Sonam; Johari, Rahul MORID: MQTT oriented routing between IoT devices. (English) Zbl 07637249 J. Discrete Math. Sci. Cryptography 25, No. 7, 2121-2128 (2022). MSC: 68M25 PDF BibTeX XML Cite \textit{Sonam} and \textit{R. Johari}, J. Discrete Math. Sci. Cryptography 25, No. 7, 2121--2128 (2022; Zbl 07637249) Full Text: DOI OpenURL
Chandnani, Neeraj; Khairnar, Chandrakant N. An analysis of architecture, framework, security and challenging aspects for data aggregation and routing techniques in IoT WSNs. (English) Zbl 07575082 Theor. Comput. Sci. 929, 95-113 (2022). MSC: 68Qxx PDF BibTeX XML Cite \textit{N. Chandnani} and \textit{C. N. Khairnar}, Theor. Comput. Sci. 929, 95--113 (2022; Zbl 07575082) Full Text: DOI OpenURL
Fadhil, Saif Aamer Internet of Things security threats and key technologies. (English) Zbl 07477510 J. Discrete Math. Sci. Cryptography 24, No. 7, 1951-1957 (2021). MSC: 68M11 94A62 PDF BibTeX XML Cite \textit{S. A. Fadhil}, J. Discrete Math. Sci. Cryptography 24, No. 7, 1951--1957 (2021; Zbl 07477510) Full Text: DOI OpenURL
Amutha, J.; Sharma, Sandeep; Sharma, Sanjay Kumar Strategies based on various aspects of clustering in wireless sensor networks using classical, optimization and machine learning techniques: review, taxonomy, research findings, challenges and future directions. (English) Zbl 1484.68027 Comput. Sci. Rev. 40, Article ID 100376, 43 p. (2021). MSC: 68M18 62H30 68M25 68T05 68-02 PDF BibTeX XML Cite \textit{J. Amutha} et al., Comput. Sci. Rev. 40, Article ID 100376, 43 p. (2021; Zbl 1484.68027) Full Text: DOI OpenURL
Tikani, Hamid; Setak, Mostafa; Demir, Emrah A risk-constrained time-dependent cash-in-transit routing problem in multigraph under uncertainty. (English) Zbl 1487.90175 Eur. J. Oper. Res. 293, No. 2, 703-730 (2021). MSC: 90B06 90C35 PDF BibTeX XML Cite \textit{H. Tikani} et al., Eur. J. Oper. Res. 293, No. 2, 703--730 (2021; Zbl 1487.90175) Full Text: DOI OpenURL
Reaz, Rezwana; Acharya, H. B.; Elmallah, Ehab S.; Cobb, Jorge A.; Gouda, Mohamed G. Policy expressions and the bottom-up design of computing policies. (English) Zbl 1459.68123 Computing 101, No. 9, 1307-1326 (2019). MSC: 68Q60 03B70 68M25 PDF BibTeX XML Cite \textit{R. Reaz} et al., Computing 101, No. 9, 1307--1326 (2019; Zbl 1459.68123) Full Text: DOI OpenURL
Hoogeboom, Maaike; Dullaert, Wout Vehicle routing with arrival time diversification. (English) Zbl 1430.90091 Eur. J. Oper. Res. 275, No. 1, 93-107 (2019). MSC: 90B06 90C59 PDF BibTeX XML Cite \textit{M. Hoogeboom} and \textit{W. Dullaert}, Eur. J. Oper. Res. 275, No. 1, 93--107 (2019; Zbl 1430.90091) Full Text: DOI Link OpenURL
Wu, Chun; You, Xiaojian; Lü, Tao Research on multipath secure routing based on confidence degree. (Chinese. English summary) Zbl 1438.68005 J. Northeast Norm. Univ., Nat. Sci. Ed. 50, No. 4, 66-72 (2018). MSC: 68M10 68M20 68M25 PDF BibTeX XML Cite \textit{C. Wu} et al., J. Northeast Norm. Univ., Nat. Sci. Ed. 50, No. 4, 66--72 (2018; Zbl 1438.68005) Full Text: DOI OpenURL
