Interconnections: bridges and routers
Interconnections: bridges and routers
Integration of security in network routing protocols
ACM SIGSAC Review
MACAW: a media access protocol for wireless LAN's
SIGCOMM '94 Proceedings of the conference on Communications architectures, protocols and applications
Protecting routing infrastructures from denial of service using cooperative intrusion detection
NSPW '97 Proceedings of the 1997 workshop on New security paradigms
How to prove where you are: tracking the location of customer equipment
CCS '98 Proceedings of the 5th ACM conference on Computer and communications security
Location-aided routing (LAR) in mobile ad hoc networks
MobiCom '98 Proceedings of the 4th annual ACM/IEEE international conference on Mobile computing and networking
A performance comparison of multi-hop wireless ad hoc network routing protocols
MobiCom '98 Proceedings of the 4th annual ACM/IEEE international conference on Mobile computing and networking
Scenario-based performance analysis of routing protocols for mobile ad-hoc networks
MobiCom '99 Proceedings of the 5th annual ACM/IEEE international conference on Mobile computing and networking
Caching strategies in on-demand routing protocols for wireless ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
SPINS: security protocols for sensor networks
Proceedings of the 7th annual international conference on Mobile computing and networking
Proceedings of the 7th annual international conference on Mobile computing and networking
Implicit source routes for on-demand ad hoc network routing
MobiHoc '01 Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing
The quest for security in mobile ad hoc networks
MobiHoc '01 Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing
MobiHoc '01 Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing
Wireless Communications: Principles and Practice
Wireless Communications: Principles and Practice
Handbook of Applied Cryptography
Handbook of Applied Cryptography
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks
Proceedings of the 7th International Workshop on Security Protocols
Reducing The Cost Of Security In Link-State Routing
SNDSS '97 Proceedings of the 1997 Symposium on Network and Distributed System Security
Securing Distance-Vector Routing Protocols
SNDSS '97 Proceedings of the 1997 Symposium on Network and Distributed System Security
Ad-hoc On-Demand Distance Vector Routing
WMCSA '99 Proceedings of the Second IEEE Workshop on Mobile Computer Systems and Applications
SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks
WMCSA '02 Proceedings of the Fourth IEEE Workshop on Mobile Computing Systems and Applications
Security-Aware Ad hoc Routing for Wireless Networks
Security-Aware Ad hoc Routing for Wireless Networks
An efficient message authentication scheme for link state routing
ACSAC '97 Proceedings of the 13th Annual Computer Security Applications Conference
Efficient Authentication and Signing of Multicast Streams over Lossy Channels
SP '00 Proceedings of the 2000 IEEE Symposium on Security and Privacy
The effects of on-demand behavior in routing protocols for multihop wireless ad hoc networks
IEEE Journal on Selected Areas in Communications
IEEE Network: The Magazine of Global Internetworking
An on-demand secure routing protocol resilient to byzantine failures
WiSE '02 Proceedings of the 1st ACM workshop on Wireless security
A charging and rewarding scheme for packet forwarding in multi-hop cellular networks
Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing
Mobility helps security in ad hoc networks
Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing
ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks
Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing
On Security Study of Two Distance Vector Routing Protocols or Mobile Ad Hoc Networks
PERCOM '03 Proceedings of the First IEEE International Conference on Pervasive Computing and Communications
Cross-Feature Analysis for Detecting Ad-Hoc Routing Anomalies
ICDCS '03 Proceedings of the 23rd International Conference on Distributed Computing Systems
Report on a working session on security in wireless ad hoc networks
ACM SIGMOBILE Mobile Computing and Communications Review
UCAN: a unified cellular and ad-hoc network architecture
Proceedings of the 9th annual international conference on Mobile computing and networking
BISS: building secure routing out of an incomplete set of security associations
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
Rushing attacks and defense in wireless ad hoc network routing protocols
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
Secure data transmission in mobile ad hoc networks
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
Secure routing with tamper resistant module for mobile Ad hoc networks
ACM SIGMOBILE Mobile Computing and Communications Review
The butt of the iceberg: hidden security problems of ubiquitous systems
