A performance comparison of multi-hop wireless ad hoc network routing protocols J Broch, DA Maltz, DB Johnson, YC Hu, J Jetcheva Proceedings of the 4th annual ACM/IEEE international conference on Mobile …, 1998 | 7531 | 1998 |
The dynamic source routing protocol (DSR) for mobile ad hoc networks for IPv4 D Johnson, YC Hu, DA Maltz RFC 4728, 2007 | 6903* | 2007 |
Packet leashes: a defense against wormhole attacks in wireless networks YC Hu, A Perrig, DB Johnson IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE …, 2003 | 3738* | 2003 |
Ariadne: A secure on-demand routing protocol for ad hoc networks YC Hu, A Perrig, DB Johnson Proceedings of the 8th annual international conference on Mobile computing …, 2002 | 3476 | 2002 |
SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks YC Hu, DB Johnson, A Perrig Ad hoc networks 1 (1), 175-192, 2003 | 2112 | 2003 |
Rushing attacks and defense in wireless ad hoc network routing protocols YC Hu, A Perrig, DB Johnson Proceedings of the 2nd ACM workshop on Wireless security, 30-40, 2003 | 1053 | 2003 |
A survey of secure wireless ad hoc routing H Yih-Chun, A Perrig IEEE Security & Privacy 2 (3), 28-39, 2004 | 896 | 2004 |
Caching strategies in on-demand routing protocols for wireless ad hoc networks YC Hu, DB Johnson Proceedings of the 6th annual international conference on Mobile computing …, 2000 | 529 | 2000 |
SPV: Secure path vector routing for securing BGP YC Hu, A Perrig, M Sirbu Proceedings of the 2004 conference on Applications, technologies …, 2004 | 306 | 2004 |
Portcullis: Protecting connection setup from denial-of-capability attacks B Parno, D Wendlandt, E Shi, A Perrig, B Maggs, YC Hu ACM SIGCOMM Computer Communication Review 37 (4), 289-300, 2007 | 288 | 2007 |
Preserving location privacy in wireless LANs T Jiang, HJ Wang, YC Hu Proceedings of the 5th international conference on Mobile systems …, 2007 | 261 | 2007 |
A simple protocol for multicast and broadcast in mobile ad hoc networks J Jetcheva IETF Internet-Draft, draft-ietf-manet-simple-mbcast-01. txt, 2001 | 250 | 2001 |
Efficient Security Mechanisms for Routing Protocolsa. YC Hu, A Perrig, DB Johnson Ndss, 2003 | 246 | 2003 |
Design and evaluation of a metropolitan area multitier wireless ad hoc network architecture Jetcheva, PalChaudhuri, Saha 2003 Proceedings Fifth IEEE Workshop on Mobile Computing Systems and …, 2003 | 229 | 2003 |
Security certificate revocation list distribution for VANET KP Laberteaux, JJ Haas, YC Hu Proceedings of the fifth ACM international workshop on VehiculAr Inter …, 2008 | 200 | 2008 |
Cross-layer jamming detection and mitigation in wireless broadcast networks JT Chiang, YC Hu Proceedings of the 13th annual ACM international conference on Mobile …, 2007 | 195 | 2007 |
Lightweight source authentication and path validation THJ Kim, C Basescu, L Jia, SB Lee, YC Hu, A Perrig Proceedings of the 2014 ACM Conference on SIGCOMM, 271-282, 2014 | 182 | 2014 |
Efficient constructions for one-way hash chains YC Hu, M Jakobsson, A Perrig Applied Cryptography and Network Security: Third International Conference …, 2005 | 163 | 2005 |
Design and analysis of a lightweight certificate revocation mechanism for VANET JJ Haas, YC Hu, KP Laberteaux Proceedings of the sixth ACM international workshop on VehiculAr …, 2009 | 161 | 2009 |
Secure and precise location verification using distance bounding and simultaneous multilateration JT Chiang, JJ Haas, YC Hu Proceedings of the second ACM conference on Wireless network security, 181-192, 2009 | 144 | 2009 |