-
1
-
-
0035101078
-
Toward Self-Organized Mobile Ad Hoc Networks: The Terminodes Project
-
Jan
-
J.P. Hubaux, T. Gross, J.-Y. Le Boudec, and M. Vetterli, "Toward Self-Organized Mobile Ad Hoc Networks: The Terminodes Project," IEEE Comm. Magazine, Jan. 2001.
-
(2001)
IEEE Comm. Magazine
-
-
Hubaux, J.P.1
Gross, T.2
Le Boudec, J.-Y.3
Vetterli, M.4
-
2
-
-
25844488399
-
Enforcing Service Availability in Mobile Ad-Hoc Networks
-
L. Buttyan and J.P. Hubaux, "Enforcing Service Availability in Mobile Ad-Hoc Networks," Proc. ACM MobiHoc, 2000.
-
(2000)
Proc. ACM MobiHoc
-
-
Buttyan, L.1
Hubaux, J.P.2
-
3
-
-
0042660545
-
Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks
-
Oct
-
L. Buttyan and J.P. Hubaux, "Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks," Mobile Networks and Applications, vol. 8, no. 5, pp. 579-592, Oct. 2003.
-
(2003)
Mobile Networks and Applications
, vol.8
, Issue.5
, pp. 579-592
-
-
Buttyan, L.1
Hubaux, J.P.2
-
4
-
-
0042933944
-
Sprite: A Simple, Cheat-Proof, Credit-Based System for Mobile Ad-Hoc Networks
-
S. Zhong, J. Chen, and Y.R. Yang, "Sprite: A Simple, Cheat-Proof, Credit-Based System for Mobile Ad-Hoc Networks," Proc. IEEE INFOCOM, 2003.
-
(2003)
Proc. IEEE INFOCOM
-
-
Zhong, S.1
Chen, J.2
Yang, Y.R.3
-
5
-
-
1542299118
-
Ad Hoc-VCG: A Truthful and Cost-Efficient Routing Protocol for Mobile Ad Hoc Networks with Selfish Agents
-
L. Anderegg and S. Eidenbenz, "Ad Hoc-VCG: A Truthful and Cost-Efficient Routing Protocol for Mobile Ad Hoc Networks with Selfish Agents," Proc. ACM MobiCom, 2003.
-
(2003)
Proc. ACM MobiCom
-
-
Anderegg, L.1
Eidenbenz, S.2
-
6
-
-
32144433522
-
On Designing Incentive-Compatible Routing and Forwarding Protocols in Wireless Ad-Hoc Networks - An Integrated Approach Using Game Theoretical and Cryptographic Techniques
-
S. Zhong, L. Li, Y.G. Liu, and Y.R. Yang, "On Designing Incentive-Compatible Routing and Forwarding Protocols in Wireless Ad-Hoc Networks - An Integrated Approach Using Game Theoretical and Cryptographic Techniques," Proc. ACM MobiCom, pp. 117-131, 2005.
-
(2005)
Proc. ACM MobiCom
, pp. 117-131
-
-
Zhong, S.1
Li, L.2
Liu, Y.G.3
Yang, Y.R.4
-
7
-
-
0034541756
-
Mitigating Routing Misbehavior in Mobile Ad Hoc Networks
-
S. Marti, T.J. Giuli, K. Lai, and M. Baker, "Mitigating Routing Misbehavior in Mobile Ad Hoc Networks," Proc. ACM MobiCom, 2000.
-
(2000)
Proc. ACM MobiCom
-
-
Marti, S.1
Giuli, T.J.2
Lai, K.3
Baker, M.4
-
8
-
-
85113133621
-
Core: A Collaborative REputation Mechanism to Enforce Node Cooperation in Mobile Ad Hoc Networks
-
P. Michiardi and R. Molva, "Core: A Collaborative REputation Mechanism to Enforce Node Cooperation in Mobile Ad Hoc Networks," Proc. IFIP - Comm. and Multimedia Security Conf., 2002.
-
(2002)
Proc. IFIP - Comm. and Multimedia Security Conf
-
-
Michiardi, P.1
Molva, R.2
-
10
-
-
29144503110
-
Attack-Resistant Cooperation Stimulation in Autonomous Ad Hoc Networks
-
Dec
-
W. Yu and K.J.R. Liu, "Attack-Resistant Cooperation Stimulation in Autonomous Ad Hoc Networks," IEEE J. Selected Areas in Comm., vol. 23, no. 12, pp. 2260-2271, Dec. 2005.
-
(2005)
IEEE J. Selected Areas in Comm
, vol.23
, Issue.12
, pp. 2260-2271
-
-
Yu, W.1
Liu, K.J.R.2
-
11
-
-
0041939831
-
Cooperation in Wireless Ad Hoc Networks
-
V. Srinivasan, P. Nuggehalli, C.F. Chiasserini, and R.R. Rao, "Cooperation in Wireless Ad Hoc Networks," Proc. IEEE INFOCOM, 2003.
-
(2003)
Proc. IEEE INFOCOM
-
-
Srinivasan, V.1
Nuggehalli, P.2
Chiasserini, C.F.3
Rao, R.R.4
-
12
-
-
11244285854
-
Modeling Cooperation in Mobile Ad Hoc Networks: A Formal Description of Selfishness
-
A. Urpi, M. Bonuccelli, and S. Giordano, "Modeling Cooperation in Mobile Ad Hoc Networks: A Formal Description of Selfishness," Proc. Workshop Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOPT '03), 2003.