Ambient intelligence
Secure Hosts Autoconfiguration in Mobile Ad Hoc Networks
ICDCSW '04 Proceedings of the 24th International Conference on Distributed Computing Systems Workshops - W7: EC (ICDCSW'04) - Volume 7
Kerberos assisted Authentication in Mobile Ad-hoc Networks
ACSC '04 Proceedings of the 27th Australasian conference on Computer science - Volume 26
Establishing trust in pure ad-hoc networks
ACSC '04 Proceedings of the 27th Australasian conference on Computer science - Volume 26
Trust based adaptive on demand ad hoc routing protocol
ACM-SE 42 Proceedings of the 42nd annual Southeast regional conference
Securing nomads: the case for quarantine, examination, and decontamination
Proceedings of the 2003 workshop on New security paradigms
SECTOR: secure tracking of node encounters in multi-hop wireless networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
An approach to certificate path discovery in mobile Ad Hoc networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Random key-assignment for secure Wireless Sensor Networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
A specification-based intrusion detection system for AODV
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
A cooperative intrusion detection system for ad hoc networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
The Security and Privacy of Smart Vehicles
IEEE Security and Privacy
A Survey of Secure Wireless Ad Hoc Routing
IEEE Security and Privacy
Security for wireless sensor networks
Wireless sensor networks
Security for wireless sensor networks
Wireless sensor networks
Security in wireless mobile and sensor networks
Wireless communications systems and networks
Peer-to-Peer Security in Mobile Devices: A User Perspective
P2P '04 Proceedings of the Fourth International Conference on Peer-to-Peer Computing
JANUS: towards robust and malicious resilient routing in hybrid wireless networks
Proceedings of the 3rd ACM workshop on Wireless security
SeRLoc: secure range-independent localization for wireless sensor networks
Proceedings of the 3rd ACM workshop on Wireless security
Channel surfing and spatial retreats: defenses against wireless denial of service
Proceedings of the 3rd ACM workshop on Wireless security
Denial of service resilience in ad hoc networks
Proceedings of the 10th annual international conference on Mobile computing and networking
A framework of secure location service for position-based ad hoc routing
PE-WASUN '04 Proceedings of the 1st ACM international workshop on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks
SOWER: self-organizing wireless network for messaging
Proceedings of the 2nd ACM international workshop on Wireless mobile applications and services on WLAN hotspots
An advanced signature system for OLSR
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
Towards provable security for ad hoc routing protocols
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
Securing quality-of-service route discovery in on-demand routing for ad hoc networks
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
Providing Fault-Tolerant Ad hoc Routing Service in Adversarial Environments
Wireless Personal Communications: An International Journal
An Adaptive and Predictive Security Model for Mobile Ad hoc Networks
Wireless Personal Communications: An International Journal
URSA: ubiquitous and robust access control for mobile ad hoc networks
IEEE/ACM Transactions on Networking (TON)
Securing ad hoc networks through mobile agent
InfoSecu '04 Proceedings of the 3rd international conference on Information security
Wormhole Attacks Detection in Wireless Ad Hoc Networks: A Statistical Analysis Approach
IPDPS '05 Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Workshop 17 - Volume 18
The feasibility of launching and detecting jamming attacks in wireless networks
Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing
A secure ad-hoc routing approach using localized self-healing communities
Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing
Hidden-action in multi-hop routing
Proceedings of the 6th ACM conference on Electronic commerce
Wireless mesh networks: a survey
Computer Networks and ISDN Systems
Hotspot-based traceback for mobile ad hoc networks
Proceedings of the 4th ACM workshop on Wireless security
Secure time synchronization service for sensor networks
Proceedings of the 4th ACM workshop on Wireless security
Dependable Dynamic Source Routing without a trusted third party
ACSC '05 Proceedings of the Twenty-eighth Australasian conference on Computer Science - Volume 38
Experimental comparisons between SAODV and AODV routing protocols
WMuNeP '05 Proceedings of the 1st ACM workshop on Wireless multimedia networking and performance modeling
On the resiliency of mobile ad hoc networks to MAC layer misbehavior
PE-WASUN '05 Proceedings of the 2nd ACM international workshop on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks
