Impementing and extending the Optimized Link State Routing Protocol
暂无分享,去创建一个
[1] David A. Wagner,et al. Intercepting mobile communications: the insecurity of 802.11 , 2001, MobiCom '01.
[2] Ravi Prakash,et al. MANETconf: configuration of hosts in a mobile ad hoc network , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.
[3] Charles E. Perkins,et al. Internet Connectivity for Ad Hoc Mobile Networks , 2002, Int. J. Wirel. Inf. Networks.
[4] Kevin C. Almeroth,et al. A mobility gateway for small-device networks , 2004, Second IEEE Annual Conference on Pervasive Computing and Communications, 2004. Proceedings of the.
[5] P. Jacquet,et al. Securing the OLSR protocol , 2003 .
[6] André Weimerskirch,et al. A Distributed Light-Weight Authentication Model for Ad-hoc Networks , 2001, ICISC.
[7] Sondre Wabakken Engell. Securing the OLSR Protocol , 2004 .
[8] Donald E. Eastlake,et al. US Secure Hash Algorithm 1 (SHA1) , 2001, RFC.
[9] André Schiper,et al. On the accuracy of MANET simulators , 2002, POMC '02.
[10] Liang Cheng,et al. Service Advertisement and Discovery in Mobile Ad hoc Networks , 2002 .
[11] Charles Hornig. A Standard for the Transmission of IP Datagrams over Ethernet Networks , 1984, RFC.
[12] Kwan-Wu Chin,et al. Implementation experience with MANET routing protocols , 2002, CCRV.
[13] Jesse Walker,et al. Unsafe at any key size; An analysis of the WEP encapsulation , 2000 .
[14] Srdjan Capkun,et al. Self-Organized Public-Key Management for Mobile Ad Hoc Networks , 2003, IEEE Trans. Mob. Comput..
[15] Philippe Jacquet,et al. Performance of Multipoint Relaying in Ad Hoc Mobile Routing Protocols , 2002, NETWORKING.
[16] Laurent Viennot,et al. Complexity Results on Election of Multipoint Relays in Wireless Networks , 1998 .
[17] Kevin J. Houle,et al. Trends in Denial of Service Attack Technology , 2001 .
[18] John Ioannidis,et al. Using the Fluhrer, Mantin, and Shamir Attack to Break WEP , 2002, NDSS.
[19] Anis Laouiti,et al. Multipoint Relaying: An Efficient Technique for Flooding in Mobile Wireless Networks , 2000 .
[20] Philippe Jacquet,et al. Performance analysis of olsr multipoint relay flooding in two ad hoc wireless network models , 2001 .
[21] Gruia-Catalin Roman,et al. Service Provision in Ad Hoc Networks , 2002, COORDINATION.