-
1
-
-
0036986441
-
An ondemand secure routing protocol resilient to byzantine failures
-
Atlanta, Georgia, September
-
Awerbuch B, Holmer D, Nita-Rotaru C, Rubens H. An ondemand secure routing protocol resilient to byzantine failures. In ACM Workshop on Wireless Security (WiSe'02), Atlanta, Georgia, September 2002.
-
(2002)
ACM Workshop on Wireless Security (WiSe'02)
-
-
Awerbuch, B.1
Holmer, D.2
Nita-Rotaru, C.3
Rubens, H.4
-
2
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
Boston, MA, USA
-
Marti S, Giuli T, Lai K, Baker M. Mitigating routing misbehavior in mobile ad hoc networks. In ACM Mobile Computing and Networking, MOBICOM 2000, Boston, MA, USA, 2000, pp. 255-265.
-
(2000)
ACM Mobile Computing and Networking, MOBICOM 2000
, pp. 255-265
-
-
Marti, S.1
Giuli, T.2
Lai, K.3
Baker, M.4
-
5
-
-
33744828999
-
Random feedbacks for selfish nodes detection in mobile ad hoc networks
-
The 5th IEEE InternationalWorkshop on IP Operations and Management, IPOM'05, Barcelona, Spain: Springer-Verlag GmbH, October
-
Djenouri D, Ouali N, Mahmoudi A, Badache N. Random feedbacks for selfish nodes detection in mobile ad hoc networks. In The 5th IEEE InternationalWorkshop on IP Operations and Management, IPOM'05, ser. LNCS, no. 3751. Barcelona, Spain: Springer-Verlag GmbH, October 2005, pp. 68-75.
-
(2005)
ser. LNCS
, vol.3751
, pp. 68-75
-
-
Djenouri, D.1
Ouali, N.2
Mahmoudi, A.3
Badache, N.4
-
6
-
-
84892591410
-
A survey of security issues in mobile ad hoc and sensor networks
-
Djenouri D, Khalladi L, Badache N. A survey of security issues in mobile ad hoc and sensor networks. IEEE Communications Surveys 2005; 7(4): 2-28.
-
(2005)
IEEE Communications Surveys
, vol.7
, Issue.4
, pp. 2-28
-
-
Djenouri, D.1
Khalladi, L.2
Badache, N.3
-
7
-
-
3042647758
-
A survey of secure wireless ad hoc routing
-
Hu Y-C, Perrig A. A survey of secure wireless ad hoc routing. IEEE Security and Privacy 2004; 2(3): 28-39.
-
(2004)
IEEE Security and Privacy
, vol.2
, Issue.3
, pp. 28-39
-
-
Hu, Y.-C.1
Perrig, A.2
-
8
-
-
0000629443
-
Dynamic source routing in ad hoc wireless networks
-
Imielinski T, Korth H eds, Kluwer Academic: Norwell, MA, USA
-
David B, David A. Dynamic source routing in ad hoc wireless networks. In Mobile Computing (vol. 353), Imielinski T, Korth H (eds). Kluwer Academic: Norwell, MA, USA, 1996; 153-181.
-
(1996)
Mobile Computing
, vol.353
, pp. 153-181
-
-
David, B.1
David, A.2
-
9
-
-
33744990823
-
A novel approach for selfish nodes detection in manets: Proposal and petri nets based modeling
-
Zagreb, Croatia, June
-
Djenouri D, Badache N. A novel approach for selfish nodes detection in manets: proposal and petri nets based modeling. In The 8th IEEE International Conference on Telecommunications (ConTel'05), Zagreb, Croatia, June 2005, pp. 569-574.
-
(2005)
The 8th IEEE International Conference on Telecommunications (ConTel'05)
, pp. 569-574
-
-
Djenouri, D.1
Badache, N.2
-
11
-
-
49749096357
-
-
Davison A. Bayesian Models, Chapter 11 in Manuscript. Springer, 2000.
-
Davison A. Bayesian Models, Chapter 11 in Manuscript. Springer, 2000.
