411-425, 2005.
-
(2005)
Eur. Trans. Telecommun
, vol.16
, Issue.5
, pp. 411-425
-
-
Westhoff, D.1
Lamparter, B.2
Paar, C.3
Weimerskirch, A.4
-
31
-
-
9144231402
-
Providing fault-tolerant Ad-Hoc routing service in adversarial environments
-
Y. Xue and K. Nahrstedt, "Providing fault-tolerant Ad-Hoc routing service in adversarial environments," Wireless Pers. Commun., "special issue on security for next generation communications," vol. 29, no. 3/4, pp. 367-388, 2004.
-
(2004)
Wireless Pers. Commun., "special Issue on Security for Next Generation Communications
, vol.29
, Issue.3-4
, pp. 367-388
-
-
Xue, Y.1
Nahrstedt, K.2
-
32
-
-
84979033462
-
-
Y. Zhang and L. Lazos (2012). Available: http://www2.engr.arizona. edu/ llazos/misc/AMDsimulator.zip
-
(2012)
-
-
Zhang, Y.1
Lazos, L.2
-
33
-
-
0042933944
-
Sprite: A simple cheat-proof, credit-based system for mobile Ad-Hoc networks
-
S. Zhong, J. Chen, and Y. R. Yang, "Sprite: A simple cheat-proof, credit-based system for mobile Ad-Hoc networks," in Proc. 22nd IEEE Annu. Joint Conf. Comput. Commun., 2003, pp. 1987-1997.
-
(2003)
Proc. 22nd IEEE Annu. Joint Conf. Comput. Commun
, pp. 1987-1997
-
-
Zhong, S.1
Chen, J.2
Yang, Y.R.3
|