Chen, Qianbin (ed.); Meng, Weixiao (ed.); Zhao, Liqiang (ed.) Communications and networking. 11th EAI international conference, ChinaCom 2016, Chongqing, China, September 24–26, 2016. Proceedings. Part I. (English) Zbl 1375.94010 Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 209. Cham: Springer (ISBN 978-3-319-66624-2/pbk; 978-3-319-66625-9/ebook). xxii, 516 p. (2018). MSC: 94-06 94A05 00B25 PDF BibTeX XML Cite \textit{Q. Chen} (ed.) et al., Communications and networking. 11th EAI international conference, ChinaCom 2016, Chongqing, China, September 24--26, 2016. Proceedings. Part I. Cham: Springer (2018; Zbl 1375.94010) Full Text: DOI OpenURL
Burstein, David; Kenter, Franklin; Kun, Jeremy; Shi, Feng Interception in distance-vector routing networks. (English) Zbl 1458.90187 J. Complex Netw. 5, No. 2, 179-198 (2017). MSC: 90B18 68M25 PDF BibTeX XML Cite \textit{D. Burstein} et al., J. Complex Netw. 5, No. 2, 179--198 (2017; Zbl 1458.90187) Full Text: DOI arXiv OpenURL
Liu, Hong; Xia, Weijun; Wang, Qitao A security and energy saving routing protocol of ad hoc network design. (Chinese. English summary) Zbl 1363.68006 J. Northeast Norm. Univ., Nat. Sci. Ed. 48, No. 2, 83-88 (2016). MSC: 68M10 68M12 PDF BibTeX XML Cite \textit{H. Liu} et al., J. Northeast Norm. Univ., Nat. Sci. Ed. 48, No. 2, 83--88 (2016; Zbl 1363.68006) Full Text: DOI OpenURL
Altman, Eitan; Singhal, Aniruddha; Touati, Corinne; Li, Jie Resilience of routing in parallel link networks. (English) Zbl 1453.91028 Zhu, Quanyan (ed.) et al., Decision and game theory for security. 7th international conference, GameSec 2016, New York, NY, USA, November 2–4, 2016. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 9996, 3-17 (2016). MSC: 91A43 91A05 68M10 68M25 PDF BibTeX XML Cite \textit{E. Altman} et al., Lect. Notes Comput. Sci. 9996, 3--17 (2016; Zbl 1453.91028) Full Text: DOI Link OpenURL
Reaz, Rezwana; Ali, Muqeet; Gouda, Mohamed G.; Heule, Marijn J. H.; Elmallah, Ehab S. The implication problem of computing policies. (English) Zbl 1428.68088 Pelc, Andrzej (ed.) et al., Stabilization, safety, and security of distributed systems. 17th international symposium, SSS 2015, Edmonton, AB, Canada, August 18–21, 2015. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 9212, 109-123 (2015). MSC: 68M25 68Q25 PDF BibTeX XML Cite \textit{R. Reaz} et al., Lect. Notes Comput. Sci. 9212, 109--123 (2015; Zbl 1428.68088) Full Text: DOI OpenURL
Hochbaum, Dorit S.; Lyu, Cheng; Ordóñez, Fernando Security routing games with multivehicle Chinese postman problem. (English) Zbl 1390.90167 Networks 64, No. 3, 181-191 (2014). MSC: 90B18 91A12 PDF BibTeX XML Cite \textit{D. S. Hochbaum} et al., Networks 64, No. 3, 181--191 (2014; Zbl 1390.90167) Full Text: DOI OpenURL
Michallet, Julien; Prins, Christian; Amodeo, Lionel; Yalaoui, Farouk; Vitry, Grégoire Multi-start iterated local search for the periodic vehicle routing problem with time windows and time spread constraints on services. (English) Zbl 1348.90112 Comput. Oper. Res. 41, 196-207 (2014). MSC: 90B06 90B10 PDF BibTeX XML Cite \textit{J. Michallet} et al., Comput. Oper. Res. 41, 196--207 (2014; Zbl 1348.90112) Full Text: DOI OpenURL
