Cryptanalysis of Secure Routing Among Authenticated Nodes in MANETs
Publisher
Springer Singapore
Reference14 articles.
1. P. Michiardi, R. Molva, Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks, in Advanced communications and multimedia security (Springer, 2002), pp. 107–121
2. S. Buchegger, J.-Y. Le Boudec, Performance analysis of the confidant protocol, in Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing (ACM, 2002), pp. 226–236
3. D. Coppersmith, M. Jakobsson, Almost optimal hash sequence traversal, in Financial Cryptography (Springer, 2002), pp 102–119
4. Ralf Hauser, Tony Przygienda, Gene Tsudik, Lowering security overhead in link state routing. Comput. Netw. 31(8), 885–894 (1999)
5. D.B. Johnson, Routing in ad hoc networks of mobile hosts, in First Workshop on Mobile Computing Systems and Applications, WMCSA 1994. (IEEE, 1994), pp. 158–163