-
1
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
Boston, MA, USA, August
-
Marti S, Giuli T, Lai K, Baker M. Mitigating routing misbehavior in mobile ad hoc networks. Proceedings of Mobicom 2000, Boston, MA, USA, August 2000.
-
(2000)
Proceedings of Mobicom 2000
-
-
Marti, S.1
Giuli, T.2
Lai, K.3
Baker, M.4
-
2
-
-
84954161437
-
Enforcing service availability in mobile adhoc WANs
-
Boston, MA, USA, August
-
Buttyan L, Hubaux J. Enforcing service availability in mobile adhoc WANs. IEEE/ACM Workshop on Mobile Ad Hoc Networking and Computing (MobiHoc), Boston, MA, USA, August 2000.
-
(2000)
IEEE/ACM Workshop on Mobile Ad Hoc Networking and Computing (MobiHoc)
-
-
Buttyan, L.1
Hubaux, J.2
-
3
-
-
0042209739
-
A micro-payment scheme encouraging collaboration in multi-hop cellular networks
-
Gosier, Guadeloupe, January
-
Jakobsson M, Hubaux J, Buttyan L. A micro-payment scheme encouraging collaboration in multi-hop cellular networks. Proceedings of Financial Crypto 2003, Gosier, Guadeloupe, January 2003.
-
(2003)
Proceedings of Financial Crypto 2003
-
-
Jakobsson, M.1
Hubaux, J.2
Buttyan, L.3
-
4
-
-
0042933944
-
Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks
-
San Francisco, CA, USA, April
-
Zhong S, Chen J, Yang Y. Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks. IEEE INFOCOM 2003, San Francisco, CA, USA, April 2003.
-
(2003)
IEEE INFOCOM 2003
-
-
Zhong, S.1
Chen, J.2
Yang, Y.3
-
6
-
-
0242696192
-
Performance analysis of the CONFIDANT protocol: Cooperation of nodes - Fairness in distributed ad-hoc networks
-
Lausanne, Switzerland, June
-
Buchegger S, Le Boudec J. Performance analysis of the CONFIDANT protocol: cooperation of nodes - fairness in distributed ad-hoc networks. IEEE/ACM Workshop on Mobile Ad Hoc Networking and Computing (MobiHOC), Lausanne, Switzerland, June 2002.
-
(2002)
IEEE/ACM Workshop on Mobile Ad Hoc Networking and Computing (MobiHOC)
-
-
Buchegger, S.1
Le Boudec, J.2
-
7
-
-
0019634370
-
Password authentication with secure communication
-
Lamport L. Password authentication with secure communication. Communications of the ACM 1981; 24(11): 770-772.
-
(1981)
Communications of the ACM
, vol.24
, Issue.11
, pp. 770-772
-
-
Lamport, L.1
-
9
-
-
2942662944
-
Simulation-based analysis of security exposures in mobile ad hoc networks
-
Florence, Italy, February
-
Michiardi P, Movla R. Simulation-based analysis of security exposures in mobile ad hoc networks. European Wireless 2002 Conference, Florence, Italy, February 2002.
-
(2002)
European Wireless 2002 Conference
-
-
Michiardi, P.1
Movla, R.2
-
11
-
-
0031096869
-
Associativity-based routing for ad-hoc mobile networks
-
Toh CK. Associativity-based routing for ad-hoc mobile networks. Wireless Personal Communications 1997; 4(2): 1-36.
-
(1997)
Wireless Personal Communications
, vol.4
, Issue.2
, pp. 1-36
-
-
Toh, C.K.1
-
14
-
-
0038675868
-
A survey of mobility models for ad hoc network research
-
Special issue on Mobile Ad Hoc Networking: Research, Trends and Applications
-
Camp T, Boleng J, Davies V. A survey of mobility models for ad hoc network research. Wireless Communication & Mobile Computing, Special issue on Mobile Ad Hoc Networking: Research, Trends and Applications 2002; 2(5): 483-502.
-
(2002)
Wireless Communication & Mobile Computing
, vol.2
, Issue.5
, pp. 483-502
-
-
Camp, T.1
Boleng, J.2
Davies, V.3
|