Lychev, Robert; Goldberg, Sharon; Schapira, Michael Brief announcement: Network-destabilizing attacks. (English) Zbl 1301.68044 Proceedings of the 2012 ACM symposium on principles of distributed computing, PODC ’12, Funchal, Portugal, July 16–18, 2012. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-1450-3). 331-332 (2012). MSC: 68M12 68M11 68R10 91B26 94A60 PDF BibTeX XML Cite \textit{R. Lychev} et al., in: Proceedings of the 31st ACM symposium on principles of distributed computing, PODC '12, Funchal, Portugal, July 16--18, 2012. New York, NY: Association for Computing Machinery (ACM). 331--332 (2012; Zbl 1301.68044) Full Text: DOI OpenURL
Clark, Andrew; Zhu, Quanyan; Poovendran, Radha; Başar, Tamer Deceptive routing in relay networks. (English) Zbl 1377.68018 Grossklags, Jens (ed.) et al., Decision and game theory for security. Third international conference, GameSec 2012, Budapest, Hungary, November 5–6, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-34265-3/pbk). Lecture Notes in Computer Science 7638, 171-185 (2012). MSC: 68M10 91A80 94A62 PDF BibTeX XML Cite \textit{A. Clark} et al., Lect. Notes Comput. Sci. 7638, 171--185 (2012; Zbl 1377.68018) Full Text: DOI OpenURL
Zhu, Peidong; Cao, Huayang; Yang, Laurence T.; Chen, Kan AS alliance based security enhancement for inter-domain routing protocol. (English) Zbl 1245.68026 Math. Comput. Modelling 55, No. 1-2, 241-255 (2012). MSC: 68M11 68M10 94A60 94A62 PDF BibTeX XML Cite \textit{P. Zhu} et al., Math. Comput. Modelling 55, No. 1--2, 241--255 (2012; Zbl 1245.68026) Full Text: DOI OpenURL
Cervera, Gimer; Barbeau, Michel; Garcia-Alfaro, Joaquin; Kranakis, Evangelos Preventing the cluster formation attack against the hierarchical OLSR protocol. (English) Zbl 1303.68049 Garcia-Alfaro, Joaquin (ed.) et al., Foundations and practice of security. 4th Canada-France MITACS workshop, FPS 2011, Paris, France, May 12–13, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-27900-3/pbk). Lecture Notes in Computer Science 6888, 118-131 (2012). MSC: 68P25 68M12 94A60 PDF BibTeX XML Cite \textit{G. Cervera} et al., Lect. Notes Comput. Sci. 6888, 118--131 (2012; Zbl 1303.68049) Full Text: DOI Link OpenURL
Li, Chun-Ta; Hwang, Min-Shiang A lightweight anonymous routing protocol without public key en/decryptions for wireless ad hoc networks. (English) Zbl 1251.68044 Inf. Sci. 181, No. 23, 5333-5347 (2011). MSC: 68M12 68P25 94A62 PDF BibTeX XML Cite \textit{C.-T. Li} and \textit{M.-S. Hwang}, Inf. Sci. 181, No. 23, 5333--5347 (2011; Zbl 1251.68044) Full Text: DOI OpenURL
Levin, Hagay; Schapira, Michael; Zohar, Aviv Interdomain routing and games. (English) Zbl 1233.91044 SIAM J. Comput. 40, No. 6, 1892-1912 (2011). MSC: 91A40 68M12 PDF BibTeX XML Cite \textit{H. Levin} et al., SIAM J. Comput. 40, No. 6, 1892--1912 (2011; Zbl 1233.91044) Full Text: DOI Link OpenURL
Rosenberg, Burton (ed.) Handbook of financial cryptography and security. (English) Zbl 1232.94001 Chapman & Hall/CRC Cryptography and Network Security. Boca Raton, FL: CRC Press (ISBN 978-1-4200-5981-6/hbk; 978-1-4200-5982-3/ebook). xxvi, 605 p. (2011). MSC: 94-00 68-00 68P25 91G99 94A60 94A62 PDF BibTeX XML Cite \textit{B. Rosenberg} (ed.), Handbook of financial cryptography and security. Boca Raton, FL: CRC Press (2011; Zbl 1232.94001) Full Text: DOI OpenURL
