APALLS: A Secure MANET Routing Protocol
暂无分享,去创建一个
[1] Yih-Chun Hu. Efficient Security Mechanisms for Routing Protocols , 2003 .
[2] Mahalingam Ramkumar,et al. Private logical neighborhoods for wireless ad hoc networks , 2009, Q2SWinet '09.
[3] Baruch Awerbuch,et al. An on-demand secure routing protocol resilient to byzantine failures , 2002, WiSE '02.
[4] Yih-Chun Hu. Packet Leashes : A Defense against Wormhole Attacks in Wireless Ad Hoc Networks , 2001 .
[5] Mahalingam Ramkumar,et al. On the Complexity of Probabilistic Key Predistribution Schemes , 2009 .
[6] Yih-Chun Hu,et al. Rushing attacks and defense in wireless ad hoc network routing protocols , 2003, WiSe '03.
[7] A. Yasinsac,et al. Identifying flaws in the secure routing protocol , 2003, Conference Proceedings of the 2003 IEEE International Performance, Computing, and Communications Conference, 2003..
[8] Yih-Chun Hu,et al. Efficient Security Mechanisms for Routing Protocolsa , 2003, NDSS.
[9] A. Laouiti,et al. Optimized link state routing protocol for ad hoc networks , 2001, Proceedings. IEEE International Multi Topic Conference, 2001. IEEE INMIC 2001. Technology for the 21st Century..
[10] Mohsen Guizani,et al. A survey of secure mobile Ad Hoc routing protocols , 2008, IEEE Communications Surveys & Tutorials.
[11] Gene Tsudik,et al. SRDP: securing route discovery in DSR , 2005, The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services.
[12] Charles E. Perkins,et al. Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.
[13] Donal O'Mahony,et al. Secure routing for mobile ad hoc networks , 2005, IEEE Communications Surveys & Tutorials.
[14] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[15] Ran Canetti,et al. Efficient and Secure Source Authentication for Multicast , 2001, NDSS.
[16] Srdjan Capkun,et al. BISS: building secure routing out of an incomplete set of security associations , 2003, WiSe '03.
[17] M. S. Corson,et al. A highly adaptive distributed routing algorithm for mobile wireless networks , 1997, Proceedings of INFOCOM '97.
[18] Yuguang Fang,et al. AC-PKI: anonymous and certificateless public-key infrastructure for mobile ad hoc networks , 2005, IEEE International Conference on Communications, 2005. ICC 2005. 2005.
[19] David A. Maltz,et al. Dynamic Source Routing in Ad Hoc Wireless Networks , 1994, Mobidata.
[20] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[21] Mahalingam Ramkumar. On the scalability of an efficient “Nonscalable” key distribution scheme , 2008, 2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks.
[22] Elizabeth M. Belding-Royer,et al. A secure routing protocol for ad hoc networks , 2002, 10th IEEE International Conference on Network Protocols, 2002. Proceedings..
[23] Mahalingam Ramkumar,et al. Improving the resiliency of Ariadne , 2008, 2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks.
[24] Mike Burmester,et al. Tracing Byzantine faults in ad hoc networks , 2003 .
[25] Ralph C. Merkle,et al. A Digital Signature Based on a Conventional Encryption Function , 1987, CRYPTO.
[26] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2005, Wirel. Networks.
[27] Victor C. M. Leung,et al. Secure Routing for Mobile Ad Hoc Networks , 2006 .
[28] Yuguang Fang,et al. An ID-based Framework Achieving Privacy and Non-Repudiation in Vehicular Ad Hoc Networks , 2007, MILCOM 2007 - IEEE Military Communications Conference.