-
2
-
-
35348887766
-
Intrusion Detection for Secure Clustering and Routing in Mobile Multi-hop Wireless Networks
-
L. Bononi, and C. Tacconi, "Intrusion Detection for Secure Clustering and Routing in Mobile Multi-hop Wireless Networks", International Journal of Information Security, Vol.6, 2007, pp. 379-392.
-
(2007)
International Journal of Information Security
, vol.6
, pp. 379-392
-
-
Bononi, L.1
Tacconi, C.2
-
3
-
-
33747371642
-
Performance evaluation of an anonymity providing protocol for wireless ad hoc networks
-
A. Boukerche, K. El-Khatib, L. Xu, and L. Korba, "Performance evaluation of an anonymity providing protocol for wireless ad hoc networks", Performance Evaluation, pp. 1094-1109, 2006.
-
(2006)
Performance Evaluation
, pp. 1094-1109
-
-
Boukerche, A.1
El-Khatib, K.2
Xu, L.3
Korba, L.4
-
4
-
-
42149101139
-
A novel solution based on mobile agent for anonymity in wireless and mobile ad hoc networks
-
A. Boukerche, and Y. Ren, "A novel solution based on mobile agent for anonymity in wireless and mobile ad hoc networks", Proceedings of 3rd ACM workshop on Q2SWinet, pp. 86-94, 2007.
-
(2007)
Proceedings of 3rd ACM workshop on Q2SWinet
, pp. 86-94
-
-
Boukerche, A.1
Ren, Y.2
-
5
-
-
34547358498
-
Determining Internet Users' Values for Private Information
-
S. Buffett, N. Scott, B. Spencer, M. M. Richter and M. W. Fleming, "Determining Internet Users' Values for Private Information", Proceedings of 2nd Annual Conference on PST, 2004, pp. 79-88.
-
(2004)
Proceedings of 2nd Annual Conference on PST
, pp. 79-88
-
-
Buffett, S.1
Scott, N.2
Spencer, B.3
Richter, M.M.4
Fleming, M.W.5
-
7
-
-
0000629443
-
Dynamic source routing in ad hoc wireless networks
-
D. B. Johnson and D. B. Maltz, "Dynamic source routing in ad hoc wireless networks", Mobile Computing, pp. 153-181, 1996.
-
(1996)
Mobile Computing
, pp. 153-181
-
-
Johnson, D.B.1
Maltz, D.B.2
-
8
-
-
34247385969
-
Cooperation monitoring issues in ad hoc networks
-
S. Laniepce, J. Demerjian, and A. Mokhtari, "Cooperation monitoring issues in ad hoc networks", Proceedings of Wireless communications and mobile computing, 2006, pp. 695-700.
-
(2006)
Proceedings of Wireless communications and mobile computing
, pp. 695-700
-
-
Laniepce, S.1
Demerjian, J.2
Mokhtari, A.3
-
9
-
-
51249123237
-
Group management for mobile ad hoc networks: Design, implementation and experiment
-
J. Liu, D. Sacchetti, F. Sailhan, and V. Issarny, "Group management for mobile ad hoc networks: design, implementation and experiment", Proceedings of the 6th conference on MDM, 2005, pp. 47-54.
-
(2005)
Proceedings of the 6th conference on MDM
, pp. 47-54
-
-
Liu, J.1
Sacchetti, D.2
Sailhan, F.3
Issarny, V.4
-
10
-
-
0141862713
-
The Meanings of Trust
-
Technical Report, University of Minnesota
-
D. H. McKnight, and N. L. Chervany, "The Meanings of Trust", Technical Report, University of Minnesota, 1996.
-
(1996)
-
-
McKnight, D.H.1
Chervany, N.L.2
-
11
-
-
51249102665
-
-
NS-2, available at
-
NS-2, available at http://www.isi.edu/nsnam/ns/.
-
-
-
-
13
-
-
84868712213
-
Dependable Dynamic Source Routing without a trusted third party
-
A. A. Pirzada, C. McDonald, and A. Datta, "Dependable Dynamic Source Routing without a trusted third party", Proceedings of the 28th Australasian conference on Computer Science, 2005, pp. 79-85.
-
(2005)
Proceedings of the 28th Australasian conference on Computer Science
, pp. 79-85
-
-
Pirzada, A.A.1
McDonald, C.2
Datta, A.3
-
14
-
-
34547245538
-
A Distributed Trust Establishment Scheme for Mobile Ad Hoc Networks
-
J. Sen, P. R. Chowdhury, and I. Sengupta, "A Distributed Trust Establishment Scheme for Mobile Ad Hoc Networks", Proceedings of Int'l Conf. on Computing: Theory and Applications, 2007, pp. 51-58.
-
(2007)
Proceedings of Int'l Conf. on Computing: Theory and Applications
, pp. 51-58
-
-
Sen, J.1
Chowdhury, P.R.2
Sengupta, I.3
-
15
-
-
33751529199
-
Securing Mobile Ad Hoc Networks with Certificateless Public Keys
-
Y. Zhang, W. Lou, W. Liu, and Y. Fang, "Securing Mobile Ad Hoc Networks with Certificateless Public Keys", IEEE Transactions on Dependable and Secure Computing, Vol. 3, 2006, pp. 386-399.
-
(2006)
IEEE Transactions on Dependable and Secure Computing
, vol.3
, pp. 386-399
-
-
Zhang, Y.1
Lou, W.2
Liu, W.3
Fang, Y.4
-
16
-
-
17144420084
-
Computing of trust in wireless networks
-
H. Zhu, F. Bao, and R. H. Deng, "Computing of trust in wireless networks", Proceedings of IEEE 60th VTC, 2004, pp. 26-29.
-
(2004)
Proceedings of IEEE 60th VTC
, pp. 26-29
-
-
Zhu, H.1
Bao, F.2
Deng, R.H.3
-
17
-
-
33745940320
-
A quantitative trust establishment framework for reliable data packet delivery in MANETs
-
C. Zouridaki, B. L. Mark, M. Hejmo, and R. K. Thomas, "A quantitative trust establishment framework for reliable data packet delivery in MANETs", Proceedings of ACM SASN, 2005, pp. 1-10.
-
(2005)
Proceedings of ACM SASN
, pp. 1-10
-
-
Zouridaki, C.1
Mark, B.L.2
Hejmo, M.3
Thomas, R.K.4
|