Ben Othman, Jalel; Mokdad, Lynda Enhancing data security in ad hoc networks based on multipath routing. (English) Zbl 1233.68042 J. Parallel Distrib. Comput. 70, No. 3, 309-316 (2010). MSC: 68M14 PDF BibTeX XML Cite \textit{J. Ben Othman} and \textit{L. Mokdad}, J. Parallel Distrib. Comput. 70, No. 3, 309--316 (2010; Zbl 1233.68042) Full Text: DOI OpenURL
Stavrou, Eliana; Pitsillides, Andreas A survey on secure multipath routing protocols in WSNs. (English) Zbl 1208.68063 Comput. Netw. 54, No. 13, 2215-2238 (2010). MSC: 68M10 68M12 PDF BibTeX XML Cite \textit{E. Stavrou} and \textit{A. Pitsillides}, Comput. Netw. 54, No. 13, 2215--2238 (2010; Zbl 1208.68063) Full Text: DOI OpenURL
Yu, Yao; Guo, Lei; Wang, Xingwei; Liu, Cuixiang Routing security scheme based on reputation evaluation in hierarchical ad hoc networks. (English) Zbl 1208.68067 Comput. Netw. 54, No. 9, 1460-1469 (2010). MSC: 68M10 PDF BibTeX XML Cite \textit{Y. Yu} et al., Comput. Netw. 54, No. 9, 1460--1469 (2010; Zbl 1208.68067) Full Text: DOI OpenURL
Meghanathan, Natarajan Design of a reliability-based source routing protocol for wireless mobile ad hoc networks. (English) Zbl 1207.68056 Meghanathan, Natarajan (ed.) et al., Recent trends in network security and applications. Third international conference, CNSA 2010, Chennai, India, July 23–25, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-14477-6/pbk; 978-3-642-14478-3/ebook). Communications in Computer and Information Science 89, 463-472 (2010). MSC: 68M10 68M12 PDF BibTeX XML Cite \textit{N. Meghanathan}, Commun. Comput. Inf. Sci. 89, 463--472 (2010; Zbl 1207.68056) Full Text: DOI OpenURL
Joseph, John Felix Charles; Das, Amitabha; Lee, Bu-Sung; Seet, Boon-Chong CARRADS: cross layer based adaptive real-time routing attack detection system for MANETS. (English) Zbl 1202.68031 Comput. Netw. 54, No. 7, 1126-1141 (2010). MSC: 68M10 PDF BibTeX XML Cite \textit{J. F. C. Joseph} et al., Comput. Netw. 54, No. 7, 1126--1141 (2010; Zbl 1202.68031) Full Text: DOI OpenURL
Pecho, Peter; Nagy, Jan; Hanáček, Petr; Drahanský, Martin Secure collection tree protocol for tamper-resistant wireless sensors. (English) Zbl 1200.68037 Ślęzak, D. (ed.) et al., Security technology. International conference, SecTech 2009, held as part of the future generation information technology conference, FGIT 2009, Jeju Island, Korea, December 10–12, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-10846-4/pbk; 978-3-642-10847-1/ebook). Communications in Computer and Information Science 58, 217-224 (2010). MSC: 68M10 68P25 PDF BibTeX XML Cite \textit{P. Pecho} et al., Commun. Comput. Inf. Sci. 58, 217--224 (2010; Zbl 1200.68037) Full Text: DOI OpenURL
Toubiana, Vincent; Labiod, Houda; Reynaud, Laurent; Gourhant, Yvon A global security architecture for operated hybrid WLAN mesh networks. (English) Zbl 1185.68051 Comput. Netw. 54, No. 2, 218-230 (2010). MSC: 68M10 PDF BibTeX XML Cite \textit{V. Toubiana} et al., Comput. Netw. 54, No. 2, 218--230 (2010; Zbl 1185.68051) Full Text: DOI OpenURL
