Back to Results
First PageMeta Content
OSI protocols / Ad hoc On-Demand Distance Vector Routing / Routing / Destination-Sequenced Distance Vector routing / Wireless ad-hoc network / Flooding / Dynamic Source Routing / Order One Network Protocol / Wireless networking / Network architecture / Technology


1 Authenticated Routing for Ad hoc Networks Kimaya Sanzgiri  Brian Neil Levine
Add to Reading List

Document Date: 2007-03-10 14:28:30


Open Document

File Size: 138,33 KB

Share Result on Facebook

City

Washington / DC / /

Facility

University of Massachusetts / Georgetown University / University of California / /

IndustryTerm

good secure routing algorithm / ad hoc routing protocols / costly protocols / ad hoc wireless environments / sensor networks / secure ad hoc routing protocols / wireless network access / ad hoc networks / secure ad hoc routing protocol / dynamic networks / energy cost / ad hoc on-demand protocols / secure protocol / secure proactive routing protocol / long-range directional wireless link / security services / wireless networking / secure routing protocol / mobile ad hoc networks / handheld devices / heterogeneous wireless applications / ad hoc routing protocol / ad hoc network / trusted certificate server / rooftop networks / reactive routing protocol / /

OperatingSystem

DoS / /

Organization

office of Justice Programs / National Science Foundation / Georgetown University / Washington / University of California / Santa Barbara / University of Massachusetts / Amherst / DoJ / Swarm Intelligence / /

Person

Bridget Dahill Clay Shields Elizabeth / Elizabeth M. Belding-Royer / Brian Neil Levine / /

ProgrammingLanguage

HOC / DC / /

ProvinceOrState

California / Massachusetts / /

Technology

encryption / cryptography / routing protocol / ad hoc routing protocol / Public key / secure proactive routing protocol / good secure routing algorithm / DSR protocols / ARAN protocol / secure ad hoc routing protocols / flooding-free reactive routing protocol / ad hoc routing protocols / secure ad hoc routing protocol / secure routing protocol / AODV routing protocol / Private key / two protocols / simulation / secure protocol / ad hoc on-demand protocols / /

SocialTag