-
1
-
-
23144452011
-
A taxonomy of incentive patterns - The design space of incentives for cooperation
-
May 21. [Online]
-
P. Obreiter and J. Nimis, "A taxonomy of incentive patterns - The design space of incentives for cooperation," Tech. Rep. Nr. 2003-9, May 21, 2003. [Online], Available: http://www.ipd.uka.de/DIANE/en/index.html.
-
(2003)
Tech. Rep. Nr. 2003-9
, vol.2003
, Issue.9
-
-
Obreiter, P.1
Nimis, J.2
-
2
-
-
0042660545
-
Stimulating cooperation in self-organizing mobile ad hoc networks
-
Oct.
-
L. Buttyan and J. P. Hubaux, "Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks," ACM/KIuwer Mobile Netw. Appl., vol. 8, no. 5, pp. 579-592, Oct. 2003.
-
(2003)
ACM/KIuwer Mobile Netw. Appl.
, vol.8
, Issue.5
, pp. 579-592
-
-
Buttyan, L.1
Hubaux, J.P.2
-
3
-
-
0242527340
-
A charging and rewarding scheme for packet forwarding in multi-hop cellular networks
-
Annapolis, MD, June 1-3
-
N. Salem, L. Buttyan, J. P. Hubaux, and M. Jakobsson, "A charging and rewarding scheme for packet forwarding in multi-hop cellular networks, " in Proc. MobiHoc, Annapolis, MD, June 1-3, 2003, pp. 13-24.
-
(2003)
Proc. MobiHoc
, pp. 13-24
-
-
Salem, N.1
Buttyan, L.2
Hubaux, J.P.3
Jakobsson, M.4
-
4
-
-
0042933944
-
Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks
-
San Francisco, CA
-
S. Zhong, J. Chen, and R. Yang, "Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks," in Proc. IEEE INFOCOM, San Francisco, CA, 2002, pp. 1987-1997.
-
(2002)
Proc. IEEE INFOCOM
, pp. 1987-1997
-
-
Zhong, S.1
Chen, J.2
Yang, R.3
-
5
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
S. Marti et al., "Mitigating routing misbehavior in mobile ad hoc networks," in Proc. ACM Int. Conf. Mobile Compu. Netw., MobiCom, 2000, pp. 255-265.
-
(2000)
Proc. ACM Int. Conf. Mobile Compu. Netw., MobiCom
, pp. 255-265
-
-
Marti, S.1
-
6
-
-
4544308674
-
Observation-based cooperation enforcement in ad hoc networks
-
Stanford Univ., Stanford, CA
-
S. Bansal and M. Baker, "Observation-Based Cooperation Enforcement in Ad hoc Networks," Stanford Univ., Stanford, CA, Res. Rep. cs.NI/0307012, 2003.
-
(2003)
Res. Rep.
, vol.CS.NI-0307012
-
-
Bansal, S.1
Baker, M.2
-
7
-
-
12244292723
-
Analysis of coalition formation and cooperation strategies in mobile ad hoc networks
-
P. Michiardi and R. Molva, "Analysis of coalition formation and cooperation strategies in mobile ad hoc networks," Ad Hoc Netw. J. (Special Issue), vol. 3, no. 2, pp. 193-219, 2003.
-
(2003)
Ad Hoc Netw. J. (Special Issue)
, vol.3
, Issue.2
, pp. 193-219
-
-
Michiardi, P.1
Molva, R.2
-
8
-
-
84858533117
-
Game theoretic analysis of cooperation enforcement in mobile ad hoc networks
-
Oct. 2003. [Online].
-
_, "Game theoretic analysis of cooperation enforcement in mobile ad hoc networks," Res. Rep. RR-03-092, Oct. 2003. [Online]. Available: http://www.eurecom.fr/~michiard/pub.html.
-
Res. Rep.
, vol.RR-03-092
-
-
-
10
-
-
33745900048
-
A robust reputation system for P2P and mobile ad-hoc networks
-
Jun. 2004. [Online]
-
_, "A robust reputation system for P2P and mobile ad-hoc networks," in Proc. 2nd Workshop on the Economics of Peer-to-Peer Syst., Jun. 2004. [Online], Available: www.eecs.harvard.edu/p2pecon/confman/papers/s2p2.pdf.