DICTATE: DIstributed CerTification Authority with probabilisTic frEshness for Ad Hoc Networks
IEEE Transactions on Dependable and Secure Computing
Secure collaboration in mediator-free environments
Proceedings of the 12th ACM conference on Computer and communications security
A quantitative trust establishment framework for reliable data packet delivery in MANETs
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
The security of vehicular ad hoc networks
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
AnonDSR: efficient anonymous dynamic source routing for mobile ad-hoc networks
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
Defending against path-based DoS attacks in wireless sensor networks
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
Mobility Helps Peer-to-Peer Security
IEEE Transactions on Mobile Computing
Node Cooperation in Hybrid Ad Hoc Networks
IEEE Transactions on Mobile Computing
Performance Comparison of Trust-Based Reactive Routing Protocols
IEEE Transactions on Mobile Computing
Trust Establishment In Pure Ad-hoc Networks
Wireless Personal Communications: An International Journal
Entrapping Adversaries for Source Protection in Sensor Networks
WOWMOM '06 Proceedings of the 2006 International Symposium on on World of Wireless, Mobile and Multimedia Networks
Evaluation of a Stastical Technique to Mitigate Malicious Control Packets in Ad Hoc Networks
WOWMOM '06 Proceedings of the 2006 International Symposium on on World of Wireless, Mobile and Multimedia Networks
Anomaly intrusion detection in wireless sensor networks
Journal of High Speed Networks - Special issue on trusted internet workshop (TIW) 2004
TARP: trust-aware routing protocol
Proceedings of the 2006 international conference on Wireless communications and mobile computing
rDCF: A Relay-Enabled Medium Access Control Protocol for Wireless Ad Hoc Networks
IEEE Transactions on Mobile Computing
Toward Secure Low Rate Wireless Personal Area Networks
IEEE Transactions on Mobile Computing
DOA: DSR over AODV Routing for Mobile Ad Hoc Networks
IEEE Transactions on Mobile Computing
Detecting and Isolating Malicious Routers
IEEE Transactions on Dependable and Secure Computing
Ariadne: a secure on-demand routing protocol for ad hoc networks
Wireless Networks
Mobile Networks and Applications
Towards designing a trusted routing solution in mobile ad hoc networks
Mobile Networks and Applications
Modeling Ad-hoc rushing attack in a negligibility-based security framework
WiSe '06 Proceedings of the 5th ACM workshop on Wireless security
Relying on time synchronization for security in ad hoc networks
Proceedings of the 43rd annual Southeast regional conference - Volume 2
Congestion Adaptive Routing in Mobile Ad Hoc Networks
IEEE Transactions on Parallel and Distributed Systems
Provably Secure On-Demand Source Routing in Mobile Ad Hoc Networks
IEEE Transactions on Mobile Computing
Achieving privacy in mesh networks
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
Robust cooperative trust establishment for MANETs
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
SIGF: a family of configurable, secure routing protocols for wireless sensor networks
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
On the fairness of flow aggregation for denial-of-service resistant QoS in MANETs
QShine '06 Proceedings of the 3rd international conference on Quality of service in heterogeneous wired/wireless networks
LARS: a locally aware reputation system for mobile ad hoc networks
Proceedings of the 44th annual Southeast regional conference
A survey on peer-to-peer key management for mobile ad hoc networks
ACM Computing Surveys (CSUR)
Identity-based secure collaboration in wireless ad hoc networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Robust self-keying mobile ad hoc networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Service-based P2P overlay network for collaborative problem solving
Decision Support Systems
A framework for security analysis of mobile wireless networks
Theoretical Computer Science - Automated reasoning for security protocol analysis
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
Journal of Network and Computer Applications - Special issue: Network and information security: A computational intelligence approach
Journal of Network and Computer Applications - Special issue: Network and information security: A computational intelligence approach
Sustaining cooperation in multi-hop wireless networks
NSDI'05 Proceedings of the 2nd conference on Symposium on Networked Systems Design & Implementation - Volume 2
Theoretical bounds on control-plane self-monitoring in routing protocols
Proceedings of the 2007 ACM SIGMETRICS international conference on Measurement and modeling of computer systems
Efficient Hybrid Security Mechanisms for Heterogeneous Sensor Networks
IEEE Transactions on Mobile Computing
Non-interactive key establishment in mobile ad hoc networks
