-
1
-
-
0012395285
-
-
O'Reilly & Associates, Inc., First Edition, Apr
-
M.S. Gast, 802.11 Wireless Networks, The Definitive Guide, O'Reilly & Associates, Inc., First Edition, Apr 2002.
-
(2002)
802.11 Wireless Networks, the Definitive Guide
-
-
Gast, M.S.1
-
3
-
-
0842332528
-
Mixed-mode WLAN: The integration of ad hoc mode with wireless LAN infrastructure
-
San Francisco, CA, Dec
-
J. Chen, S.G. Chan, J. He, and S. Liew, “Mixed-Mode WLAN: The Integration of Ad Hoc Mode with Wireless LAN Infrastructure”, Proceedings of GLOBECOM 2003, San Francisco, CA, Dec 2003, pp. 231-236.
-
(2003)
Proceedings of GLOBECOM 2003
, pp. 231-236
-
-
Chen, J.1
Chan, S.G.2
He, J.3
Liew, S.4
-
4
-
-
0037629724
-
Cross-feature analysis for detecting ad-hoc routing anomalies
-
Providence, RI, May
-
Y. Huang, W. Fan, W. Lee, and P. S. Yu, “Cross-Feature Analysis for Detecting Ad-Hoc Routing Anomalies”, Proceedings of the 23rd International Conference on Distributed Computing Systems (ICDCS), Providence, RI, May 2003.
-
(2003)
Proceedings of the 23rd International Conference on Distributed Computing Systems (ICDCS)
-
-
Huang, Y.1
Fan, W.2
Lee, W.3
Yu, P.S.4
-
5
-
-
0033357103
-
Securing ad hoc networks
-
Nov/Dec
-
L. Zhou and Z. J. Haas, “Securing ad hoc networks”, IEEE Network, 13(6):24-30, Nov/Dec 1999.
-
(1999)
IEEE Network
, vol.13
, Issue.6
, pp. 24-30
-
-
Zhou, L.1
Haas, Z.J.2
-
6
-
-
84943553152
-
Establishing pair-wise Keys for secure communication in ad hoc Networks: A probabilistic approach
-
Atlanta, GA, Nov
-
S. Zhu, S. Xu, S. Setia, and S. Jajodia, “Establishing Pair-wise Keys For Secure Communication in Ad Hoc Networks: A Probabilistic Approach”, Proceedings of the IEEE International Conference on Network Protocols (ICNP). Atlanta, GA, Nov 2003.
-
(2003)
Proceedings of the IEEE International Conference on Network Protocols (ICNP)
-
-
Zhu, S.1
Xu, S.2
Setia, S.3
Jajodia, S.4
-
7
-
-
13244275074
-
GKMPAN: An efficient group rekeying scheme for secure multicast in ad-hoc networks
-
Boston, MA, Aug
-
S. Zhu, S. Setia, S. Xu, and S. Jajodia, “GKMPAN: An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks”, Proceedings of the 1st International Conference on Mobile and Ubiquitous Systems (Mobiquitous), Boston, MA, Aug 2004.
-
(2004)
Proceedings of the 1st International Conference on Mobile and Ubiquitous Systems (Mobiquitous)
-
-
Zhu, S.1
Setia, S.2
Xu, S.3
Jajodia, S.4
-
8
-
-
0035482169
-
An integrated Cellular and Ad hoc Relaying system: ICAR
-
Oct
-
H. Wu, C. Qiao, S. De, and O. Tonguz, " An integrated Cellular and Ad hoc Relaying system: iCAR", in IEEE Journal on Selected Areas in Communications (JSAC), Vol. 19, No. 10, pp. 2105-2115, Oct. 2001.
-
(2001)
IEEE Journal on Selected Areas in Communications (JSAC)
, vol.19
, Issue.10
, pp. 2105-2115
-
-
Wu, H.1
Qiao, C.2
De, S.3
Tonguz, O.4
-
9
-
-
0029700344
-
Decentralized trust management
-
Oakland, CA, May
-
M. Blaze, J. Feigenbaum, and J. Lacy, “Decentralized Trust Management”, Proceedings of the 1996 IEEE Symposium on Security and Privacy”, Oakland, CA, May 1996.
-
(1996)
Proceedings of the 1996 IEEE Symposium on Security and Privacy
-
-
Blaze, M.1
Feigenbaum, J.2
Lacy, J.3
-
10
-
-
33751044073
-
Talking to strangers: Authentication in ad-hoc wireless networks
-
San Diego, CA
-
D. Balfanz, D. K. Smetters, P. Stewart, and H. Chi Wong, “Talking to Strangers: Authentication in Ad-Hoc Wireless Networks”, Proceedings of the Network and Distributed System Security Symposium (NDSS), San Diego, CA, 2002.
-
(2002)
Proceedings of the Network and Distributed System Security Symposium (NDSS)
-
-
Balfanz, D.1
Smetters, D.K.2
Stewart, P.3
Chi Wong, H.4
-
11
-
-
84911584312
-
Shortest connection networks and some generalizations
-
Nov
-
R.C. Prim, “Shortest Connection Networks and Some Generalizations”, Bell System Tech. Journal, Vol. 36, Nov. 1957, pp. 1389-1401.
