-
2
-
-
0029700344
-
Decentralized trust management
-
Matt Blaze, Joan Feigenbaum, and Jack Lacy. Decentralized trust management. In Proceedings of IEEE Conference on Security and Privacy, Oakland, CA, 1996.
-
Proceedings of IEEE Conference on Security and Privacy, Oakland, CA, 1996
-
-
Blaze, M.1
Feigenbaum, J.2
Lacy, J.3
-
3
-
-
0037885580
-
Nodes bearing grudges: Towards routing security, fairness, and robustness in mobile ad hoc networks
-
Canary Islands, Spain, January; IEEE Computer Society
-
Sonja Buchegger and Jean-Yves Le Boudec. Nodes Bearing Grudges: Towards Routing Security, Fairness, and Robustness in Mobile Ad Hoc Networks. In Proceedings of the Tenth Euromicro Workshop on Parallel, Distributed and Network-based Processing, pages 403 - 410, Canary Islands, Spain, January 2002. IEEE Computer Society.
-
(2002)
Proceedings of the Tenth Euromicro Workshop on Parallel, Distributed and Network-Based Processing
, pp. 403-410
-
-
Buchegger, S.1
Le Boudec, J.-Y.2
-
4
-
-
84954161437
-
Enforcing service availability in mobile ad-hoc wans
-
Levente Buttyán and Jean-Pierre Hubaux. Enforcing service availability in mobile ad-hoc wans. In Proceedings of IEEE/ACM Workshop on Mobile Ad Hoc Networking and Computing (MobiHOC), Boston, MA, USA, August 2000.
-
Proceedings of IEEE/ACM Workshop on Mobile Ad Hoc Networking and Computing (MobiHOC), Boston, MA, USA, August 2000
-
-
Buttyán, L.1
Hubaux, J.-P.2
-
5
-
-
0041709313
-
Stimulating cooperation in self-organizing mobile ad hoc networks
-
Networks
-
Levente Buttyán and Jean-Pierre Hubaux. Stimulating cooperation in self-organizing mobile ad hoc networks. MONET Journal of Mobile Networks, Networks, 2002.
-
(2002)
MONET Journal of Mobile Networks
-
-
Buttyán, L.1
Hubaux, J.-P.2
-
6
-
-
0004149207
-
-
Oxford University Press, 1989 edition
-
Richard Dawkins. The Selfish Gene. Oxford University Press, 1989 edition, 1976.
-
(1976)
The Selfish Gene
-
-
Dawkins, R.1
-
7
-
-
0003454649
-
-
John Wiley & Sons, New York, 1989 edition; All you need to know about performance analysis
-
Raj Jain. The Art of Computer Systems Performance Analysis. John Wiley & Sons, New York, 1989 edition, 1991. All you need to know about performance analysis.
-
(1991)
The Art of Computer Systems Performance Analysis
-
-
Jain, R.1
-
8
-
-
0003597247
-
The dynamic source routing protocol for mobile ad hoc networks
-
Internet Draft, Mobile Ad Hoc Network (MANET) Working Group, IETF, October
-
Dave B. Johnson and David A. Maltz. The dynamic source routing protocol for mobile ad hoc networks. Internet Draft, Mobile Ad Hoc Network (MANET) Working Group, IETF, October 1999.
-
(1999)
-
-
Johnson, D.B.1
Maltz, D.A.2
-
9
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
Sergio Marti, T.J. Giuli, Kevin Lai, and Mary Baker. Mitigating routing misbehavior in mobile ad hoc networks. In Proceedings of MOBICOM 2000, pages 255-265, 2000.
-
(2000)
Proceedings of MOBICOM 2000
, pp. 255-265
-
-
Marti, S.1
Giuli, T.J.2
Lai, K.3
Baker, M.4
-
10
-
-
0242594854
-
-
MICS. The terminodes project
-
MICS. The terminodes project. http://www.terminodes.org, 2002.
-
(2002)
-
-
-
11
-
-
0005837562
-
Digital signature protection of the OSPF routing protocol
-
IEEE
-
S. L. Murphy and M. R. Badger. Digital signature protection of the OSPF routing protocol. IEEE, 1996.
-
(1996)
-
-
Murphy, S.L.1
Badger, M.R.2
-
12
-
-
0031078841
-
Trusting mobile user devices and security modules
-
IEEE, February
-
Andreas Pfitzmann, Birgit Pfitzmann, Matthias Schunter, and Michael Waidner. Trusting mobile user devices and security modules. In Computer, pages 61-68. IEEE, February 1997.
-
(1997)
Computer
, pp. 61-68
-
-
Pfitzmann, A.1
Pfitzmann, B.2
Schunter, M.3
Waidner, M.4
-
13
-
-
0002101577
-
Reputation systems
-
Paul Resnick, Richard Zeckhauser, Eric Friedman, and Ko Kuwabara. Reputation systems. Communications of the ACM, 43(12):45-48, 2000.
-
(2000)
Communications of the ACM
, vol.43
, Issue.12
, pp. 45-48
-
-
Resnick, P.1
Zeckhauser, R.2
Friedman, E.3
Kuwabara, K.4
-
15
-
-
0030695529
-
Securing distance-vector routing protocols
-
February
-
Bradley R. Smith, Shree Murthy, and J.J. Garcia-Luna-Aceves. Securing distance-vector routing protocols. In Proceedings of Internet Society Symposium on Network and Distributed System Security, San Diego, CA, pages 85-92, February 1997.
-
(1997)
Proceedings of Internet Society Symposium on Network and Distributed System Security, San Diego, CA
, pp. 85-92
-
-
Smith, B.R.1
Murthy, S.2
Garcia-Luna-Aceves, J.J.3
-
16
-
-
0003826083
-
Security-aware ad-hoc routing for wireless networks
-
MobiHOC Poster Session
-
Seung Yi, Prasad Naldurg, and Robin Kravets. Security-aware ad-hoc routing for wireless networks. MobiHOC Poster Session, 2001.
-
(2001)
-
-
Yi, S.1
Naldurg, P.2
Kravets, R.3
-
17
-
-
0031652485
-
GloMoSim: A library for parallel simulation of large-scale wireless networks
-
Xiang Zeng, Rajive Bagrodia, and Mario Gerla. GloMoSim: A library for parallel simulation of large-scale wireless networks. Proceedings of the 12th Workshop on Parallel and Distributed Simulations-PADS '98, May 26-29, in Banff, Alberta, Canada, 1998.
-
Proceedings of the 12th Workshop on Parallel and Distributed Simulations-PADS '98, May 26-29, in Banff, Alberta, Canada, 1998
-
-
Zeng, X.1
Bagrodia, R.2
Gerla, M.3
-
18
-
-
0033357103
-
Securing ad hoc networks
-
November/Dezember
-
Lidong Zhou and Zygmunt Haas. Securing ad hoc networks. In IEEE Network magazine, special issue on networking security, Vol. 13, No. 6, November/Dezember, pages 24-30, 1999.
-
(1999)
IEEE Network Magazine, Special Issue on Networking Security
, vol.13
, Issue.6
, pp. 24-30
-
-
Zhou, L.1
Haas, Z.2
|