Ad Hoc Networks
Threshold cryptography in P2P and MANETs: The case of access control
Computer Networks: The International Journal of Computer and Telecommunications Networking
A Stabilizing Deactivation/Reactivation Protocol
IEEE Transactions on Computers
An Identity-Free and On-Demand Routing Scheme against Anonymity Threats in Mobile Ad Hoc Networks
IEEE Transactions on Mobile Computing
On identifying malicious nodes in ad hoc networks
IWCMC '07 Proceedings of the 2007 international conference on Wireless communications and mobile computing
SecLEACH-On the security of clustered sensor networks
Signal Processing
On improving the efficiency of truthful routing in MANETs with selfish nodes
Pervasive and Mobile Computing
A secure incentive protocol for mobile ad hoc networks
Wireless Networks
The COMMIT Protocol for Truthful and Cost-Efficient Routing in Ad Hoc Networks with Selfish Nodes
IEEE Transactions on Mobile Computing
ODSBR: An on-demand secure Byzantine resilient routing protocol for wireless ad hoc networks
ACM Transactions on Information and System Security (TISSEC)
Security in mobile ad-hoc networks using soft encryption and trust-based multi-path routing
Computer Communications
Routing based authentication for mobile ad hoc network in home environment
Proceedings of the 2nd international conference on Ubiquitous information management and communication
On MAC-layer denial of service attacks in IEEE 802.11 ad hoc networks: analysis and counter measures
International Journal of Wireless and Mobile Computing
Aggregate designated verifier signatures and application to secure routing
International Journal of Security and Networks
International Journal of Security and Networks
On the design of secure protocols for hierarchical sensor networks
International Journal of Security and Networks
Defence against packet injection in ad hoc networks
International Journal of Security and Networks
Limiting DoS attacks during multihop data delivery in wireless sensor networks
International Journal of Security and Networks
Collaborative Dynamic Source Routing using transitional trust filters
International Journal of Information and Computer Security
Modelling and analysis of bandwidth competition in 802.11 wireless networks
International Journal of Mobile Network Design and Innovation
Slander-resistant forwarding isolation in ad hoc networks
International Journal of Mobile Network Design and Innovation
Swarm intelligent power-aware detection of unauthorized and compromised nodes in MANETs
Journal of Artificial Evolution and Applications - Regular issue
How to avoid packet droppers with proactive routing protocols for ad hoc networks
International Journal of Network Management
Securing wireless communication against wormhole attacks
EHAC'05 Proceedings of the 4th WSEAS International Conference on Electronics, Hardware, Wireless and Optical Communications
Modified AODV protocol for prevention of denial of service attacks in wireless ad hoc networks
AIC'05 Proceedings of the 5th WSEAS International Conference on Applied Informatics and Communications
Trusting the Trust-Model in mobile wireless ad-hoc network settings
ISP'06 Proceedings of the 5th WSEAS International Conference on Information Security and Privacy
SEAR: a secure efficient ad hoc on demand routing protocol for wireless networks
Proceedings of the 2008 ACM symposium on Information, computer and communications security
Secure sensor network routing: a clean-slate approach
CoNEXT '06 Proceedings of the 2006 ACM CoNEXT conference
Securing vehicular ad hoc networks
Journal of Computer Security - Special Issue on Security of Ad-hoc and Sensor Networks
Hermes: A quantitative trust establishment framework for reliable data packet delivery in MANETs
Journal of Computer Security - Special Issue on Security of Ad-hoc and Sensor Networks
Secure Time Synchronization in Sensor Networks
ACM Transactions on Information and System Security (TISSEC)
Swarm intelligent power-aware detection of unauthorized and compromised nodes in MANETs
Journal of Artificial Evolution and Applications - Regular issue
PLUS: parameterised localised trust management-based security framework for sensor networks
International Journal of Sensor Networks
HEAP: A packet authentication scheme for mobile ad hoc networks
Ad Hoc Networks
HEAP: hop-by-hop efficient authentication protocol for Mobile Ad-hoc Networks
SpringSim '07 Proceedings of the 2007 spring simulaiton multiconference - Volume 1
SpringSim '07 Proceedings of the 2007 spring simulation multiconference - Volume 3
Distributed and Secure Bootstrapping of Mobile Ad Hoc Networks: Framework and Constructions
ACM Transactions on Information and System Security (TISSEC)
Securely Deliver Data by Multi-path Routing Scheme in Wireless Mesh Networks
ICCS '07 Proceedings of the 7th international conference on Computational Science, Part IV: ICCS 2007
