-
1
-
-
33846579604
-
Why does it pay to be selfish in a MANET
-
Yoo Y, Agrawal D P. Why does it pay to be selfish in a MANET? IEEE Wireless Communications, 2006, 13(6): 87-97
-
(2006)
IEEE Wireless Communications
, vol.13
, Issue.6
, pp. 87-97
-
-
Yoo, Y.1
Agrawal, D.P.2
-
2
-
-
0042660545
-
Stimulating cooperation in self-organizing mobile Ad hoc networks
-
Buttyan L, Hubaux J-P. Stimulating cooperation in self-organizing mobile Ad hoc networks. Mobile Networks and Applications, 2003, 8(5): 579-592
-
(2003)
Mobile Networks and Applications
, vol.8
, Issue.5
, pp. 579-592
-
-
Buttyan, L.1
Hubaux, J.-P.2
-
4
-
-
0042933944
-
Sprite: A simple, cheat-proof, credit-based system for mobile Ad-hoc networks
-
IEEE Press
-
Zhong S, Chen J, Yang R. Sprite: A simple, cheat-proof, credit-based system for mobile Ad-hoc networks//Proceedings of the INFOCOM San Francisco, IEEE Press, 2003: 1987-1997
-
(2003)
Proceedings of the INFOCOM San Francisco
, pp. 1987-1997
-
-
Zhong, S.1
Chen, J.2
Yang, R.3
-
6
-
-
24744432675
-
Self-policing mobile Ad hoc net works by reputation systems
-
Buchegger S, Boudec J-Y L. Self-policing mobile Ad hoc net works by reputation systems. IEEE Communications Magazine, 2005, 43(7): 101-107
-
(2005)
IEEE Communications Magazine
, vol.43
, Issue.7
, pp. 101-107
-
-
Buchegger, S.1
Boudec, J.-Y.L.2
-
7
-
-
33646823968
-
A secure incentive architecture for Ad-hoc networks
-
He Q, Wu D, Khosl P. A secure incentive architecture for Ad-hoc networks. Wireless Communications and Mohile Computing, 2006, 6(3): 333-346
-
(2006)
Wireless Communications and Mohile Computing
, vol.6
, Issue.3
, pp. 333-346
-
-
He, Q.1
Wu, D.2
Khosl, P.3
-
8
-
-
0034541756
-
Mitigating routing misbehavior in mobile Ad hoc networks
-
Boston, ACM Press
-
Marti S, Giuli T J, Lai K, Baker M. Mitigating routing misbehavior in mobile Ad hoc networks//Proceedings of the Annual International Conference on Mobile Computing and Net working (MOBICOM). Boston, ACM Press, 2000: 255-265
-
(2000)
Proceedings of the Annual International Conference on Mobile Computing and Net working (MOBICOM)
, pp. 255-265
-
-
Marti, S.1
Giuli, T.J.2
Lai, K.3
Baker, M.4
-
13
-
-
33645673382
-
Nash equilibrium of packet forwarding strategies in wireless Ad hoc networks
-
Felegyhazi M, Buttyan L. Nash equilibrium of packet forwarding strategies in wireless Ad hoc networks. IEEE Transactions on Mobile Computing, 2006, 5(5): 463-475
-
(2006)
IEEE Transactions on Mobile Computing
, vol.5
, Issue.5
, pp. 463-475
-
-
Felegyhazi, M.1
Buttyan, L.2
-
16
-
-
33646847482
-
On-demand public-key management for mobile Ad hoc networks
-
Li R-D, Li J, Liu P, Chen H-H. On-demand public-key management for mobile Ad hoc networks. Wireless Communications and Mobile Computing, 2006, 6(3): 295-306
-
(2006)
Wireless Communications and Mobile Computing
, vol.6
, Issue.3
, pp. 295-306
-
-
Li, R.-D.1
Li, J.2
Liu, P.3
Chen, H.-H.4
-
19
-
-
33947624156
-
An acknowledgment-based approach for the detection of routing misbehavior in MANETs
-
Liu K, Deng J, Varshney P K, Balakrishnan K. An acknowledgment-based approach for the detection of routing misbehavior in MANETs. IEEE Transactions on Mobile Computing, 2007, 6(5): 488-501
-
(2007)
IEEE Transactions on Mobile Computing
, vol.6
, Issue.5
, pp. 488-501
-
-
Liu, K.1
Deng, J.2
Varshney, P.K.3
Balakrishnan, K.4
|