13.07.2015 Views

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

150 J. Zhen and S. Sr<strong>in</strong>ivas16. Y. Hu, A. Perrig and D. B. Johnson, “Packet Leashes: A Defense Aga<strong>in</strong>st WormholeAttacks <strong>in</strong> Wireless Ad Hoc Networks,” Technical Report TR01-384, RiceUniversity Department of <strong>Computer</strong> <strong>Science</strong>, Dec. 2001.17. Y. Yi, S. Lee, W. Su and M. Gerla, “On-Demand Multicast Rout<strong>in</strong>g Protocol(ODMRP) for Ad Hoc Networks,” draft-ietf-manet-odmrp-04.txt, Feb. 2003.18. H. Deng, W. Li, and Dharma P. Agrawal, “Rout<strong>in</strong>g Security <strong>in</strong> Ad Hoc Networks”,IEEE Communications Magaz<strong>in</strong>e, Special Topics on Security <strong>in</strong> TelecommunicationNetworks, Vol. 40, No. 10, October 2002, pp. 70-75.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!