Detection of Packet Forwarding Misbehavior in Mobile Ad-Hoc Networks
WWIC '07 Proceedings of the 5th international conference on Wired/Wireless Internet Communications
BAP: Broadcast Authentication Using Cryptographic Puzzles
ACNS '07 Proceedings of the 5th international conference on Applied Cryptography and Network Security
A Secure Hybrid Wireless Mesh Protocol for 802.11s Mesh Network
ICCSA '08 Proceeding sof the international conference on Computational Science and Its Applications, Part I
Impact of denial of service attacks on ad hoc networks
IEEE/ACM Transactions on Networking (TON)
TSR: trust-based secure MANET routing using HMMs
Proceedings of the 4th ACM symposium on QoS and security for wireless and mobile networks
Subjective logic based trust model for mobile ad hoc networks
Proceedings of the 4th international conference on Security and privacy in communication netowrks
An attacker model for MANET routing security
Proceedings of the second ACM conference on Wireless network security
Inter-cluster routing authentication for ad hoc networks by a hierarchical key scheme
Journal of Computer Science and Technology
Adaptive intrusion detection & prevention of denial of service attacks in MANETs
Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly
Trust-based SAODV protocol with intrusion detection and incentive cooperation in MANET
Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly
On the detection of signaling DoS attacks on 3G/WiMax wireless networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Black-hole-resistant ENADAIR-based routing protocol for Mobile Ad hoc Networks
International Journal of Security and Networks
Design and simulation on data-forwarding security in sensor networks
International Journal of Information and Computer Security
Covert channels in ad-hoc wireless networks
Ad Hoc Networks
Securing wireless mesh networks: a winning combination of routing and forwarding mechanisms
Proceedings of the 5th International Latin American Networking Conference
Reliable and efficient forwarding in ad hoc networks
Ad Hoc Networks
Secure hosts auto-configuration in mobile ad hoc networks
Ad Hoc Networks
Minimizing detection probability routing in ad hoc networks using directional antennas
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless network security
Incorporating trust and reputation in the DSR protocol for dependable routing
Computer Communications
Wireless mesh networks: a survey
Computer Networks: The International Journal of Computer and Telecommunications Networking
A trustworthiness-based QoS routing protocol for wireless ad hoc networks
IEEE Transactions on Wireless Communications
Securing the Communication in Private Heterogeneous Mobile Ad hoc Networks
Wireless Personal Communications: An International Journal
Key management for lightweight ad-hoc routing authentication
ISWPC'09 Proceedings of the 4th international conference on Wireless pervasive computing
d-key dynamic encryption: a security enhancement protocol for mobile ad hoc network
ICUFN'09 Proceedings of the first international conference on Ubiquitous and future networks
An efficient authentication and key management protocol for hierarchical ad hoc sensor networks
WCNC'09 Proceedings of the 2009 IEEE conference on Wireless Communications & Networking Conference
SWCA: a secure weighted clustering algorithm in wireless ad hoc networks
WCNC'09 Proceedings of the 2009 IEEE conference on Wireless Communications & Networking Conference
Adaptable misbehavior detection and isolation in wireless ad hoc networks using policies
IM'09 Proceedings of the 11th IFIP/IEEE international conference on Symposium on Integrated Network Management
Improving SAODV protocol with trust levels management, IDM and incentive cooperation in MANET
WTS'09 Proceedings of the 2009 conference on Wireless Telecommunications Symposium
RDSR-V. Reliable Dynamic Source Routing for video-streaming over mobile ad hoc networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
RAAM: routing algorithm using ant agents for MANETS
ICACT'09 Proceedings of the 11th international conference on Advanced Communication Technology - Volume 2
Formal Security Analysis for Ad-Hoc Networks
Electronic Notes in Theoretical Computer Science (ENTCS)
A global security architecture for operated hybrid WLAN mesh networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Noninteractive self-certification for long-lived mobile ad hoc networks
IEEE Transactions on Information Forensics and Security - Special issue on electronic voting
The simulation and comparison of routing attacks on DSR protocol
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Survey of attacks on AODV and MAODV
Proceedings of the International Conference and Workshop on Emerging Trends in Technology
Security enforcement in wireless sensor networks: A framework based on non-cooperative games
Pervasive and Mobile Computing
