Author:
Karlof Chris,Wagner David
Subject
Computer Networks and Communications,Hardware and Architecture,Software
Reference48 articles.
1. Y.-C. Hu, A. Perrig, D.B. Johnson, Packet leashes: a defense against wormhole attacks in wireless networks, in: IEEE Infocom, 2003
2. J.R. Douceur, The Sybil attack, in: 1st International Workshop on Peer-to-Peer Systems (IPTPS ’02), 2002
3. J. Hill, R. Szewczyk, A. Woo, S. Hollar, D. Culler, K. Pister, System architecture directions for networked sensors, in: Proceedings of ACM ASPLOS IX, 2000
4. V.D. Park, M.S. Corson, A highly adaptive distributed routing algorithm for mobile wireless networks, in: IEEE INFOCOM ’97, 1997, pp. 1405–1413
5. C. Perkins, E. Royer, Ad-hoc on-demand distance vector routing, in: MILCOM ’97 Panel on Ad Hoc Networks, 1997
Cited by
554 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献