Misra, Sudip (ed.); Misra, Subhas Chandra (ed.); Woungang, Isaac (ed.) Selected topics in communication networks and distribution systems. (English) Zbl 1209.68018 Hackensack, NJ: World Scientific (ISBN 978-981-283-943-5/hbk; 978-981-283-944-2/ebook). vii, 799 p. (2010). MSC: 68M10 68M12 68-06 68M20 68M14 68M15 PDF BibTeX XML Cite \textit{S. Misra} (ed.) et al., Selected topics in communication networks and distribution systems. Hackensack, NJ: World Scientific (2010; Zbl 1209.68018) OpenURL
Wei, Yawen; Yu, Zhen; Guan, Yong A novel architecture for secure and scalable multicast over IP network. (English) Zbl 1184.68081 Chen, Yan (ed.) et al., Security and privacy in communication networks. 5th international ICST conference, SecureComm 2009, Athens, Greece, September 14–18, 2009. Revised selected papers. Berlin: Springer (ISBN 978-3-642-05283-5/pbk; 978-3-642-05284-2/ebook). Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering 19, 417-436 (2009). MSC: 68M11 68M12 PDF BibTeX XML Cite \textit{Y. Wei} et al., in: Security and privacy in communication networks. 5th international ICST conference, SecureComm 2009, Athens, Greece, September 14--18, 2009. Revised selected papers. Berlin: Springer. 417--436 (2009; Zbl 1184.68081) Full Text: DOI OpenURL
Bazzi, Rida A.; Choi, Young-Ri; Gouda, Mohamed G. Hop chains: Secure routing and the establishment of distinct identities. (English) Zbl 1157.68011 Theor. Comput. Sci. 410, No. 6-7, 467-480 (2009). MSC: 68M10 68M12 PDF BibTeX XML Cite \textit{R. A. Bazzi} et al., Theor. Comput. Sci. 410, No. 6--7, 467--480 (2009; Zbl 1157.68011) Full Text: DOI OpenURL
Zhu, Cheng; Zhou, Ming-zheng; Xu, Jin-sheng BTSR: Secure data fusion and routing algorithm based on behavior trust. (Chinese. English summary) Zbl 1171.68347 J. Comput. Appl. 28, No. 11, 2820-2823 (2008). MSC: 68M10 PDF BibTeX XML Cite \textit{C. Zhu} et al., J. Comput. Appl. 28, No. 11, 2820--2823 (2008; Zbl 1171.68347) Full Text: DOI OpenURL
Szczerbicki, Edward; Nguyen, Ngoc Thanh Editorial: Information and knowledge engineering for intelligent systems. II. (English) Zbl 1173.93301 Cybern. Syst. 39, No. 7, 669-671 (2008). MSC: 93-06 93C85 68T40 PDF BibTeX XML Cite \textit{E. Szczerbicki} and \textit{N. T. Nguyen}, Cybern. Syst. 39, No. 7, 669--671 (2008; Zbl 1173.93301) Full Text: DOI OpenURL
Kurose, James F; Ross, Keith W. Computer networks. The top-down approach. 4th revised ed. (Computernetzwerke. Der Top-Down-Ansatz.) (German) Zbl 1161.68007 München: Pearson Studium (ISBN 978-3-8273-7330-4/hbk). 896 p. (2008). Reviewer: Antoni Michalski (Warszawa) MSC: 68M10 68M12 68-01 PDF BibTeX XML Cite \textit{J. F Kurose} and \textit{K. W. Ross}, Computernetzwerke. Der Top-Down-Ansatz. 4th revised ed. München: Pearson Studium (2008; Zbl 1161.68007) OpenURL
Chen, Hong-Song; Zhang, Jianyu; Lee, H. W. J. A novel NP-based security scheme for AODV routing protocol. (English) Zbl 1173.68322 J. Discrete Math. Sci. Cryptography 11, No. 2, 131-145 (2008). MSC: 68M10 PDF BibTeX XML Cite \textit{H.-S. Chen} et al., J. Discrete Math. Sci. Cryptography 11, No. 2, 131--145 (2008; Zbl 1173.68322) Full Text: DOI OpenURL
