Analyzing and Preventing MAC-Layer Denial of Service Attacks for Stock 802 . 11 Systems
暂无分享,去创建一个
[1] Thomas D. Burd,et al. Processor design for portable systems , 1996, J. VLSI Signal Process..
[2] Justin Dolskeinterhack,et al. A Brute Force Search of DES KeyspaceMatt Curtin , 1997 .
[3] Thomas D. Burd,et al. The simulation and evaluation of dynamic voltage scaling algorithms , 1998, Proceedings. 1998 International Symposium on Low Power Electronics and Design (IEEE Cat. No.98TH8379).
[4] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[5] Frank Stajano,et al. The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.
[6] David A. Wagner,et al. Intercepting mobile communications: the insecurity of 802.11 , 2001, MobiCom '01.
[7] Martin Nilsson,et al. Investigating the energy consumption of a wireless network interface in an ad hoc networking environment , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).
[8] Michalis Faloutsos,et al. Denial of service attacks at the MAC layer in wireless ad hoc networks , 2002, MILCOM 2002. Proceedings.
[9] Mario Gerla,et al. How effective is the IEEE 802.11 RTS/CTS handshake in ad hoc networks , 2002, Global Telecommunications Conference, 2002. GLOBECOM '02. IEEE.
[10] Panagiotis Papadimitratos,et al. Secure data transmission in mobile ad hoc networks , 2003, WiSe '03.
[11] Danny Dhillon,et al. Implementing a fully distributed certificate authority in an OLSR MANET , 2004, 2004 IEEE Wireless Communications and Networking Conference (IEEE Cat. No.04TH8733).