Design of a cooperative distributed intrusion detection system for AODV
ICUCT'06 Proceedings of the 1st international conference on Ubiquitous convergence technology
A secure data transmission protocol for mobile ad hoc networks
PAISI'07 Proceedings of the 2007 Pacific Asia conference on Intelligence and security informatics
A performance evaluation of intrusion-tolerant routing in wireless sensor networks
IPSN'03 Proceedings of the 2nd international conference on Information processing in sensor networks
Reliable delivery of event data from sensors to actuators in pervasive computing environments
Proceedings of the 21st annual IFIP WG 11.3 working conference on Data and applications security
On the resilient overlay topology formation in multi-hop wireless networks
NETWORKING'07 Proceedings of the 6th international IFIP-TC6 conference on Ad Hoc and sensor networks, wireless networks, next generation internet
Cost-sensitive intrusion responses for mobile ad hoc networks
RAID'07 Proceedings of the 10th international conference on Recent advances in intrusion detection
A secure location service for ad hoc position-based routing using self-signed locations
CANS'07 Proceedings of the 6th international conference on Cryptology and network security
Key distribution in mobile ad hoc networks based on message relaying
ESAS'07 Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks
Resilience to dropping nodes in mobile ad hoc networks with link-state routing
NETWORKING'08 Proceedings of the 7th international IFIP-TC6 networking conference on AdHoc and sensor networks, wireless networks, next generation internet
A simplified anonymous dynamic source routing protocol for ad-hoc networks
ICCSA'07 Proceedings of the 2007 international conference on Computational science and Its applications - Volume Part II
An analytical model of routing, misbehavior, and countermeasures in mobile ad hoc networks
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Secured dynamic source routing protocol for mobile sensor networks
ICNVS'10 Proceedings of the 12th international conference on Networking, VLSI and signal processing
ICNVS'10 Proceedings of the 12th international conference on Networking, VLSI and signal processing
Reinforcement learning for quality of service in mobile ad hoc network (MANET)
ICNVS'10 Proceedings of the 12th international conference on Networking, VLSI and signal processing
Mitigating selective forwarding attacks with a channel-aware approach in WMNs
IEEE Transactions on Wireless Communications
Secured reactive routing protocol for mobile nodes in sensor networks
WSEAS TRANSACTIONS on COMMUNICATIONS
International Journal of Communication Networks and Distributed Systems
A message recognition protocol based on standard assumptions
ACNS'10 Proceedings of the 8th international conference on Applied cryptography and network security
Secure neighborhood routing protocol
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
Understanding dynamic denial of service attacks in mobile ad hoc networks
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
Comparison of two intrusion detection schemes for sparsely connected ad hoc networks
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
An effective intrusion detection approach for OLSR MANET protocol
NPSEC'05 Proceedings of the First international conference on Secure network protocols
A correctness proof of the SRP protocal
IPDPS'06 Proceedings of the 20th international conference on Parallel and distributed processing
On the insecurity of proactive RSA in the URSA mobile ad hoc network access control protocol
IEEE Transactions on Information Forensics and Security
COSR: a reputation-based secure route protocol in MANET
EURASIP Journal on Wireless Communications and Networking - Special issue on multimedia communications over next generation wireless networks
Resilient Security Mechanism for Wireless Ad hoc Network
Wireless Personal Communications: An International Journal
Secure routing in ad hoc networks and a related intrusion detection problem
MILCOM'03 Proceedings of the 2003 IEEE conference on Military communications - Volume II
A new set of passive routing attacks in mobile ad hoc networks
MILCOM'03 Proceedings of the 2003 IEEE conference on Military communications - Volume II
Practical defenses against pollution attacks in wireless network coding
ACM Transactions on Information and System Security (TISSEC)
A novel secure localization approach in wireless sensor networks
EURASIP Journal on Wireless Communications and Networking - Special issue on design, implementation, and evaluation of wireless sensor network systems
Detecting misbehaving nodes in MANETs
Proceedings of the 12th International Conference on Information Integration and Web-based Applications & Services
SEAODV: a security enhanced AODV routing protocol for wireless mesh networks
Transactions on computational science XI
AOS: an anonymous overlay system for mobile ad hoc networks
