Packet leashes: a defense against wormhole attacks in wireless networks
Top Cited Papers
- 1 March 2004
- proceedings article
- Published by Institute of Electrical and Electronics Engineers (IEEE)
- Vol. 3, 1976-1986
- https://doi.org/10.1109/infcom.2003.1209219
Abstract
No abstract availableThis publication has 23 references indexed in Scilit:
- Securing the Nimrod routing architecturePublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- SPINSPublished by Association for Computing Machinery (ACM) ,2001
- The quest for security in mobile ad hoc networksPublished by Association for Computing Machinery (ACM) ,2001
- Next century challengesPublished by Association for Computing Machinery (ACM) ,1999
- Securing ad hoc networksIEEE Network, 1999
- How to prove where you arePublished by Association for Computing Machinery (ACM) ,1998
- Efficient signature generation by smart cardsJournal of Cryptology, 1991
- How to construct random functionsJournal of the ACM, 1986
- Theory of Spread-Spectrum Communications - A TutorialIEEE Transactions on Communications, 1982
- A method for obtaining digital signatures and public-key cryptosystemsCommunications of the ACM, 1978