-
-
-
-
12
-
-
33749685162
-
A robust reputation system for p2p and mobile ad-hoc networks
-
Harvard university, Cambridge, MA, USA, June
-
Buchegger S, Le-Boudec J-Y. A robust reputation system for p2p and mobile ad-hoc networks. In Second Workshop on the Economics of Peer-to-Peer Systems, Harvard university, Cambridge, MA, USA, June 2004.
-
(2004)
Second Workshop on the Economics of Peer-to-Peer Systems
-
-
Buchegger, S.1
Le-Boudec, J.-Y.2
-
13
-
-
0031652485
-
Glomosim: A library for the parallel simulation of large-scale wireless networks
-
Banff, Alberta, Canada, May
-
Zeng X, Bagrodia R, Gerla M. Glomosim: a library for the parallel simulation of large-scale wireless networks. In The 12th Workshop on Parallel and distributed Simulation. PADS'98, Banff, Alberta, Canada, May 1998, pp. 154-161.
-
(1998)
The 12th Workshop on Parallel and distributed Simulation. PADS'98
, pp. 154-161
-
-
Zeng, X.1
Bagrodia, R.2
Gerla, M.3
-
14
-
-
10444262976
-
Simulation performance evaluation of an energy efficient routing protocol for mobile ad hoc networks
-
American University of Beirut AUB, Lebanon, July
-
Djenouri D, Badache N. Simulation performance evaluation of an energy efficient routing protocol for mobile ad hoc networks. In IEEE International Conference on Pervasive Services (ICPS'04), American University of Beirut (AUB), Lebanon, July 2004.
-
(2004)
IEEE International Conference on Pervasive Services (ICPS'04)
-
-
Djenouri, D.1
Badache, N.2
-
15
-
-
0036980295
-
Self-organized network layer security in mobile ad hoc networks
-
Georgia, Atlanta, USA, September
-
Yang H, Meng X, Lu S. Self-organized network layer security in mobile ad hoc networks. In ACM MOBICOM Wireless Security Workshop (WiSe'02), Georgia, Atlanta, USA, September 2002.
-
(2002)
ACM MOBICOM Wireless Security Workshop (WiSe'02)
-
-
Yang, H.1
Meng, X.2
Lu, S.3
-
16
-
-
85113133621
-
Core: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks
-
Portoroz, Slovenia, September
-
Michiardi P, Molva R. Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In The 6th IFIP Communication and Multimedia Security Conference, Portoroz, Slovenia, September 2002.
-
(2002)
The 6th IFIP Communication and Multimedia Security Conference
-
-
Michiardi, P.1
Molva, R.2
-
17
-
-
0242696192
-
Performance analysis of the confidant, protocol cooperation of nodes fairness in dynamic ad hoc networks
-
Lausanne, Switzerland, June
-
Buchegger S, Boudec J-Y L. Performance analysis of the confidant, protocol cooperation of nodes fairness in dynamic ad hoc networks. In Third ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc'02), Lausanne, Switzerland, June 2002, pp. 80-91.
-
(2002)
Third ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc'02)
, pp. 80-91
-
-
Buchegger, S.1
Boudec, J.-Y.L.2
-
18
-
-
24944539915
-
Twoack: Preventing selfishness in mobile ad hoc networks
-
New Orleans, LA, USA, March
-
Balakrishnan K, Deng J, Varshney PK. Twoack: preventing selfishness in mobile ad hoc networks. In The IEEE Wireless Communications and Networking Conference (WCNC'05), New Orleans, LA, USA, March 2005, pp. 2137-2142.
-
(2005)
The IEEE Wireless Communications and Networking Conference (WCNC'05)
, pp. 2137-2142
-
-
Balakrishnan, K.1
Deng, J.2
Varshney, P.K.3
-
19
-
-
0004118144
-
Nuglets: A virtual currency to stimulate cooperation in self-organized mobile ad hoc networks. Swiss Federal Institute of Technology, Lausanne, Switzerland
-
Tech. Rep. DSC/2001/001
-
Buttyan L, Hubaux J. Nuglets: a virtual currency to stimulate cooperation in self-organized mobile ad hoc networks. Swiss Federal Institute of Technology, Lausanne, Switzerland, Tech. Rep. DSC/2001/001, 2001.