Wireless Networks
Deployment of intrusion detection nodes to prevent wormhole attacks in Mobile Ad hoc Networks
International Journal of Ad Hoc and Ubiquitous Computing
ETUS: enhanced triple umpiring system for security and robustness of wireless mobile ad hoc networks
International Journal of Communication Networks and Distributed Systems
Simulations, models, and testbeds: A mutual catalysis
Performance Evaluation
A wireless intrusion detection system for secure clustering and routing in ad hoc networks
ISC'06 Proceedings of the 9th international conference on Information Security
Proactive resilience to dropping nodes in mobile ad hoc networks
AINTEC'06 Proceedings of the Second Asian international conference on Technologies for Advanced Heterogeneous Networks
A secure global state routing for mobile ad hoc networks
PWC'06 Proceedings of the 11th IFIP TC6 international conference on Personal Wireless Communications
Self-monitoring security in ad hoc routing
ADHOC-NOW'06 Proceedings of the 5th international conference on Ad-Hoc, Mobile, and Wireless Networks
Compact stimulation mechanism for routing discovery protocols in civilian ad-hoc networks
CMS'05 Proceedings of the 9th IFIP TC-6 TC-11 international conference on Communications and Multimedia Security
A secure on-demand routing with distributed authentication for trust-based ad hoc networks
NPC'05 Proceedings of the 2005 IFIP international conference on Network and Parallel Computing
An EFSM-based intrusion detection system for ad hoc networks
ATVA'05 Proceedings of the Third international conference on Automated Technology for Verification and Analysis
Provable security of on-demand distance vector routing in wireless ad hoc networks
ESAS'05 Proceedings of the Second European conference on Security and Privacy in Ad-Hoc and Sensor Networks
ISSRP: a secure routing protocol using identity-based signcryption scheme in ad-hoc networks
PDCAT'04 Proceedings of the 5th international conference on Parallel and Distributed Computing: applications and Technologies
A secure routing protocol SDSR for mobile ad hoc networks
MSN'05 Proceedings of the First international conference on Mobile Ad-hoc and Sensor Networks
Secure AODV routing protocol using one-time signature
MSN'05 Proceedings of the First international conference on Mobile Ad-hoc and Sensor Networks
A security enhanced AODV routing protocol
MSN'05 Proceedings of the First international conference on Mobile Ad-hoc and Sensor Networks
Efficient authentication scheme for routing in mobile ad hoc networks
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
Efficient key agreement for merging clusters in ad-hoc networking environments
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
A secure multicast routing protocol for ad hoc networks with misbehaving nodes
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part II
Reliable broadcast message authentication in wireless sensor networks
EUC'06 Proceedings of the 2006 international conference on Emerging Directions in Embedded and Ubiquitous Computing
Self-organized security architecture for MANET
CIT'04 Proceedings of the 7th international conference on Intelligent Information Technology
LSRP: a lightweight secure routing protocol with low cost for ad-hoc networks
ICOIN'05 Proceedings of the 2005 international conference on Information Networking: convergence in broadband and mobile networking
Dependable propagating routing information in MANET
ICCNMC'05 Proceedings of the Third international conference on Networking and Mobile Computing
UGSP: secure key establishment protocol for ad-hoc networks
ICDCIT'04 Proceedings of the First international conference on Distributed Computing and Internet Technology
Security enhancement mechanism for ad-hoc OLSR protocol
ICOIN'06 Proceedings of the 2006 international conference on Information Networking: advances in Data Communications and Wireless Networks
Mitigating route request flooding attacks in mobile ad hoc networks
ICOIN'06 Proceedings of the 2006 international conference on Information Networking: advances in Data Communications and Wireless Networks
Formal security analysis of Ariadne secure routing protocol using model checking
International Journal of Ad Hoc and Ubiquitous Computing
Peer collaboration in wireless ad hoc networks
NETWORKING'05 Proceedings of the 4th IFIP-TC6 international conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication Systems
Self-configurable key pre-distribution in mobile ad hoc networks
NETWORKING'05 Proceedings of the 4th IFIP-TC6 international conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication Systems
Applying mobile agent to intrusion response for ad hoc networks
ICCS'05 Proceedings of the 5th international conference on Computational Science - Volume Part II
Robust routing in malicious environment for ad hoc networks
