1 |
S. Buchegger and J.L. Boudec, 'Performance analysis of the CONFIDANT Protocol.' Proceeding of the 3rd ACM International Symposium on Mobile ad hoc networking & computing, pp. 226-236, June 2002
DOI
|
2 |
N. Asokan and P. Ginzboorg, 'Key agreement in ad hoc networks,' Computer Communication, pp. 1627-1637, Nov. 2000
DOI
ScienceOn
|
3 |
S. Zhu, S. Xu, S. Setia, and S. Jajodia, 'Establishing Pairwise Keys for Secure Communication in Ad hoc Networks: A Probabilistic Approach,' Proceedings of the 11th IEEE Conference on Network Protocols(ICNP'03), pp. 326-335, Nov. 2003
DOI
|
4 |
S. Marti. T.J. Giuli, K. Lai. and M. Baker, 'Mitigating routing misbehavior in mobile ad hoc networks,' Proceeding of the 6th International Conference on Mobile Computing and Networking, pp. 255-265, Aug. 2000
DOI
|
5 |
C.E. Perkins, E.M. Royer, and S.R. Das, 'Ad hoc on-demand distance Vector(AODV) routing,' IETF Internet draft, MANET working group, Jan. 2002
|
6 |
L. Zhou and Z.J. Haas, 'Securing Ad Hoc Networks,' IEEE Network Magazine, vol. 13, pp. 24-30, Nov. 1999
|
7 |
M.G. Zapata and N. Asokan, 'Securing Ad hoc Routing Protocols,' In Proceeding of the 2002 ACM workshop on wireless security, pp. 1-10, Sep. 2002
DOI
|
8 |
C.K. Toh, C. Lee, and N.A. Ramos, 'Next-Generation Tactical Ad Hoc Mobile Wireless Networks,' Technology Review Journal. pp. 103-113, Apr. 2002
|
9 |
J. Brand and G. Hartwig, 'Management of tactical ad hoc networks with C2 data models,' Military Communication Conference 2001 IEEE, pp. 915-922, Aug. 2001
|
10 |
C.K. Toh, Ad Hoc Mobile Wireless Networks: Protocol and Systems, Prentice Hall PRT, Dec. 2001
|