Ad-Hoc, Mobile, and Wireless Networks
暂无分享,去创建一个
J. van Leeuwen | Jan van Leeuwen | Samuel Pierre | Michel Barbeau | Evangelos Kranakis | J. V. Leeuwen | E. Kranakis | M. Barbeau | S. Pierre | J. V. Leeuwen | J. Leeuwen
[1] G. Blom,et al. How many random digits are required until given sequences are obtained? , 1982, Journal of Applied Probability.
[2] Radia J. Perlman,et al. Network layer protocols with Byzantine robustness , 1988 .
[3] J.J. Garcia-Luna-Aceves,et al. Securing the border gateway routing protocol , 1996, Proceedings of GLOBECOM'96. 1996 IEEE Global Telecommunications Conference.
[4] J. J. Garcia-Luna-Aceves,et al. Securing distance-vector routing protocols , 1997, Proceedings of SNDSS '97: Internet Society 1997 Symposium on Network and Distributed System Security.
[5] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[6] J. J. Garcia-Luna-Aceves,et al. Collision avoidance and resolution multiple access for multichannel wireless networks , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).
[7] Kai-Yeung Siu,et al. Performance of a new Bluetooth scatternet formation protocol , 2001, ACM Interational Symposium on Mobile Ad Hoc Networking and Computing.
[8] S. Fischer. Selfish Routing , 2002 .
[9] N. Asokan,et al. Securing ad hoc routing protocols , 2002, WiSE '02.
[10] Daniel R. Simon,et al. Secure traceroute to detect faulty or malicious routing , 2003, CCRV.
[11] Charles E. Perkins,et al. Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.