An on-demand secure routing protocol resilient to byzantine failures
Top Cited Papers
- 28 September 2002
- proceedings article
- Published by Association for Computing Machinery (ACM)
Abstract
No abstract availableKeywords
This publication has 10 references indexed in Scilit:
- An efficient message authentication scheme for link state routingPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- AriadnePublished by Association for Computing Machinery (ACM) ,2002
- Security-aware ad hoc routing for wireless networksPublished by Association for Computing Machinery (ACM) ,2001
- The quest for security in mobile ad hoc networksPublished by Association for Computing Machinery (ACM) ,2001
- When the CRC and TCP checksum disagreePublished by Association for Computing Machinery (ACM) ,2000
- Mitigating routing misbehavior in mobile ad hoc networksPublished by Association for Computing Machinery (ACM) ,2000
- Efficient security mechanisms for the border gateway routing protocolComputer Communications, 1998
- Protecting routing infrastructures from denial of service using cooperative intrusion detectionPublished by Association for Computing Machinery (ACM) ,1997
- MACAWPublished by Association for Computing Machinery (ACM) ,1994
- Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computersPublished by Association for Computing Machinery (ACM) ,1994