-
(2001)
-
-
Buttyan, L.1
Hubaux, J.2
-
20
-
-
0042660545
-
Stimulating cooperation in self-organizing mobile ad hoc networks
-
Buttyan L, Hubaux J. Stimulating cooperation in self-organizing mobile ad hoc networks. ACM/Kluwer Mobile Networks and Applications 2003; 8(5): 579-592.
-
(2003)
ACM/Kluwer Mobile Networks and Applications
, vol.8
, Issue.5
, pp. 579-592
-
-
Buttyan, L.1
Hubaux, J.2
-
21
-
-
0041939831
-
Cooperation in wireless ad hoc networks
-
San Francisco, California, USA, April
-
Srinivasan V, Nuggehalli P, Chiasserini CF, Rao RR. Cooperation in wireless ad hoc networks. In The 22st IEEE Annual Joint Conference on Computer Communications and Networking (INFOCOM'03), San Francisco, California, USA, April 2003.
-
(2003)
The 22st IEEE Annual Joint Conference on Computer Communications and Networking (INFOCOM'03)
-
-
Srinivasan, V.1
Nuggehalli, P.2
Chiasserini, C.F.3
Rao, R.R.4
-
22
-
-
33645655242
-
Low-cost routing in selfish and rational wireless ad hoc networks
-
Wang W, Li X-Y. Low-cost routing in selfish and rational wireless ad hoc networks. IEEE Transaction on Mobile Computing 2006; 5(5): 596-607.
-
(2006)
IEEE Transaction on Mobile Computing
, vol.5
, Issue.5
, pp. 596-607
-
-
Wang, W.1
Li, X.-Y.2
-
23
-
-
32144433522
-
On designing incentive-compatible routing and forwarding protocols in wireless ad-hoc networks: An integrated approach using game theoretical and cryptographic techniques
-
ACM Press
-
Zhong S, Li LE, Liu YG, Yang YR. On designing incentive-compatible routing and forwarding protocols in wireless ad-hoc networks: an integrated approach using game theoretical and cryptographic techniques. In The 11th annual international conference on Mobile computing and networking (MobiCom'05). ACM Press, 2005, pp. 117-131.
-
(2005)
The 11th annual international conference on Mobile computing and networking (MobiCom'05)
, pp. 117-131
-
-
Zhong, S.1
Li, L.E.2
Liu, Y.G.3
Yang, Y.R.4
-
24
-
-
1542287664
-
Secure data transmission in mobile ad hoc networks
-
San Diego, California, USA, September
-
Papadimitratos P, Haas ZJ. Secure data transmission in mobile ad hoc networks. In ACM MOBICOM Wireless Security Workshop (WiSe'03), San Diego, California, USA, September 2003.
-
(2003)
ACM MOBICOM Wireless Security Workshop (WiSe'03)
-
-
Papadimitratos, P.1
Haas, Z.J.2
-
25
-
-
33845491705
-
Improving the performability of data transfer in mobile ad hoc networks
-
Santa Clara, CA, USA, September
-
Conti M, Gregori E, Maselli G. Improving the performability of data transfer in mobile ad hoc networks. In the Second IEEE International Conference on Sensor and Ad Hoc Communications and Networks (SECON'05), Santa Clara, CA, USA, September 2005.
-
(2005)
the Second IEEE International Conference on Sensor and Ad Hoc Communications and Networks (SECON'05)
-
-
Conti, M.1
Gregori, E.2
Maselli, G.3
-
26
-
-
11844300974
-
Advanced detection of selfish or malicious nodes in ad hoc networks
-
Heidelberg, Germany, August 5-6
-
Kargl F, Klenk A, Weber M, Schlott S. Advanced detection of selfish or malicious nodes in ad hoc networks. In 1st European Workshop on Security in Ad-Hoc and Sensor Networks, ESAS'04, Heidelberg, Germany, August 5-6 2004.
-
(2004)
1st European Workshop on Security in Ad-Hoc and Sensor Networks, ESAS'04
-
-
Kargl, F.1
Klenk, A.2
Weber, M.3
Schlott, S.4
|