-
(2003)
Proc. Workshop Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOPT '03)
-
-
Urpi, A.1
Bonuccelli, M.2
Giordano, S.3
-
13
-
-
3042637063
-
Modelling Incentives for Collaboration in Mobile Ad Hoc Networks
-
J. Crowcroft, R. Gibbens, F. Kelly, and S. Ostring, "Modelling Incentives for Collaboration in Mobile Ad Hoc Networks," Proc. Workshop Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOPT '03), 2003.
-
(2003)
Proc. Workshop Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOPT '03)
-
-
Crowcroft, J.1
Gibbens, R.2
Kelly, F.3
Ostring, S.4
-
15
-
-
33947626966
-
Non-Cooperative Forwarding in Ad-Hoc Networks
-
INRIA, Sophia Antipolis
-
E. Altaian, A.A. Kherani, P. Michiardi, and R. Molva, "Non-Cooperative Forwarding in Ad-Hoc Networks," technical report, INRIA, Sophia Antipolis, 2004.
-
(2004)
technical report
-
-
Altaian, E.1
Kherani, A.A.2
Michiardi, P.3
Molva, R.4
-
16
-
-
33645673382
-
Nash Equilibria of Packet Forwarding Strategies in Wireless Ad Hoc Networks
-
Sept.-Oct
-
M. Felegyhazi, J.-P. Hubaux, and L. Buttyan, "Nash Equilibria of Packet Forwarding Strategies in Wireless Ad Hoc Networks," IEEE Trans. Mobile Computing, vol. 5, no. 5, pp. 463-476, Sept.-Oct. 2006.
-
(2006)
IEEE Trans. Mobile Computing
, vol.5
, Issue.5
, pp. 463-476
-
-
Felegyhazi, M.1
Hubaux, J.-P.2
Buttyan, L.3
-
18
-
-
25844465866
-
HADOF: Defense against Routing Disruptions in Mobile Ad Hoc Networks
-
W. Yu, Y. Sun, and K.J.R. Liu, "HADOF: Defense against Routing Disruptions in Mobile Ad Hoc Networks," Proc. IEEE INFOCOM, 2005.
-
(2005)
Proc. IEEE INFOCOM
-
-
Yu, W.1
Sun, Y.2
Liu, K.J.R.3
-
19
-
-
0004149207
-
-
second ed. Oxford Univ. Press
-
R. Dawkins, The Selfish Gene, second ed. Oxford Univ. Press, 1990.
-
(1990)
The Selfish Gene
-
-
Dawkins, R.1
-
21
-
-
0033357103
-
Securing Ad Hoc Networks
-
Nov./Dec
-
L. Zhou and Z. Haas, "Securing Ad Hoc Networks," IEEE Network Magazine, vol. 13, no. 6, Nov./Dec. 1999.
-
(1999)
IEEE Network Magazine
, vol.13
, Issue.6
-
-
Zhou, L.1
Haas, Z.2
-
23
-
-
0036957315
-
Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks
-
Y.-C. Hu, A. Perrig, and D.B. Johnson, "Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks," Proc. ACM MobiCom, 2002.
-
(2002)
Proc. ACM MobiCom
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
25
-
-
84904904836
-
A Secure Routing Protocol for Ad Hoc Networks
-
Nov
-
K. Sanzgiri, B. Dahill, B.N. Levine, C. Shields, and E.M. Belding-Royer, "A Secure Routing Protocol for Ad Hoc Networks," Proc. Int'l Conf. Network Protocols (ICNP '02), Nov. 2002.
-
(2002)
Proc. Int'l Conf. Network Protocols (ICNP '02)
-
-
Sanzgiri, K.1
Dahill, B.2
Levine, B.N.3
Shields, C.4
Belding-Royer, E.M.5
-
28
-
-
0041973497
-
Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks
-
Y.-C. Hu, A. Perrig, and D.B. Johnson, "Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks," Proc. IEEE INFOCOM, 2003.
-
(2003)
Proc. IEEE INFOCOM
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
29
-
-
11244269535
-
SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks
-
Y.-C. Hu, A. Perrig, and D.B. Johnson, "SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks," Ad Hoc Networks J., vol. 1, pp. 175-192, 2003.
-
(2003)
Ad Hoc Networks J
, vol.1
, pp. 175-192
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
32
-
-
33947692584
-
-
IEEE Standard 802.11-1007, Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, IEEE Computer Soc. LAN MAN Standards Committee, 1999.
-
IEEE Standard 802.11-1007, Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, IEEE Computer Soc. LAN MAN Standards Committee, 1999.
-
-
-
-
33
-
-
0000629443
-
Dynamic Source Routing in Ad Hoc Wireless Networks, Mobile Computing
-
D.B. Johnson and D.A. Maltz, "Dynamic Source Routing in Ad Hoc Wireless Networks, Mobile Computing," Mobile Computing, pp. 153-181, 1996.
-
(1996)
Mobile Computing
, pp. 153-181
-
-
Johnson, D.B.1
Maltz, D.A.2
|