Integrating Quality of Protection into Ad Hoc Routing Protocols
暂无分享,去创建一个
[1] N. Asokan,et al. Key agreement in ad hoc networks , 2000, Comput. Commun..
[2] Vaduvur Bharghavan,et al. CEDAR: a core-extraction distributed ad hoc routing algorithm , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).
[3] J.J. Garcia-Luna-Aceves,et al. Securing the border gateway routing protocol , 1996, Proceedings of GLOBECOM'96. 1996 IEEE Global Telecommunications Conference.
[4] M. S. Corson,et al. A highly adaptive distributed routing algorithm for mobile wireless networks , 1997, Proceedings of INFOCOM '97.
[5] John Moy,et al. OSPF Version 2 , 1998, RFC.
[6] David A. Maltz,et al. A performance comparison of multi-hop wireless ad hoc network routing protocols , 1998, MobiCom '98.
[7] Charles E. Perkins,et al. Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers , 1994, SIGCOMM.
[8] Charles E. Perkins,et al. Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.
[9] Zygmunt J. Haas,et al. The zone routing protocol (zrp) for ad hoc networks" intemet draft , 2002 .
[10] Gene Tsudik,et al. Simple and fault-tolerant key agreement for dynamic collaborative groups , 2000, CCS.
[11] Satish K. Tripathi,et al. Signal stability-based adaptive routing (SSA) for ad hoc mobile networks , 1997, IEEE Wirel. Commun..
[12] Elizabeth M. Belding-Royer,et al. A review of current routing protocols for ad hoc mobile wireless networks , 1999, IEEE Wirel. Commun..
[13] Brian Wellington,et al. OSPF with Digital Signatures , 1997, RFC.
[14] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[15] Frank Stajano,et al. The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.
[16] J. Broach,et al. The dynamic source routing protocol for mobile ad-hoc networks , 1998 .
[17] Nitin H. Vaidya,et al. Location-aided routing (LAR) in mobile ad hoc networks , 1998, MobiCom '98.
[18] John D. Howard,et al. An analysis of security incidents on the Internet 1989-1995 , 1998 .
[19] S. M. Heemstra de Groot,et al. Power-aware routing in mobile ad hoc networks , 1998, MobiCom '98.
[20] William Stallings. Network and Internetwork Security: Principles and Practice , 1994 .
[21] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[22] Shyhtsun Felix Wu,et al. Secure Routing Protocols: Theory and Practice* , 2001 .
[23] Eric S. Crawley,et al. A Framework for QoS-based Routing in the Internet , 1998, RFC.
[24] J. J. Garcia-Luna-Aceves,et al. Securing distance-vector routing protocols , 1997, Proceedings of SNDSS '97: Internet Society 1997 Symposium on Network and Distributed System Security.