-
1
-
-
25844480881
-
Provably competitive adaptive routing
-
Miami, FL
-
B. Awerbuch, D. Holmer, R. Kleinberg and H. Rubens, Provably competitive adaptive routing, in: Proc. IEEE INFOCOM, Miami, FL, 2005.
-
(2005)
Proc. IEEE INFOCOM
-
-
Awerbuch, B.1
Holmer, D.2
Kleinberg, R.3
Rubens, H.4
-
4
-
-
0003794137
-
-
Prentice Hall, Englewood Cliffs, NJ
-
D. Bertsekas and R. Gallager, Data Networks, 2 edn, Prentice Hall, Englewood Cliffs, NJ, 1992.
-
(1992)
Data Networks, 2 Edn
-
-
Bertsekas, D.1
Gallager, R.2
-
6
-
-
0042660545
-
Stimulating cooperation in self-organizing mobile ad hoc networks
-
L. Buttyan and J.-P. Hubaux, Stimulating cooperation in self-organizing mobile ad hoc networks, Mobile Networks and Applications 8(5) (2003), 579-592.
-
(2003)
Mobile Networks and Applications
, vol.8
, Issue.5
, pp. 579-592
-
-
Buttyan, L.1
Hubaux, J.-P.2
-
8
-
-
3142519532
-
On trust establishment in mobile ad-hoc networks
-
LNCS
-
L. Eschenauer, V.D. Gligor and J.S. Baras, On trust establishment in mobile ad-hoc networks, in: Proc. Security Protocols Workshop, Volume 2845, LNCS, 2002, pp. 47-66.
-
(2002)
Proc. Security Protocols Workshop
, vol.2845
, pp. 47-66
-
-
Eschenauer, L.1
Gligor, V.D.2
Baras, J.S.3
-
11
-
-
0036957315
-
Ariadne: A secure on-demand routing protocol for ad hoc networks
-
ACM SIGMOBILE
-
Y.C. Hu, A. Perrig and D.B. Johnson, Ariadne: A secure on-demand routing protocol for ad hoc networks, in: Proc. ACM MobiCom'02, ACM SIGMOBILE, 2002.
-
(2002)
Proc. ACM MobiCom'02
-
-
Hu, Y.C.1
Perrig, A.2
Johnson, D.B.3
-
13
-
-
0041973497
-
Packet leashes: A defense against wormhole attacks in wireless networks
-
San Francisco, CA
-
Y.C. Hu, A. Perrig and D. Johnson, Packet leashes: A defense against wormhole attacks in wireless networks, in: Proc. IEEE Infocom, San Francisco, CA, 2003.
-
(2003)
Proc. IEEE Infocom
-
-
Hu, Y.C.1
Perrig, A.2
Johnson, D.3
-
16
-
-
0000629443
-
Dynamic source routing in ad hoc wireless networks
-
T. Imielinski and H. Korth, eds, Chapter 5, Kluwer Academic Publishers
-
D. Johnson and D. Maltz, Dynamic source routing in ad hoc wireless networks, in: Mobile Computing, T. Imielinski and H. Korth, eds, Chapter 5, Kluwer Academic Publishers, 1996, pp. 153-181.
-
(1996)
Mobile Computing
, pp. 153-181
-
-
Johnson, D.1
Maltz, D.2
-
17
-
-
11244320485
-
URSA: Ubiquitos and robust access control for mobile ad hoc networks
-
H. Luo, J. Kong, P. Zerfos, S. Lu and L. Zhang, URSA: Ubiquitos and robust access control for mobile ad hoc networks, IEEE/ACM Transactions on Networking 12(December) (2004), 1049-1063.
-
(2004)
IEEE/ACM Transactions on Networking
, vol.12
, Issue.DECEMBER
, pp. 1049-1063
-
-
Luo, H.1
Kong, J.2
Zerfos, P.3
Lu, S.4
Zhang, L.5
-
21
-
-
0003663467
-
-
McGraw-Hill, New York
-
A. Papoulis, Probability, Random Variables, and Stochastic Processes, McGraw-Hill, New York, 1991.
-
(1991)
Probability, Random Variables, and Stochastic Processes
-
-
Papoulis, A.1
-
22
-
-
0742292815
-
Ad-hoc On-demand Distance Vector (AODV) routing
-
July
-
C. Perkins, E. Belding-Royer and S. Das, Ad-hoc On-demand Distance Vector (AODV) Routing, IETF RFC 3561, July 2003.
-
(2003)
IETF RFC
, vol.3561
-
-
Perkins, C.1
Belding-Royer, E.2
Das, S.3
-
25
-
-
33745257035
-
Quantifying trust in mobile ad-hoc networks
-
M. Virendra, M. Jadliwala, M. Chandrasekaran and S. Upadhyaya, Quantifying trust in mobile ad-hoc networks, in: Proc. International Conference on Integration of Knowledge Intensive Multi-Agent Systems (KIMAS'05: Modeling, Evolution and Engineering), 2005.
-
(2005)
Proc. International Conference on Integration of Knowledge Intensive Multi-agent Systems (KIMAS'05: Modeling, Evolution and Engineering)
-
-
Virendra, M.1
Jadliwala, M.2
Chandrasekaran, M.3
Upadhyaya, S.4
|