-
Proc. 2nd Workshop on the Economics of Peer-to-Peer Syst.
-
-
-
11
-
-
11244250305
-
The effect of rumor spreading in reputation systems for mobile ad-hoc networks
-
[Online]
-
_, "The effect of rumor spreading in reputation systems for mobile ad-hoc networks," in Proc. Modeling and Optimization in Mobile Ad Hoc and Wireless Networks, 2003. [Online], Available: www.sims.berkeley.edu/-sonja/effect.pdf.
-
(2003)
Proc. Modeling and Optimization in Mobile Ad Hoc and Wireless Networks
-
-
-
12
-
-
84943576414
-
Friends and foes: Preventing selfishness in open mobile ad hoc networks
-
Providence, RI, May
-
H. Miranda and L. Rodrigues, "Friends and foes: Preventing selfishness in open mobile ad hoc networks," in Proc. Int. Workshop on Mobile. Distrib. Comput., Providence, RI, May 2003, pp. 440-445.
-
(2003)
Proc. Int. Workshop on Mobile. Distrib. Comput.
, pp. 440-445
-
-
Miranda, H.1
Rodrigues, L.2
-
13
-
-
27844495331
-
BROADWAY - The way to broadband access at 60 GHz
-
Thessaloniki, Greece, Jun. [Online]
-
M. de Courville, S. Zeisberg, M. Muck, and J. Schönthier, "BROADWAY - The way to broadband access at 60 GHz," in Proc. 1st Mobile Wireless Telecom. Summit, Thessaloniki, Greece, Jun. 2002. [Online]. Available: www.ist-broadway.org/documents/papers/ 200206-ist_summit_greece_thessaloniki-broadway.pdf.
-
(2002)
Proc. 1st Mobile Wireless Telecom. Summit
-
-
De Courville, M.1
Zeisberg, S.2
Muck, M.3
Schönthier, J.4
-
14
-
-
28244480158
-
A centralized ad-hoc network architecture (CANA) based on enhanced HiperLAN/2
-
Beijing, China, Sep. 7-10
-
K. Oikonomou et al., "A centralized ad-hoc network architecture (CANA) based on enhanced HiperLAN/2," in Proc. 14th IEEE PIMRC, Beijing, China, Sep. 7-10, 2003, pp. 1336-1340.
-
(2003)
Proc. 14th IEEE PIMRC
, pp. 1336-1340
-
-
Oikonomou, K.1
-
16
-
-
33144460704
-
Broadband radio access networks (BRAN); HIPERLAN type 2; Data link control (DLC) layer Part 1: Basic data transport functions
-
Tech. Spec., Apr.
-
"Broadband radio access networks (BRAN); HIPERLAN type 2; Data link control (DLC) layer Part 1: Basic data transport functions," ETSI TS 101 761-1, Tech. Spec., Apr. 2000.
-
(2000)
ETSI TS 101 761-1
-
-
-
17
-
-
33144472761
-
Broadband radio access networks (BRAN); HIPERLAN Type 2; Data link control (DLC) layer Part 2: Radio link control (RLC) sublayer
-
Tech. Spec., Apr.
-
"Broadband radio access networks (BRAN); HIPERLAN Type 2; Data link control (DLC) layer Part 2: Radio link control (RLC) sublayer," ETSI TS 101 761-2, Tech. Spec., Apr. 2000.
-
(2000)
ETSI TS 101 761-2
-
-
-
18
-
-
28244460814
-
Security considerations for the centralized ad-hoc network architecture
-
Oulu, Finland, Jun., CD-ROM
-
S. Vassilaras, D. Vogiatzis, T. Dimitriou, and G. Yovanof, "Security considerations for the centralized ad-hoc network architecture," in Proc. IEEE Int. Workshop on Ad-Hoc Networks, Oulu, Finland, Jun. 2004, CD-ROM, pp. 1-5.