Feigenbaum, Joan; Johnson, Aaron; Syverson, Paul A model of onion routing with provable anonymity. (English) Zbl 1195.68023 Dietrich, Sven (ed.) et al., Financial cryptography and data security. 11th international conference, FC 2007, and 1st international workshop on usable security, USEC 2007, Scarborough, Trinidad and Tobago, February 12–16, 2007. Revised selected papers. Berlin: Springer (ISBN 978-3-540-77365-8/pbk). Lecture Notes in Computer Science 4886, 57-71 (2008). MSC: 68M12 68Q45 94A62 PDF BibTeX XML Cite \textit{J. Feigenbaum} et al., Lect. Notes Comput. Sci. 4886, 57--71 (2008; Zbl 1195.68023) Full Text: DOI OpenURL
Wong, Edmund L.; Balasubramanian, Praveen; Alvisi, Lorenzo; Gouda, Mohamed G.; Shmatikov, Vitaly Truth in advertising, lightweight verification of route integrity. (English) Zbl 1283.68060 Proceedings of the 26th annual ACM symposium on principles of distributed computing, PODC ’07, Portland, OR, USA, August 12–15, 2007. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-59593-616-5). 147-156 (2007). MSC: 68M10 68M11 94A60 PDF BibTeX XML Cite \textit{E. L. Wong} et al., in: Proceedings of the 26th annual ACM symposium on principles of distributed computing, PODC '07, Portland, OR, USA, August 12--15, 2007. New York, NY: Association for Computing Machinery (ACM). 147--156 (2007; Zbl 1283.68060) Full Text: DOI OpenURL
Lee, Kang-Won; Chari, Suresh; Shaikh, Anees; Sahu, Sambit; Cheng, Pau-Chen Improving the resilience of content distribution networks to large scale distributed denial of service attacks. (English) Zbl 1120.68032 Comput. Netw. 51, No. 10, 2753-2770 (2007). MSC: 68M14 PDF BibTeX XML Cite \textit{K.-W. Lee} et al., Comput. Netw. 51, No. 10, 2753--2770 (2007; Zbl 1120.68032) Full Text: DOI OpenURL
Tsai, Yuh-Ren; Wang, Shiuh-Jeng Two-tier authentication for cluster and individual sets in mobile ad hoc networks. (English) Zbl 1152.68367 Comput. Netw. 51, No. 3, 883-900 (2007). MSC: 68M10 PDF BibTeX XML Cite \textit{Y.-R. Tsai} and \textit{S.-J. Wang}, Comput. Netw. 51, No. 3, 883--900 (2007; Zbl 1152.68367) Full Text: DOI OpenURL
Hu, Fei; Siddiqui, Waqaas; Sankar, Krishna Scalable security in Wireless Sensor and Actuator Networks (WSANs): integration re-keying with routing. (English) Zbl 1118.68007 Comput. Netw. 51, No. 1, 285-308 (2007). MSC: 68M10 PDF BibTeX XML Cite \textit{F. Hu} et al., Comput. Netw. 51, No. 1, 285--308 (2007; Zbl 1118.68007) Full Text: DOI OpenURL
Chen, Jing; Cui, Guohua A partially non-cryptographic security routing protocol in mobile ad hoc networks. (English) Zbl 1115.68343 Wuhan Univ. J. Nat. Sci. 11, No. 6, 1781-1784 (2006). MSC: 68M12 PDF BibTeX XML Cite \textit{J. Chen} and \textit{G. Cui}, Wuhan Univ. J. Nat. Sci. 11, No. 6, 1781--1784 (2006; Zbl 1115.68343) Full Text: DOI OpenURL
Ren, Kui; Lou, Wenjing; Zeng, Kai; Bao, Feng; Zhou, Jianying; Deng, Robert H. Routing optimization security in mobile IPv6. (English) Zbl 1113.68022 Comput. Netw. 50, No. 13, 2401-2419 (2006). MSC: 68M10 PDF BibTeX XML Cite \textit{K. Ren} et al., Comput. Netw. 50, No. 13, 2401--2419 (2006; Zbl 1113.68022) Full Text: DOI OpenURL
Mühl, Gero; Fiege, Ludger; Pietzuch, Peter R. Distributed event-based systems. (English) Zbl 1116.68017 Berlin: Springer (ISBN 3-540-32651-0/hbk). xix, 385 p. (2006). Reviewer: Tudor Bălănescu (Pitesti) MSC: 68M14 68N19 68-01 PDF BibTeX XML Cite \textit{G. Mühl} et al., Distributed event-based systems. Berlin: Springer (2006; Zbl 1116.68017) OpenURL
