-
3
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
Boston, MA, Aug
-
S. Marti, T. Giuli, K. Lai, and M. Baker, "Mitigating routing misbehavior in mobile ad hoc networks," in Proc. of The Sixth International Conference on Mobile Computing and Networking Networking (MobiCom 2000), Boston, MA, Aug. 2000. pp. 255-265.
-
(2000)
Proc. of The Sixth International Conference on Mobile Computing and Networking Networking (MobiCom 2000)
, pp. 255-265
-
-
Marti, S.1
Giuli, T.2
Lai, K.3
Baker, M.4
-
4
-
-
0037885580
-
Nodes bearing grudges: Towards routing security, fairness, and robustness in mobile ad hoc networks
-
Canary Islands, Spain, Jan
-
S. Buchegger and J.-Y. L. Boudec, "Nodes bearing grudges: Towards routing security, fairness, and robustness in mobile ad hoc networks," in Proc. 10th Euromicro Workshop on Parallel, Distributed and Network-based Processing, 2002, Canary Islands, Spain, Jan. 2002, pp. 403-410.
-
(2002)
Proc. 10th Euromicro Workshop on Parallel, Distributed and Network-based Processing, 2002
, pp. 403-410
-
-
Buchegger, S.1
Boudec, J.-Y.L.2
-
5
-
-
0242696192
-
Performance analysis of the CONFIDANT protocol: Cooperation of nodes - fairness in dynamic adhoc networks
-
Lausanne, Switzerland, Jun
-
S. Buchegger and J.-Y. L. Boudec, "Performance analysis of the CONFIDANT protocol: Cooperation of nodes - fairness in dynamic adhoc networks," in Proc. of IEEE/ACM Workshop on Mobile Ad Hoc Networking and Computing (MobiHoc 2002), Lausanne, Switzerland, Jun. 2002, pp. 226-236.
-
(2002)
Proc. of IEEE/ACM Workshop on Mobile Ad Hoc Networking and Computing (MobiHoc 2002)
, pp. 226-236
-
-
Buchegger, S.1
Boudec, J.-Y.L.2
-
6
-
-
84907706128
-
Reputation propagation and agreement in mobile ad-hoc networks
-
New Orleans, LA, March
-
Y. Liu and Y. R. Yang, "Reputation propagation and agreement in mobile ad-hoc networks," in Proc. of IEEE WCNC 2003, Vol. 3 New Orleans, LA, March 2003, pp. 1510-1515.
-
(2003)
Proc. of IEEE WCNC 2003
, vol.3
, pp. 1510-1515
-
-
Liu, Y.1
Yang, Y.R.2
-
7
-
-
84954161437
-
Enforcing service availability in mobile ad-hoc WANs
-
Boston, MA, Aug
-
L. Buttyan and J. P. Hubaux, "Enforcing service availability in mobile ad-hoc WANs," in Proc. of IEEE/ACM Workshop on Mobile Ad Hoc Networking and Computing (MobiHoc 2000), Boston, MA, Aug. 2000, pp. 87-96.
-
(2000)
Proc. of IEEE/ACM Workshop on Mobile Ad Hoc Networking and Computing (MobiHoc 2000)
, pp. 87-96
-
-
Buttyan, L.1
Hubaux, J.P.2
-
8
-
-
0042660545
-
Stimulating cooperation in self-organizing mobile ad hoc networks
-
L. Buttyan and J.-P. Hubaux, "Stimulating cooperation in self-organizing mobile ad hoc networks," ACM/Kluwer Mobile Networks and Applications, Vol. 8, No. 5, pp. 579-592, 2003.
-
(2003)
ACM/Kluwer Mobile Networks and Applications
, vol.8
, Issue.5
, pp. 579-592
-
-
Buttyan, L.1
Hubaux, J.-P.2
-
9
-
-
0035101078
-
Toward self-organized mobile ad hoc networks: The terminodes project
-
Jan
-
J.-P. Hubaux, T. Gross, J.-Y. L. Boudec, and M. Vetterli, "Toward self-organized mobile ad hoc networks: the terminodes project," IEEE Communications Magazine, Vol. 31, No. 1, pp. 118-124, Jan. 2001.
-
(2001)
IEEE Communications Magazine
, vol.31
, Issue.1
, pp. 118-124
-
-
Hubaux, J.-P.1
Gross, T.2
Boudec, J.-Y.L.3
Vetterli, M.4
-
10
-
-
35248817953
-
A micropayment scheme encouraging collaboration in multi-hop cellular networks
-
Proc. FC 2003, Springer-Verlag
-
M. Jakobsson, J.-P. Hubaux, and L. Buttyan, "A micropayment scheme encouraging collaboration in multi-hop cellular networks," in Proc. FC 2003, LNCS 2742, pp. 15-33, Springer-Verlag, 2003.
