Integration of security in network routing protocols
ACM SIGSAC Review
The Byzantine Generals Problem
ACM Transactions on Programming Languages and Systems (TOPLAS)
Security Architecture for the Internet Infrastructure
SNDSS '95 Proceedings of the 1995 Symposium on Network and Distributed System Security (SNDSS'95)
Digital signature protection of the OSPF routing protocol
SNDSS '96 Proceedings of the 1996 Symposium on Network and Distributed System Security (SNDSS '96)
A loop-free path-finding algorithm: specification, verification and complexity
INFOCOM '95 Proceedings of the Fourteenth Annual Joint Conference of the IEEE Computer and Communication Societies (Vol. 3)-Volume - Volume 3
KHIP—a scalable protocol for secure multicast routing
Proceedings of the conference on Applications, technologies, architectures, and protocols for computer communication
Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Intrusion detection in wireless ad-hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Security and fraud detection in mobile and wireless networks
Handbook of wireless networks and mobile computing
Performance analysis of the CONFIDANT protocol
Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing
Ariadne: a secure on-demand routing protocol for ad hoc networks
Proceedings of the 8th annual international conference on Mobile computing and networking
Securing ad hoc routing protocols
WiSE '02 Proceedings of the 1st ACM workshop on Wireless security
An on-demand secure routing protocol resilient to byzantine failures
WiSE '02 Proceedings of the 1st ACM workshop on Wireless security
Hop integrity in computer networks
IEEE/ACM Transactions on Networking (TON)
Sensor-based intrusion detection for intra-domain distance-vector routing
Proceedings of the 9th ACM conference on Computer and communications security
Rushing attacks and defense in wireless ad hoc network routing protocols
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
Intrusion detection techniques for mobile wireless networks
Wireless Networks
A cooperative intrusion detection system for ad hoc networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Security in wireless ad hoc networks
The handbook of ad hoc wireless networks
ACM SIGCOMM Computer Communication Review
SPV: secure path vector routing for securing BGP
Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications
Key management and delayed verification for ad hoc networks
Journal of High Speed Networks - Special issue on trusted internet workshop (TIW) 2004
Experimental analysis of attacks against intradomain routing protocols
Journal of Computer Security
Ariadne: a secure on-demand routing protocol for ad hoc networks
Wireless Networks
Towards designing a trusted routing solution in mobile ad hoc networks
Mobile Networks and Applications
ACM Transactions on Autonomous and Adaptive Systems (TAAS)
A novel solution based on mobile agent for anonymity in wireless and mobile ad hoc networks
Proceedings of the 3rd ACM workshop on QoS and security for wireless and mobile networks
ODSBR: An on-demand secure Byzantine resilient routing protocol for wireless ad hoc networks
ACM Transactions on Information and System Security (TISSEC)
MMS: an autonomic network-layer foundation for network management
IEEE Journal on Selected Areas in Communications
Nodes bearing grudges: towards routing security, fairness, and robustness in mobile ad hoc networks
EUROMICRO-PDP'02 Proceedings of the 10th Euromicro conference on Parallel, distributed and network-based processing
BeeHiveGuard: a step towards secure nature inspired routing algorithms
EuroGP'06 Proceedings of the 2006 international conference on Applications of Evolutionary Computing
Secure routing using factual correctness
NETWORKING'06 Proceedings of the 5th international IFIP-TC6 conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications Systems
A verified distance vector routing protocol for protection of internet infrastructure
ICN'05 Proceedings of the 4th international conference on Networking - Volume Part II
Efficient recovery from false state in distributed routing algorithms
NETWORKING'10 Proceedings of the 9th IFIP TC 6 international conference on Networking
Efficient security mechanisms for the border gateway routing protocol
Computer Communications
Performance analysis of modified secure link state routing protocol
International Journal of Networking and Virtual Organisations
Hi-index | 0.00 |