Author:
Zhang Fang-Jiao,Zhai Li-Dong,Yang Jin-Cui,Cui Xiang
Reference10 articles.
1. S. Yi, P. Naldurg, R. Kravets, “A Security-Aware Routing Protocol for Wireless Ad Hoc Networks,” the 6th World Multi-conference on Systemic Cybernetics and Informatics 2002:286-292.
2. Y. C. Hu, D.B. Johnson, A. Perrig, “SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks,” the 4th IEEE Workshop on Mobile Computing and Applications 2002:3-13.
3. M. Al-shurmanm, S.M. Yoo, S. Park, “Black hole attack in mobile Ad hoc networks,” the 42nd ACM Southeast Regional Conference New York ACM Press, 2003, 96-97.
4. S. Mart, T.J. Giuli, Kevin Lai, M. Baker, “Mitigating Routing Misbehavior in Mobile Ad Hoc Networks,” International Conference on Mobile Computing and Networking New York ACM Press, 2000, 255-265.
5. I. Aad, J.P. Hubaux, E.W. Knightly, “Denial of Service Resilience in Ad Hoc Networks,” the 10nd Annual International Conference on Mobile Computing and Networking, 2004, 202-215.
Cited by
19 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献