ISPEC'05 Proceedings of the First international conference on Information Security Practice and Experience
A novel intrusion detection method for mobile ad hoc networks
EGC'05 Proceedings of the 2005 European conference on Advances in Grid Computing
Advanced detection of selfish or malicious nodes in ad hoc networks
ESAS'04 Proceedings of the First European conference on Security in Ad-hoc and Sensor Networks
SDD: secure directed diffusion protocol for sensor networks
ESAS'04 Proceedings of the First European conference on Security in Ad-hoc and Sensor Networks
Identity-Based access control for ad hoc groups
ICISC'04 Proceedings of the 7th international conference on Information Security and Cryptology
Secure and scalable routing protocol for mobile ad-hoc networks
MATA'05 Proceedings of the Second international conference on Mobility Aware Technologies and Applications
Enhancing the security of on-demand routing in ad hoc networks
ADHOC-NOW'05 Proceedings of the 4th international conference on Ad-Hoc, Mobile, and Wireless Networks
Public key cryptography sans certificates in ad hoc networks
ACNS'06 Proceedings of the 4th international conference on Applied Cryptography and Network Security
Towards provable security for ubiquitous applications
ACISP'06 Proceedings of the 11th Australasian conference on Information Security and Privacy
SHWMP: a secure hybrid wireless mesh protocol for IEEE 802.11s wireless mesh networks
Transactions on Computational Science VI
An efficient scheme for detecting malicious nodes in mobile ad hoc networks
ICISC'06 Proceedings of the 9th international conference on Information Security and Cryptology
Dynamics of learning algorithms for the on-demand secure byzantine routing protocol
ESAS'06 Proceedings of the Third European conference on Security and Privacy in Ad-Hoc and Sensor Networks
MoteAODV – an AODV implementation for TinyOS 2.0
WISTP'10 Proceedings of the 4th IFIP WG 11.2 international conference on Information Security Theory and Practices: security and Privacy of Pervasive Systems and Smart Devices
Performance evaluation of key exchange using integrity regions in different mobility models
Proceedings of the 1st International Conference on Wireless Technologies for Humanitarian Relief
Identity based secure AODV and TCP for mobile ad hoc networks
Proceedings of the 1st International Conference on Wireless Technologies for Humanitarian Relief
Fuzzy-based trusted ant routing (FTAR) protocol in mobile ad hoc networks
MIWAI'11 Proceedings of the 5th international conference on Multi-Disciplinary Trends in Artificial Intelligence
A review of routing protocols for mobile ad hoc networks
WSEAS TRANSACTIONS on COMMUNICATIONS
International Journal of Network Management
Towards reliable self-clustering Mobile Ad Hoc Networks
Computers and Electrical Engineering
Analytical models for trust based routing protocols in wireless ad hoc networks
ACM SIGSOFT Software Engineering Notes
Information Sciences: an International Journal
MSN: mutual secure neighbor verification in multi-hop wireless networks
Security and Communication Networks
GAUR: a method to detect Sybil groups in peer-to-peer overlays
International Journal of Grid and Utility Computing
Security Through Collaboration and Trust in MANETs
Mobile Networks and Applications
CTAC: Control traffic tunneling attacks' countermeasures in mobile wireless networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Hash chains at the basis of a secure reactive routing protocol
INTRUST'11 Proceedings of the Third international conference on Trusted Systems
Secure Multipoint Relay based Routing in MANET
Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology
MAC aggregation protocols resilient to DoS attacks
International Journal of Security and Networks
Enhanced dynamic source routing protocol for mitigating black hole attack
International Journal of Wireless and Mobile Computing
Detection and Prevention of Single and Cooperative Black Hole Attacks in Mobile Ad Hoc Networks
International Journal of Business Data Communications and Networking
Mobile Multimedia Streaming Using Secure Multipath in Wireless Ad Hoc Networks
International Journal of Handheld Computing Research
Detection of blackhole attack in a Wireless Mesh Network using intelligent honeypot agents
The Journal of Supercomputing
Impact analysis of JellyFish attack on TCP-based mobile ad-hoc networks
Proceedings of the 6th International Conference on Security of Information and Networks
Performance of IEEE 802.11 under Jamming
Mobile Networks and Applications
A collaborative routing protocol against routing disruptions in MANETs
Personal and Ubiquitous Computing
An anonymous distributed routing protocol in mobile ad-hoc networks
The Journal of Supercomputing
Modified DSR protocol for detection and removal of selective black hole attack in MANET
Computers and Electrical Engineering
Hi-index | 0.00 |
a secure on-demand routing protocol for ad hoc networks.