|
[1] Pirzada, A.A.; McDonald, C.” Secure Routing with the AODV Protocol” Communications, 2005 Asia-Pacific Conference on 03-05 Oct. 2005 Page(s):57 – 61
[2] B. Dahill, B. N. Levine, E. Royer, and C. Shields, “A secure routing protocolfor ad hoc networks,” Proceedings of the International Conferenceon Network Protocols (ICNP), pp. 78–87, 2002.
[3] S. Corson and J. Macker, “Mobile ad-hoc networking (manet): Routing protocol performance issues and evaluation considerations,” IETF MANET, RFC 2501, 1999.
[4] C. Perkins, E. Belding-Royer, and S. Das, “Ad hoc on-demand distance vector (aodv) routing,” IETF RFC 3591, 2003.
[5] W. Wang, Y. Lu, and B. Bhargava, “On vulnerability and protection of ad hoc on-demand distance vector protocol,” Proceedings of the International Conference on Telecommunication (ICT), pp. 375–382, 2003.
[6] E. Konstantinou, Y.C. Stamatiou, and C. Zaroliagis,“On the Use of Weber Polynomials in Elliptic CurveCryptography”, In Proc. European PKI Workshop 2004,LNCS 3093, Springer Verlag, June 2004, pp. 335-349.
[7] Patroklos G. Argyroudis , Raja Verma , Hitesh Tewari , Donal O’Mahony, “Performance Analysis of Cryptographic Protocols on Handheld Devices”, Networks and Telecommunications Research Group Department of Computer Science University of Dublin, Trinity College , NCA 2004, pp. 169-174
|