共 50 条
- [1] Truthful and Secure Routing in Ad Hoc Networks with Malicious and Selfish Nodes [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2009, 3 (01): : 117 - 128
- [2] A secure multicast routing protocol for ad hoc networks with misbehaving nodes [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2006, PT 2, 2006, 3981 : 591 - 600
- [3] A secure routing protocol for ad hoc networks [J]. 10TH IEEE INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS, PROCEEDINGS, 2002, : 78 - 87
- [4] A secure routing protocol for mobile Ad hoc networks [J]. 6TH IEEE/ACIS INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE, PROCEEDINGS, 2007, : 153 - +
- [5] Advanced detection of selfish or malicious nodes in ad hoc networks [J]. SECURITY IN AD-HOC AND SENSOR NETWORKS, 2005, 3313 : 152 - 165
- [6] Lightweight Detection of Malicious Nodes in Mobile Ad Hoc Networks [J]. 2017 INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGIES (COMTECH), 2017, : 191 - 194
- [7] Secure routing and intrusion detection in ad hoc networks [J]. THIRD IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS, PROCEEDINGS, 2005, : 191 - 199
- [8] SECURE ROUTING PROTOCOL DESIGN FOR UAV AD HOC NETWORKS [J]. 2015 IEEE/AIAA 34TH DIGITAL AVIONICS SYSTEMS CONFERENCE (DASC), 2015,
- [9] Formal Analysis of Secure Routing Protocol for Ad Hoc Networks [J]. 2009 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS AND SIGNAL PROCESSING (WCSP 2009), 2009, : 171 - 174
- [10] Secure routing protocol based trust for ad hoc networks [J]. SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 1, PROCEEDINGS, 2007, : 279 - +