Author:
Curtmola Reza,Dong Jing,Nita-Rotaru Cristina
Publisher
Springer Berlin Heidelberg
Reference36 articles.
1. Abad C, Gupta I (2005) Adding confidentiality to application-level multicast by leveraging the multicast overlay. In: Proceedings of ADSN’05
2. Adya A, Bahl P, Padhye J, Wolman A, Zhou L (2004) A multi-radio unification protocol for IEEE 802.11 wireless networks. In: Proceedings of BroadNets’04
3. Agrawal S, Boneh D (2009) Homomorphic MACs: Mac-based integrity for network coding. In: Proceedings of ACNS’09
4. Akyildiz IF, Wang X, Wang W (2005) Wireless mesh networks: a survey. Comput Netw 47(4):445–487. https://www.sciencedirect.com/science/article/abs/pii/S1389128604003457
5. Awerbuch B, Curtmola R, Holmer D, Nita-Rotaru C, Rubens H (2007) ODSBR: an on-demand secure Byzantine resilient routing protocol for wireless ad hoc networks. ACM Trans Inf Syst Secur (TISSEC) 10(4):35