-
(2004)
Proc. IEEE Int. Workshop on Ad-Hoc Networks
, pp. 1-5
-
-
Vassilaras, S.1
Vogiatzis, D.2
Dimitriou, T.3
Yovanof, G.4
-
20
-
-
2342528393
-
Stationary distributions for the random way-point mobility model
-
Jan.-Mar.
-
W. Navidi and T. Camp, "Stationary distributions for the random way-point mobility model," IEEE Trans. Mobile Comput., vol. 3, no. 1, pp. 99-108, Jan.-Mar. 2004.
-
(2004)
IEEE Trans. Mobile Comput.
, vol.3
, Issue.1
, pp. 99-108
-
-
Navidi, W.1
Camp, T.2
-
21
-
-
8344236729
-
Highly secure and efficient routing
-
Hong Kong, Mar. [Online]
-
I. Avramopoulos, H. Kobayashi, R. Wang, and A. Krishnamurthy, "Highly secure and efficient routing," in Proc. INFOCOM Conf., Hong Kong, Mar. 2004. [Online], Available: www.ieee-infocom.org/2004/Papers/05_3.PDF.
-
(2004)
Proc. INFOCOM Conf.
-
-
Avramopoulos, I.1
Kobayashi, H.2
Wang, R.3
Krishnamurthy, A.4
-
23
-
-
0031703272
-
Detecting disruptive routers: A distributed network monitoring approach
-
May
-
K. Bradley et al., "Detecting disruptive routers: a distributed network monitoring approach," in Proc. IEEE Symp. Security and Privacy, May 1998, pp. 115-124.
-
(1998)
Proc. IEEE Symp. Security and Privacy
, pp. 115-124
-
-
Bradley, K.1
-
24
-
-
4944220325
-
The beta reputation system
-
Bled, Slovenia, Jun. [Online]
-
A. Josang and R. Ismail, "The beta reputation system," in Proc. 15th Bled Electronic Commerce Conf., Bled, Slovenia, Jun. 2002. [Online], Available: security.dstc.edu.au/papers/JI2002-Bled.pdf.
-
(2002)
Proc. 15th Bled Electronic Commerce Conf.
-
-
Josang, A.1
Ismail, R.2
-
25
-
-
15744368857
-
Efficient and secure source authentication for multicast
-
San Diego, CA. [Online]
-
A. Perrig, R. Canetti, D. Song, and D. Tygar, "Efficient and secure source authentication for multicast," in Proc. Netw, Distri. Syst. Security Symp, San Diego, CA, 2001. [Online]. Available: www.isoc.org/isoc/conferences/ndss/01/2001/papers/perrig.pdf.
-
(2001)
Proc. Netw, Distri. Syst. Security Symp
-
-
Perrig, A.1
Canetti, R.2
Song, D.3
Tygar, D.4
-
26
-
-
0033690336
-
Efficient authentication and signing of multicast streams over lossy channels
-
May
-
A. Perrig, J. D. Tygar, D. Song, and R. Canetti, "Efficient authentication and signing of multicast streams over lossy channels," in Proc. IEEE Symp. Security and Privacy, May 2000, pp. 56-73.
-
(2000)
Proc. IEEE Symp. Security and Privacy
, pp. 56-73
-
-
Perrig, A.1
Tygar, J.D.2
Song, D.3
Canetti, R.4
-
27
-
-
2642549561
-
WLAN security - Status, problems and perspective
-
Florence, Italy, Feb. [Online]
-
M. Casole, "WLAN security - status, problems and perspective," in Proc. Eur. Wireless, Florence, Italy, Feb. 2002. [Online]. Available: docenti.ing.unipi.it/ew2002/proceedings/sec002.pdf.
-
(2002)
Proc. Eur. Wireless
-
-
Casole, M.1
-
28
-
-
28244465434
-
Enhancing HIPERLAN/2 security aspects
-
Madonna di Campiglio, Italy, Jan.
-
J. Ferrer et al., "Enhancing HIPERLAN/2 security aspects," in Proc. WONS, Madonna di Campiglio, Italy, Jan. 2004, pp. 389-394.
-
(2004)
Proc. WONS
, pp. 389-394
-
-
Ferrer, J.1
|