메뉴 건너뛰기




Volumn , Issue , 2004, Pages 528-533

Secure dynamic source routing protocol

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER NETWORKS; DISTRIBUTED COMPUTER SYSTEMS; MOBILE COMPUTING; MOBILE TELECOMMUNICATION SYSTEMS; PACKET NETWORKS; PROBLEM SOLVING; BROADCASTING; CACHE MEMORY; PATTERN RECOGNITION; ROUTERS; TELECOMMUNICATION LINKS;

EID: 9744283564     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (12)

References (17)
  • 1
    • 0032621035 scopus 로고    scopus 로고
    • A review of current routing protocols for ad-hoc mobile wireless networks
    • April
    • E.M. Belding-Royer, and C.-K. Toh, "A review of current routing protocols for ad-hoc mobile wireless networks", IEEE Personal Communications Magazine (April 1999),pp.46-65.
    • (1999) IEEE Personal Communications Magazine , pp. 46-65
    • Belding-Royer, E.M.1    Toh, C.-K.2
  • 2
    • 9744226984 scopus 로고    scopus 로고
    • Routing approaches in mobile ad hoc networks
    • S. Basagni, M. Conti, S. Giordano,I. Stojmenovic (Eds.), IEEE Press Wiley, New York
    • Elizabeth Belding-Royer, "Routing approaches in mobile ad hoc networks", in: S. Basagni, M. Conti, S. Giordano,I. Stojmenovic (Eds.), Ad Hoc Networking, IEEE Press Wiley, New York, 2003.
    • (2003) Ad Hoc Networking
    • Belding-Royer, E.1
  • 3
    • 0000629443 scopus 로고    scopus 로고
    • Dynamic source routing in adhoc wireless networks
    • T. Imielinski, H. Korth (Eds.), Kluwer Academic Publishers, Dordrecht
    • D.B. Johnson, and D.A. Maltz, "Dynamic source routing in adhoc wireless networks", in: T. Imielinski, H. Korth (Eds.), Mobile Computing, Kluwer Academic Publishers, Dordrecht, 1996, pp.153-181.
    • (1996) Mobile Computing , pp. 153-181
    • Johnson, D.B.1    Maltz, D.A.2
  • 8
    • 70450243327 scopus 로고    scopus 로고
    • On vulnerability and protection of ad hoc on-demand distance vector protocol
    • Weichao Wang, Y.Lu, and B.K. Bhargava, "On vulnerability and protection of ad hoc on-demand distance vector protocol", Proceedings of ICT., 2003.
    • (2003) Proceedings of ICT.
    • Wang, W.1    Lu, Y.2    Bhargava, B.K.3
  • 11
    • 0036452448 scopus 로고    scopus 로고
    • Context aware detection of selfish nodes in DSR based ad hoc networks
    • K.Paul, and D.Westhoff, "Context aware detection of selfish nodes in DSR based ad hoc networks", Proceedings of IEEE GLOBECOM02, 2002, pp. 2424-2428.
    • (2002) Proceedings of IEEE GLOBECOM02 , pp. 2424-2428
    • Paul, K.1    Westhoff, D.2
  • 12
    • 0037885580 scopus 로고    scopus 로고
    • Nodes bearing grudges: Towards routing security, fariness, and robustness in mobile ad hoc networks
    • Distributed and Network-based Processing
    • S.Buchegger, and J.L. Boudec, "Nodes bearing grudges: towards routing security, fariness, and robustness in mobile ad hoc networks", Proceedings of the 10th Euromicr Workshop on Parallel, Distributed and Network-based Processing, 2002.
    • (2002) Proceedings of the 10th Euromicr Workshop on Parallel
    • Buchegger, S.1    Boudec, J.L.2
  • 17
    • 9744266256 scopus 로고    scopus 로고
    • http://www.isi.edu/nsam/ns


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.