-
3
-
-
0037623983
-
Identity based encryption from the Weil pairing
-
D. Boneh and M. Franklin. Identity based encryption from the Weil pairing. SIAM Journal of Computing, 32(3):586-615, 2003.
-
(2003)
SIAM Journal of Computing
, vol.32
, Issue.3
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.2
-
4
-
-
11244250305
-
The Effect of Rumor Spreading in Reputation Systems for Mobile Ad hoc Networks
-
S. Buchegger and J. Le Boudec. The Effect of Rumor Spreading in Reputation Systems for Mobile Ad hoc Networks. In Proc. WiOpt, pages 131-140, 2003.
-
(2003)
Proc. WiOpt
, pp. 131-140
-
-
Buchegger, S.1
Le Boudec, J.2
-
7
-
-
32844466166
-
Mobility Helps Peer-to-Peer Security
-
Jan
-
S. Capkun, J. Hubaux, and L. Buttyan. Mobility Helps Peer-to-Peer Security. In IEEE Trans. on Mobile Computing, volume 5, pages 43-51, Jan 2006.
-
(2006)
IEEE Trans. on Mobile Computing
, vol.5
, pp. 43-51
-
-
Capkun, S.1
Hubaux, J.2
Buttyan, L.3
-
9
-
-
0035158929
-
Wearable Computers and Packet Transport Mechanisms in Highly Partitioned Ad hoc Networks
-
October
-
J. Davis, A. Fagg, and B. N. Levine. Wearable Computers and Packet Transport Mechanisms in Highly Partitioned Ad hoc Networks. In Proc. IEEE Intl. Symp on Wearable Computers (ISWC), pages 141-148, October 2001.
-
(2001)
Proc. IEEE Intl. Symp on Wearable Computers (ISWC)
, pp. 141-148
-
-
Davis, J.1
Fagg, A.2
Levine, B.N.3
-
13
-
-
70349312732
-
Locating Peers With Ease: Mobility Diffusion Of Last Encounters In Ad hoc Networks
-
April
-
M. Grossglauser and M. Vetterli. Locating Peers With Ease: Mobility Diffusion Of Last Encounters In Ad hoc Networks. In Proc. IEEE Infocom, April 2003.
-
(2003)
Proc. IEEE Infocom
-
-
Grossglauser, M.1
Vetterli, M.2
-
14
-
-
41349120887
-
Attack Vulnerability of Complex Networks
-
May
-
P. Holme, B. J. Kim, C. N. Yoon, and S. K. Han. Attack Vulnerability of Complex Networks. APS Physics Review E, 65(5):056109.1-056109.14, May 2002.
-
(2002)
APS Physics Review E
, vol.65
, Issue.5
-
-
Holme, P.1
Kim, B.J.2
Yoon, C.N.3
Han, S.K.4
-
15
-
-
17444426121
-
Ariadne: A Secure On-Demand Routing Protocol for Ad hoc Networks
-
Y.-C. Hu, A. Perrig, and D. B. Johnson. Ariadne: A Secure On-Demand Routing Protocol for Ad hoc Networks. Wireless Networks, 11(1-2):21-38, 2005.
-
(2005)
Wireless Networks
, vol.11
, Issue.1-2
, pp. 21-38
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
16
-
-
84885799779
-
Pocket Switched Networks and Human Mobility in Conference Environments
-
Aug
-
P. Hui, A. Chaintreau, J. Scott, R. Gass, J. Crowcroft, and C. Diot. Pocket Switched Networks and Human Mobility in Conference Environments. In Proc. ACM Workshop on Delay-Tolerant Networking, pages 244-251, Aug. 2005.
-
(2005)
Proc. ACM Workshop on Delay-Tolerant Networking
, pp. 244-251
-
-
Hui, P.1
Chaintreau, A.2
Scott, J.3
Gass, R.4
Crowcroft, J.5
Diot, C.6
-
17
-
-
21844451437
-
Routing in a Delay Tolerant Network
-
August
-
S. Jain, K. Fall, and R. Patra. Routing in a Delay Tolerant Network. In Proc. ACM SIGCOMM, pages 145-158, August 2004.
-
(2004)
Proc. ACM SIGCOMM
, pp. 145-158
-
-
Jain, S.1
Fall, K.2
Patra, R.3
-
18
-
-
0036949534
-
Energy-Efficient Computing for Wildlife Tracking: Design tradeoffs and early experiences with ZebraNet
-
P. Juang et al. Energy-Efficient Computing for Wildlife Tracking: design tradeoffs and early experiences with ZebraNet. SIGOPS Oper. Syst. Rev., 36(5):96-107, 2002.
