-
4
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
Boston, MA, Aug. [Online]. Available
-
S. Marti, T. Giuli, K. Lai, and M. Baker, "Mitigating routing misbehavior in mobile ad hoc networks," in Proceedings of The Sixth International Conference on Mobile Computing and Networking 2000, Boston, MA, Aug. 2000. [Online]. Available: http://gunpowder.stanford.edu/~laik/projects/ adhoc/mitigating.pdf
-
(2000)
Proceedings of the Sixth International Conference on Mobile Computing and Networking 2000
-
-
Marti, S.1
Giuli, T.2
Lai, K.3
Baker, M.4
-
7
-
-
0037885580
-
Nodes bearing grudges: Towards routing security, fairness, and robustness in mobile ad hoc networks
-
S. Buchegger and J.-Y. L. Boudec, "Nodes bearing grudges: Towards routing security, fairness, and robustness in mobile ad hoc networks," in 10th Euromicro Workshop on Parallel, Distributed and Network-based Processing, 2002.
-
(2002)
10th Euromicro Workshop on Parallel, Distributed and Network-based Processing
-
-
Buchegger, S.1
Boudec, J.-Y.L.2
-
8
-
-
0242696192
-
Performance analysis of the CONFIDANT protocol: Cooperation of nodes - Fairness in dynamic ad-hoc networks
-
IEEE, June [Online]. Available
-
S. Buchegger and J.-Y. L. Boudec, "Performance analysis of the CONFIDANT protocol: Cooperation of nodes - fairness in dynamic ad-hoc networks," in Proceedings of IEEE/ACM Workshop on Mobile Ad Hoc Networking and Computing (MobiHOC). IEEE, June 2002. [Online]. Available: http://lcawww.epfl.ch/Publications/LeBoudec/BucheggerL02.pdf
-
(2002)
Proceedings of IEEE/ACM Workshop on Mobile Ad Hoc Networking and Computing (MobiHOC)
-
-
Buchegger, S.1
Boudec, J.-Y.L.2
-
11
-
-
0036346205
-
Energy efficient communications in ad hoc networks using directional antennas
-
New York, NY, June [Online]. Available
-
A. Spyropoulos and C. Raghavendra, "Energy efficient communications in ad hoc networks using directional antennas," in Proceedings of IEEE INFOCOM '02, New York, NY, June 2002. [Online]. Available: http://www.ieee- infocom.org/2002/papers/289.pdf
-
(2002)
Proceedings of IEEE INFOCOM '02
-
-
Spyropoulos, A.1
Raghavendra, C.2
-
12
-
-
0036349202
-
Energy-limited wireless networking with directional antennas: The case of session-based multicasting
-
New York, NY, June [Online]. Available
-
J. E. Wieselthier, G. Nguyen, and A. Ephremides, "Energy-limited wireless networking with directional antennas: The case of session-based multicasting," in Proceedings of IEEE INFOCOM '02, New York, NY, June 2002. [Online]. Available: http://www.ieee-infocom.org/2002/papers/303.pdf
-
(2002)
Proceedings of IEEE INFOCOM '02
-
-
Wieselthier, J.E.1
Nguyen, G.2
Ephremides, A.3
-
13
-
-
0042209739
-
A micropayment scheme encouraging collaboration in multi-hop cellular networks
-
La Guadeloupe, January
-
M. Jakobsson, J. P. Hubaux, and L. Buttyan, "A micropayment scheme encouraging collaboration in multi-hop cellular networks," in Proceedings of Financial Crypto 2003, La Guadeloupe, January 2003.
-
(2003)
Proceedings of Financial Crypto 2003
-
-
Jakobsson, M.1
Hubaux, J.P.2
Buttyan, L.3
-
14
-
-
0034590144
-
Towards mobile ad-hoc WANs: Terminodes
-
Chicago, IL, September [Online]. Available
-
J. P. Hubaux, J. Y L. Boudec, S. Giordano, M. Hamdi, L. Blazevic, L. Buttyan, and M. Vojnovic, "Towards mobile ad-hoc WANs: Terminodes," in Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC), Chicago, IL, September 2000. [Online]. Available: http://www.terminodes. com/mics/getDoc.php?sessid=003b3dfc72e02704e92bee%31b2460643"&docid= 32"&docnum=1
-
(2000)
Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC)
-
-
Hubaux, J.P.1
Boudec, J.Y.L.2
Giordano, S.3
Hamdi, M.4
Blazevic, L.5
Buttyan, L.6
Vojnovic, M.7
-
15
-
-
0035101078
-
Towards self-organized mobile ad hoc networks: The terminodes project
-
January [Online]. Available
-
J. P. Hubaux, T. Gross, J. Y. L. Boudec, and M. Vetterli, "Towards self-organized mobile ad hoc networks: the Terminodes project," IEEE Communications Magazine, January 2001. [Online]. Available: http://www. terminodes.com/mics/getDoc.php?sessid=003b3dfc72e02704e92bee%31b2460643" &docid=31"&docnum=1
-
(2001)
IEEE Communications Magazine
-
-
Hubaux, J.P.1
Gross, T.2
Boudec, J.Y.L.3
Vetterli, M.4
-
16
-
-
0035789229
-
The quest for security in mobile ad hoc networks
-
Long Beach, CA, October
-
J. P. Hubaux, L. Buttyan, and S. Capkun, "The quest for security in mobile ad hoc networks," in Proceedings of ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC), Long Beach, CA, October 2001.