McDaniel, Patrick; Aiello, William; Butler, Kevin; Ioannidis, John Origin authentication in interdomain routing. (English) Zbl 1102.68360 Comput. Netw. 50, No. 16, 2953-2980 (2006). MSC: 68M10 94A62 PDF BibTeX XML Cite \textit{P. McDaniel} et al., Comput. Netw. 50, No. 16, 2953--2980 (2006; Zbl 1102.68360) Full Text: DOI OpenURL
Nie, Jing; Wen, Jiangchua; Luo, Ji; He, Xin; Zhou, Zheng An adaptive fuzzy logic based secure routing protocol in mobile ad hoc networks. (English) Zbl 1095.68538 Fuzzy Sets Syst. 157, No. 12, 1704-1712 (2006). MSC: 68M12 PDF BibTeX XML Cite \textit{J. Nie} et al., Fuzzy Sets Syst. 157, No. 12, 1704--1712 (2006; Zbl 1095.68538) Full Text: DOI OpenURL
Reddy, T. Bheemarjuna; Sriram, S.; Manoj, B. S.; Murthy, C. Siva Ram MuSeQoR: multi-path failure-tolerant security-aware QoS routing in ad hoc wireless networks. (English) Zbl 1092.68009 Comput. Netw. 50, No. 9, 1349-1383 (2006). MSC: 68M10 68M12 PDF BibTeX XML Cite \textit{T. B. Reddy} et al., Comput. Netw. 50, No. 9, 1349--1383 (2006; Zbl 1092.68009) Full Text: DOI OpenURL
Alkahtani, Abdullah M. S.; Woodward, M. E.; Al-Begain, K. Prioritised best effort routing with four quality of service metrics applying the concept of the analytic hierarchy process. (English) Zbl 1077.90510 Comput. Oper. Res. 33, No. 3, 559-580 (2006). MSC: 90B18 90B50 68M10 PDF BibTeX XML Cite \textit{A. M. S. Alkahtani} et al., Comput. Oper. Res. 33, No. 3, 559--580 (2006; Zbl 1077.90510) Full Text: DOI OpenURL
Akyildiz, Ian F.; Wang, Xudong; Wang, Weilin Wireless mesh networks: a survey. (English) Zbl 1152.68319 Comput. Netw. 47, No. 4, 445-487 (2005). MSC: 68M10 PDF BibTeX XML Cite \textit{I. F. Akyildiz} et al., Comput. Netw. 47, No. 4, 445--487 (2005; Zbl 1152.68319) Full Text: DOI OpenURL
Wan, Tao; Kranakis, Evangelos; van Oorschot, Paul C. Securing the destination-sequenced distance vector routing protocol (S-DSDV). (English) Zbl 1109.68488 Lopez, Javier (ed.) et al., Information and communications security. 6th international conference, ICICS 2004, Malaga, Spain, October 27–29, 2004. Proceedings. Berlin: Springer (ISBN 3-540-23563-9/pbk). Lecture Notes in Computer Science 3269, 358-374 (2004). MSC: 68P25 68M12 PDF BibTeX XML Cite \textit{T. Wan} et al., Lect. Notes Comput. Sci. 3269, 358--374 (2004; Zbl 1109.68488) Full Text: DOI OpenURL
Wan, Tao; Kranakis, Evangelos; van Oorschot, Paul C. S-RIP: A secure distance vector routing protocol. (English) Zbl 1103.68540 Jakobsson, Markus (ed.) et al., Applied cryptography and network security. Second international conference, ACNS 2004, Yellow Mountain, China, June 8–11, 2004. Proceedings. Berlin: Springer (ISBN 3-540-22217-0/pbk). Lecture Notes in Computer Science 3089, 103-119 (2004). MSC: 68P25 94A60 94A62 PDF BibTeX XML Cite \textit{T. Wan} et al., Lect. Notes Comput. Sci. 3089, 103--119 (2004; Zbl 1103.68540) Full Text: DOI OpenURL
Dul’kejt, V. I.; Lavrov, D. N.; Mikhajlov, P. I.; Svench, A. A. Analysis of reliability of an algorithm for decomposing a secret for data flows in a network. (Russian. English summary) Zbl 1055.68053 Mat. Strukt. Model. 12, 146-154 (2003). Reviewer: V. F. Murzina (Novosibirsk) MSC: 68P25 68M12 PDF BibTeX XML Cite \textit{V. I. Dul'kejt} et al., Mat. Strukt. Model. 12, 146--154 (2003; Zbl 1055.68053) OpenURL