-
(2002)
SIGOPS Oper. Syst. Rev
, vol.36
, Issue.5
, pp. 96-107
-
-
Juang, P.1
-
19
-
-
29844454971
-
A Secure Ad hoc Routing Approach Using Localized Self-Healing Communities
-
May
-
J. Kong, X. Hong, Y. Yi, J.-S. Park, J. Liu, and M. Gerla. A Secure Ad hoc Routing Approach Using Localized Self-Healing Communities. In Proc. ACM MobiHoc, pages 254-265, May 2005.
-
(2005)
Proc. ACM MobiHoc
, pp. 254-265
-
-
Kong, J.1
Hong, X.2
Yi, Y.3
Park, J.-S.4
Liu, J.5
Gerla, M.6
-
20
-
-
27644464092
-
Experimental Evaluation of Wireless Simulation Assumptions
-
Oct
-
D. Kotz, C. Newport, R. Gray, J. Liu, Y. Yuan, and C. Elliott. Experimental Evaluation of Wireless Simulation Assumptions. In Proc. ACM/IEEE Intl Symp on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM), pages 78-82, Oct 2004.
-
(2004)
Proc. ACM/IEEE Intl Symp on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM)
, pp. 78-82
-
-
Kotz, D.1
Newport, C.2
Gray, R.3
Liu, J.4
Yuan, Y.5
Elliott, C.6
-
21
-
-
0034545825
-
Sending Messages to Mobile Users in Disconnected Ad hoc Wireless Networks
-
August
-
Q. Li and D. Rus. Sending Messages to Mobile Users in Disconnected Ad hoc Wireless Networks. In Proc. MobiCom, pages 44-55, August 2000.
-
(2000)
Proc. MobiCom
, pp. 44-55
-
-
Li, Q.1
Rus, D.2
-
25
-
-
0742285890
-
DakNet: Rethinking Connectivity in Developing Nations
-
Jan
-
A. Pentland, R. Fletcher, and A. Hasson. DakNet: Rethinking Connectivity in Developing Nations. IEEE Computer, 37(1):78-83, Jan 2004.
-
(2004)
IEEE Computer
, vol.37
, Issue.1
, pp. 78-83
-
-
Pentland, A.1
Fletcher, R.2
Hasson, A.3
-
27
-
-
15244339622
-
Authenticated Routing for Ad hoc Networks
-
March
-
K. Sanzgiri, B. Dahill, D. LaFlamme, B. N. Levine, C. Shields, and E. Beiding-Royer. Authenticated Routing for Ad hoc Networks. IEEE/ACM Journal of Selected Areas in Communications: Special issue on Wireless Ad hoc Networks (JSAC), 23(3):598-610, March 2005.
-
(2005)
IEEE/ACM Journal of Selected Areas in Communications: Special issue on Wireless Ad hoc Networks (JSAC)
, vol.23
, Issue.3
, pp. 598-610
-
-
Sanzgiri, K.1
Dahill, B.2
LaFlamme, D.3
Levine, B.N.4
Shields, C.5
Beiding-Royer, E.6
-
32
-
-
37849041028
-
Study of a Bus-Based Disruption Tolerant Network: Mobility Modeling and Impact on Routing
-
September
-
X. Zhang, J. Kurose, B. N. Levine, D. Towsley, and H. Zhang. Study of a Bus-Based Disruption Tolerant Network: Mobility Modeling and Impact on Routing. In Proc. ACM Mobicom, September 2007.
-
(2007)
Proc. ACM Mobicom
-
-
Zhang, X.1
Kurose, J.2
Levine, B.N.3
Towsley, D.4
Zhang, H.5
-
34
-
-
37849012219
-
-
W. Zhao, M. Ammar, and E. Zegura. A Message Ferrying Approach for Data Delivery in Sparse Mobile Ad hoc Networks. In Proc. ACM Mobihoc, May 2004.
-
W. Zhao, M. Ammar, and E. Zegura. A Message Ferrying Approach for Data Delivery in Sparse Mobile Ad hoc Networks. In Proc. ACM Mobihoc, May 2004.
-
-
-
-
35
-
-
39049084873
-
Capacity Enhancement using Throwboxes in DTNs
-
Oct
-
W. Zhao, Y. Chen, M. Ammar, M. D. Corner, B. N. Levine, and E. Zegura. Capacity Enhancement using Throwboxes in DTNs. In Proc. IEEE Intl Conf on Mobile Ad hoc and Sensor Systems (MASS), pages 31-40, Oct 2006.
-
(2006)
Proc. IEEE Intl Conf on Mobile Ad hoc and Sensor Systems (MASS)
, pp. 31-40
-
-
Zhao, W.1
Chen, Y.2
Ammar, M.3
Corner, M.D.4
Levine, B.N.5
Zegura, E.6
|