-
(2001)
Proceedings of ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC)
-
-
Hubaux, J.P.1
Buttyan, L.2
Capkun, S.3
-
19
-
-
0034836562
-
Algorithms, games, and the internet
-
C. H. Papadimitriou, "Algorithms, games, and the Internet," in Proceedings of the 33rd annual symposium on Theory of computing 2001, 2001, pp. 749-753. (Pubitemid 32865793)
-
(2001)
Conference Proceedings of the Annual ACM Symposium on Theory of Computing
, pp. 749-753
-
-
Papadimitriou, C.H.1
-
20
-
-
0035175911
-
Vickrey prices and shortest paths: What is an edge worth?
-
J. Hershberger and S. Suri, "Vickrey prices and shortest paths: What is an edge worth," in Proceedings of the 42nd Annual Symposium on Foudations of Computer Science 2001, Las Vegas, Nevada, Oct. 2001, pp. 252-259. [Online]. Available: http://theory.stanford.edu/focs2001/ (Pubitemid 33068385)
-
(2001)
Annual Symposium on Foundations of Computer Science - Proceedings
, pp. 252-259
-
-
Hershberger, J.1
Suri, S.2
-
21
-
-
0035416195
-
Sharing the cost of multicast transmissions
-
DOI 10.1006/jcss.2001.1754, Internet Algorithms
-
J. Feigenbaum, C. Papadimitriou, and S. Shenker, "Sharing the cost of multicast transmissions," Journal of Computer and System Sciences (Special issue on Internet Algorithms.), vol. 63, pp. 21-41, 2001. [Online]. Available: http://cs-www.cs.yale.edu/homes/jf/FPS.pdf (Pubitemid 32932560)
-
(2001)
Journal of Computer and System Sciences
, vol.63
, Issue.1
, pp. 21-41
-
-
Feigenbaum, J.1
Papadimitriou, C.H.2
Shenker, S.3
-
22
-
-
0043211983
-
Incentives in peer-to-peer file sharing
-
Tampa, FL, October
-
P. Golle, K. Leyton-Brown, and I. Mironov, "Incentives in peer-to-peer file sharing," in Proceedings of the ACM Symposium on Electronic Commerce (EC 01) 2001, Tampa, FL, October 2001.
-
(2001)
Proceedings of the ACM Symposium on Electronic Commerce (EC 01) 2001
-
-
Golle, P.1
Leyton-Brown, K.2
Mironov, I.3
-
23
-
-
0036957186
-
A BGP-based mechanism for lowest-cost routing
-
[Online]. Available
-
J. Feigenbaum, C. Papadimitriou, R. Sami, and S. Shenker, "A BGP-based mechanism for lowest-cost routing," in Proceedings of the 2002 ACM Symposium on Principles of Distributed Computing., 2002. [Online]. Available: http://cs-www.cs.yale.edu/homes/jf/FPSS.pdf
-
(2002)
Proceedings of the 2002 ACM Symposium on Principles of Distributed Computing
-
-
Feigenbaum, J.1
Papadimitriou, C.2
Sami, R.3
Shenker, S.4
-
24
-
-
0038183237
-
How bad is selfish routing?
