Abstract is missing.
- Securing ad hoc routing protocolsManel Guerrero Zapata, N. Asokan. 1-10 [doi]
- Self-organized network-layer security in mobile ad hoc networksHao Yang, Xiaoqiao Meng, Songwu Lu. 11-20 [doi]
- An on-demand secure routing protocol resilient to byzantine failuresBaruch Awerbuch, David Holmer, Cristina Nita-Rotaru, Herbert Rubens. 21-30 [doi]
- Survivable mobile wireless networks: issues, challenges, and research directionsJames P. G. Sterbenz, Rajesh Krishnan, Regina Hain, Alden W. Jackson, David Levin, Ram Ramanathan, John Zao. 31-40 [doi]
- Secure wireless gatewayAustin Godber, Partha Dasgupta. 41-46 [doi]
- DoS and authentication in wireless public access networksDaniel B. Faria, David R. Cheriton. 47-56 [doi]
- A distributed monitoring mechanism for wireless sensor networksChih-fan Hsin, Mingyan Liu. 57-66 [doi]
- Using signal processing to analyze wireless data trafficCraig Partridge, David Cousins, Alden W. Jackson, Rajesh Krishnan, Tushar Saxena, W. Timothy Strayer. 67-76 [doi]
- Securing IPv6 neighbor and router discoveryJari Arkko, Tuomas Aura, James Kempf, Vesa-Matti Mäntylä, Pekka Nikander, Michael Roe. 77-86 [doi]
- Performance analysis of elliptic curve cryptography for SSLVipul Gupta, Sumit Gupta, Sheueling Chang Shantz, Douglas Stebila. 87-94 [doi]