Venkatraman, Lakshmi; Agrawal, Dharma P. Strategies for enhancing routing security in protocols for mobile ad hoc networks. (English) Zbl 1055.68015 J. Parallel Distrib. Comput. 63, No. 2, 214-227 (2003). MSC: 68M12 68M10 PDF BibTeX XML Cite \textit{L. Venkatraman} and \textit{D. P. Agrawal}, J. Parallel Distrib. Comput. 63, No. 2, 214--227 (2003; Zbl 1055.68015) Full Text: DOI OpenURL
Wolfler Calvo, R.; Cordone, R. A heuristic approach to the overnight security service problem. (English) Zbl 1026.90018 Comput. Oper. Res. 30, No. 9, 1269-1287 (2003). MSC: 90B22 PDF BibTeX XML Cite \textit{R. Wolfler Calvo} and \textit{R. Cordone}, Comput. Oper. Res. 30, No. 9, 1269--1287 (2003; Zbl 1026.90018) Full Text: DOI OpenURL
Lavrov, D. N. A scheme of decomposing a secret for data flows in a routed network. (Russian. English summary) Zbl 1041.68034 Mat. Strukt. Model. 10, 192-197 (2002). MSC: 68P25 68M12 PDF BibTeX XML Cite \textit{D. N. Lavrov}, Mat. Strukt. Model. 10, 192--197 (2002; Zbl 1041.68034) OpenURL
Dittler, Hans-Peter IPv6 - the new protocol of Internet. Technology, application, migration. 2., aktualis. u. erweit. Aufl. (IPv6 - das neue Internetprotokoll. Technik, Anwendung, Migration.) (German) Zbl 1001.68008 Heidelberg: dpunkt.verlag. 270 S. (2002). Reviewer: Winfried Kalfa (Chemnitz) MSC: 68M12 68-01 68M10 PDF BibTeX XML Cite \textit{H.-P. Dittler}, IPv6 - das neue Internetprotokoll. Technik, Anwendung, Migration. 2., aktualis. u. erweit. Aufl. Heidelberg: dpunkt.verlag (2002; Zbl 1001.68008) OpenURL
Binkley, Jim; Trost, William Authenticated ad hoc routing at the link layer for mobile systems. (English) Zbl 1030.68596 Wireless Networks 7, No. 2, 139-145 (2001). MSC: 68U99 68M10 PDF BibTeX XML Cite \textit{J. Binkley} and \textit{W. Trost}, Wirel. Netw. 7, No. 2, 139--145 (2001; Zbl 1030.68596) Full Text: DOI OpenURL
Comer, Douglas E. Internetworking with TCP/IP. Vol. I: Principles, protocols and architecture. 3rd ed. (English) Zbl 0827.68003 Englewood Cliffs, NJ: Prentice Hall. xxv, 613 p. (1995). MSC: 68M10 68-02 PDF BibTeX XML Cite \textit{D. E. Comer}, Internetworking with TCP/IP. Vol. I: Principles, protocols and architecture. 3rd ed. Englewood Cliffs, NJ: Prentice Hall (1995; Zbl 0827.68003) OpenURL
Beauchamp, Kenneth G. (ed.) New advances in distributed computer systems. Proceedings of the NATO Advanced Study Institute held at Bonas, France, June 15-26, 1981. (English) Zbl 0487.68002 NATO Advanced Study Institutes Series, Series C - Mathematical and Physical Sciences, Vol. 80. Published in Cooperation with NATO Affairs Division. Dordrecht - Boston - London: D. Reidel Publishing Company. X, 415 p. Dfl. 110.00 (1982). MSC: 68-06 68N99 PDF BibTeX XML OpenURL
Serreault, Jean-Yves; Minoux, Michel Le programme d’admissibilite avec contraintes de securite et couts de mutations: application aux réseaux de transmission mixtes (analogiques et numériques). (French) Zbl 0423.90016 Ann. Télécommun. 35, 23-38 (1980). MSC: 90B10 94C05 PDF BibTeX XML Cite \textit{J.-Y. Serreault} and \textit{M. Minoux}, Ann. Télécommun. 35, 23--38 (1980; Zbl 0423.90016) OpenURL