-
DOI 10.1145/506147.506153
-
T. Roughgarden and E. Tardos, "How bad is selfish routing?" Journal of ACM, vol. 49, no. 2, pp. 236-259, 2002. (Pubitemid 44159321)
-
(2002)
Journal of the ACM
, vol.49
, Issue.2
, pp. 236-259
-
-
Roughgarden, T.1
Tardos, E.2
-
25
-
-
0011317224
-
Vertical handoffs in wireless overlay networks
-
M. Stemm and R. H. Katz, "Vertical handoffs in wireless overlay networks," Mobile Networks and Applications, vol. 3, no. 4, pp. 335-350, 1998. [Online]. Available: http://citeseer.nj.nec.com/stemm96vertical.html (Pubitemid 128513929)
-
(1998)
Mobile Networks and Applications
, vol.3
, Issue.4
, pp. 335-350
-
-
Stemm, M.1
Katz, R.H.2
-
26
-
-
0033357103
-
Securing ad hoc networks
-
[Online]. Available
-
L. Zhou and Z. J. Haas, "Securing ad hoc networks," IEEE Network Magazine, 1999. [Online]. Available: http://citeseer.nj.nec.com/cache/ papers/cs/16984/http:zSzzSzwww.ee.corn%ell. eduzSz~haaszSzPublicationszSznetwork99.pdf/zhou99securing.pdf
-
(1999)
IEEE Network Magazine
-
-
Zhou, L.1
Haas, Z.J.2
-
27
-
-
84883869163
-
Self-securing ad-hoc wireless networks
-
[Online]. Available
-
H. Luo, P. Zerfos, J. Kong, S. Lu, and L. Zhang, "Self-securing ad-hoc wireless networks," in ISCC, 2002. [Online]. Available: http://www.cs.ucla.edu/~jkong/publications/ISCC02.pdf
-
(2002)
ISCC
-
-
Luo, H.1
Zerfos, P.2
Kong, J.3
Lu, S.4
Zhang, L.5
-
28
-
-
84855528281
-
-
Kluwer Academic Publishers ch. Dynamic Source Routing in Ad Hoc Wireless Networks, Chapter 5, (Tomasz Imielinski and Hank Korth, eds.). [Online]. Available
-
D. B. Johnson and D. A. Malt, Mobile Computing. Kluwer Academic Publishers, 1996, ch. Dynamic Source Routing in Ad Hoc Wireless Networks, Chapter 5, (Tomasz Imielinski and Hank Korth, eds.). [Online]. Available: http://www.monarch.cs.cmu.edu/monarch-papers/kluwer-adhoc.ps
-
(1996)
Mobile Computing
-
-
Johnson, D.B.1
Malt, D.A.2
-
29
-
-
0004118143
-
A secure routing protocol for ad hoc networks
-
[Online]. Available
-
B. Dahill, B. N. Levine, E. Royer, and C. Shields, "A secure routing protocol for ad hoc networks," UMass, Tech. Rep., 2001. [Online]. Available: ftp://ftp.cs.umass.edu/pub/techrept/techreport/2001/UM-CS-2001-037.ps
-
(2001)
UMass, Tech. Rep.
-
-
Dahill, B.1
Levine, B.N.2
Royer, E.3
Shields, C.4
-
30
-
-
0004118152
-
Ariadne: A secure on-demand routing protocol for ad hoc networks
-
December [Online]. Available
-
Y.-C. Hu, A. Perrig, and D. B. Johnson, "Ariadne: A secure on-demand routing protocol for ad hoc networks," Department of Computer Science, Rice University, Tech. Rep. TR01-384, December 2001. [Online]. Available: http://www.monarch.cs.rice.edu/monarch-papers/ariadne.ps
-
(2001)
Department of Computer Science, Rice University, Tech. Rep. TR01-384
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
31
-
-
0002098559
-
TCP congestion control with a misbehaving receiver
-
Oct. [Online]. Available
-
S. Savage, N. Cardwell, D. Wetherall, and T. Anderson, "TCP congestion control with a misbehaving receiver," ACM Computer Communication Review, vol. 29, no. 5, Oct. 1999. [Online]. Available: http://citeseer.nj.nec. com/savage99tcp.html
-
(1999)
ACM Computer Communication Review
, vol.29
, Issue.5
-
-
Savage, S.1
Cardwell, N.2
Wetherall, D.3
Anderson, T.4
-
33
-
-
0003629991
-
-
Federal Information Processing Standards Publication 180-1
-
Secure hash standard, Federal Information Processing Standards Publication 180-1, 1995.
-
(1995)
Secure Hash Standard
-
-
-
34
-
-
0043211984
-
-
Available at
-
W Dai, "Crypto++4.0," Available at http://www.eskimo.com/wei- dai/cryptlib.html.
-
Crypto++4.0
-
-
Dai, W.1
-
35
-
-
84855554615
-
-
I. P. Group Available at
-
I. P. Group, "IEEE P1363 standard," Available at http://grouper.ieee.org/groups/1363/index.html.
-
IEEE P1363 Standard
-
-
|