-
(1957)
Bell System Tech. Journal
, vol.36
, pp. 1389-1401
-
-
Prim, R.C.1
-
12
-
-
0000629443
-
Dynamic source routing in ad hoc wireless networks
-
Kluwer Academic Publishers
-
D.B. Johnson and D.A. Maltz, “Dynamic Source Routing in Ad hoc Wireless Networks”, Mobile Computing, Kluwer Academic Publishers, 1996, pp.153-181.
-
(1996)
Mobile Computing
, pp. 153-181
-
-
Johnson, D.B.1
Maltz, D.A.2
-
13
-
-
0031652485
-
GlomoSim: A library for parallel simulation of large-scale wireless networks
-
Alberta, Canada, May ISSN
-
X. Zeng, R. Bagrodia, and M. Gerla, “GloMoSim: A Library for Parallel Simulation of Large-Scale Wireless Networks”, Proceedings of the Twelfth Workshop on Parallel and Distributed Simulation, Alberta, Canada, May 1998, ISSN: 0163-6103, pp. 154-161.
-
(1998)
Proceedings of the Twelfth Workshop on Parallel and Distributed Simulation
, pp. 154-161
-
-
Zeng, X.1
Bagrodia, R.2
Gerla, M.3
-
14
-
-
0038527384
-
Anti-collusion fingerprinting for multimedia
-
W. Trappe, M. Wu, and Z.J. Wang, K.J.R. Liu, "Anti-Collusion Fingerprinting for Multimedia," IEEE Transactions on Signal Processing, pp. 1069-1087, 2003.
-
(2003)
IEEE Transactions on Signal Processing
, pp. 1069-1087
-
-
Trappe, W.1
Wu, M.2
Wang, Z.J.3
Liu, K.J.R.4
-
16
-
-
1542359980
-
Dependability enhancement for IEEE 802.11 wireless LAN with redundancy techniques
-
San Francisco, CA, Jun ISBN
-
D. Chen, S. Garg, C. Kintala, K. Trivedi, “Dependability Enhancement for IEEE 802.11 Wireless LAN with Redundancy Techniques”, Proceedings of the 2003 International Conference on Dependable Systems and Networks (DSN'03), San Francisco, CA, Jun 2003, ISBN: 0-7695-1952-0, pp. 521-529.
-
(2003)
Proceedings of the 2003 International Conference on Dependable Systems and Networks (DSN'03)
, pp. 521-529
-
-
Chen, D.1
Garg, S.2
Kintala, C.3
Trivedi, K.4
-
17
-
-
0034228685
-
Reliability and survivability of wireless and mobile networks
-
A. Snow, U. Varshney, A. Malloy, “Reliability and Survivability of Wireless and Mobile Networks”, IEEE Computer, Vol. 33, Issue 7, pp. 49-55, 2000, ISSN: 0018-9162.
-
(2000)
IEEE Computer
, vol.33
, Issue.7
, pp. 49-55
-
-
Snow, A.1
Varshney, U.2
Malloy, A.3
-
18
-
-
85117734704
-
-
http://www.cisco.com/en/US/netsol/ns395/ns176/ns178/netqa0900aecd801764f1.html
-
-
-
-
19
-
-
1942422295
-
QoS Routing in Mesh-based wireless networks
-
Jul Kluwer Academic Publishers
-
Q. Xue, A. Ganz, “QoS Routing in Mesh-based Wireless Networks”, International Journal of Wireless Information Networks, Vol. 9, Issue 3, pp. 179-190, Jul 2002, Kluwer Academic Publishers.
-
(2002)
International Journal of Wireless Information Networks
, vol.9
, Issue.3
, pp. 179-190
-
-
Xue, Q.1
Ganz, A.2
-
20
-
-
33745932845
-
Authorization based on evidence and trust
-
Aix en Provence, France, Sep
-
B. Bhargava, Y. Zhong, “Authorization Based on Evidence and Trust”, Proceedings of the Data Warehouse and Knowledge Management Conference (DaWak-2002), Aix en Provence, France, Sep 2002.
-
(2002)
Proceedings of the Data Warehouse and Knowledge Management Conference (DaWak-2002)
-
-
Bhargava, B.1
Zhong, Y.2
-
21
-
-
33745257035
-
Quantifying trust in mobile ad-hoc networks
-
Waltham, MA, Apr to appear
-
M. Virendra, M. Jadliwala, M. Sudhanan, S. Upadhyaya, “Quantifying Trust in Mobile Ad-Hoc Networks”, IEEE International Conference on Integration of Knowledge Intensive Multi-Agent Systems (KIMAS'05), Waltham, MA, Apr 2005, to appear.
-
(2005)
IEEE International Conference on Integration of Knowledge Intensive Multi-Agent Systems (KIMAS'05)
-
-
Virendra, M.1
Jadliwala, M.2
Sudhanan, M.3
Upadhyaya, S.4
|