-
(2003)
LNCS
, vol.2742
, pp. 15-33
-
-
Jakobsson, M.1
Hubaux, J.-P.2
Buttyan, L.3
-
11
-
-
0042933944
-
Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks
-
Mar.-Apr
-
S. Zhong, J. Chen, and Y.R. Yang, "Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks," in Proc. INFOCOM 2003, Vol. 3, Mar.-Apr. 2003, pp. 1987-1997.
-
(2003)
Proc. INFOCOM 2003
, vol.3
, pp. 1987-1997
-
-
Zhong, S.1
Chen, J.2
Yang, Y.R.3
-
12
-
-
34547532527
-
A secure incentive protocol for mobile ad hoc networks
-
October
-
Y. Zhang, W. Lou, W. Liu, and Y. Fang, "A secure incentive protocol for mobile ad hoc networks", Wireless Networks (WINET), Vol 13, No. 5, October 2007.
-
(2007)
Wireless Networks (WINET)
, vol.13
, Issue.5
-
-
Zhang, Y.1
Lou, W.2
Liu, W.3
Fang, Y.4
-
13
-
-
0030646696
-
Optimistic protocols for fair exchange
-
Zurich, Switzerland, April
-
N. Asokan, M. Schunter, and M. Waidner, "Optimistic protocols for fair exchange", in Proc. of the 4st ACM conference on Computer and Communications Security (CCS) 1997, Zurich, Switzerland, April 1997, pp. 7-17.
-
(1997)
Proc. of the 4st ACM conference on Computer and Communications Security (CCS) 1997
, pp. 7-17
-
-
Asokan, N.1
Schunter, M.2
Waidner, M.3
-
14
-
-
35048854587
-
An efficient signature scheme from bilinear pairings and its applications
-
Proc. PKC 2004, Springer-Verlag
-
F. Zhang, R. Safavi-Nani, and W. Susilo, "An efficient signature scheme from bilinear pairings and its applications", in Proc. PKC 2004, LNCS 2947, pp. 277-290, Springer-Verlag, 2004.
-
(2004)
LNCS
, vol.2947
, pp. 277-290
-
-
Zhang, F.1
Safavi-Nani, R.2
Susilo, W.3
-
15
-
-
0348155942
-
Efficient verifiably encrypted signature and partially blind signature from bilinear pairings
-
Proc. INDOCRYPT 2003, Springer-Verlag
-
F. Zhang, R. Safavi-Nani, and W. Susilo, "Efficient verifiably encrypted signature and partially blind signature from bilinear pairings", in Proc. INDOCRYPT 2003, LNCS 2904, pp. 191-204, Springer-Verlag, 2003.
-
(2003)
LNCS
, vol.2904
, pp. 191-204
-
-
Zhang, F.1
Safavi-Nani, R.2
Susilo, W.3
-
16
-
-
38049146172
-
Batch verification of short signatures
-
Advances in Cryptology, EUROCRYPT 2007, Springer-Verlag
-
J. Camenisch, S. Hohenberger, and M. Pedersen, "Batch verification of short signatures", in Advances in Cryptology - EUROCRYPT 2007, LNCS 4515, pp. 246-263, Springer-Verlag, 2007.
-
(2007)
LNCS
, vol.4515
, pp. 246-263
-
-
Camenisch, J.1
Hohenberger, S.2
Pedersen, M.3
-
17
-
-
0003960505
-
On the impossibility of fair exchange without a trusted third party
-
Tech. Rep. TUD-BS-1999-02, Darmstadt University of Technology, March
-
H. Pagnia and F.C. Gartner, "On the impossibility of fair exchange without a trusted third party", Tech. Rep. TUD-BS-1999-02, Darmstadt University of Technology, March, 1999.
-
(1999)
-
-
Pagnia, H.1
Gartner, F.C.2
-
18
-
-
51649097814
-
-
International Standard ISO/IEC 8802-11, ANSI/IEEE Std 802.11, 1999 Edn.
-
International Standard ISO/IEC 8802-11, ANSI/IEEE Std 802.11, 1999 Edn.
-
-
-
-
19
-
-
84874324906
-
Identity-based encryption from the Weil pairing
-
Advances in Cryptology, CRYPTO 2001, Springer-Verlag
-
D. Boneh and M. Franklin, "Identity-based encryption from the Weil pairing", in Advances in Cryptology - CRYPTO 2001, LNCS 2139, pp. 213-229, Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
22
-
-
36749076982
-
GSIS: A secure and privacy preserving protocol for vehicular communications
-
X. Lin, X. Sun, P. H. Ho, and X. Shen, "GSIS: a secure and privacy preserving protocol for vehicular communications", IEEE Transaction on Vehicular Technology, Vol. 56, No. 6, pp. 3442-3456, 2007.
-
(2007)
IEEE Transaction on Vehicular Technology
, vol.56
, Issue.6
, pp. 3442-3456
-
-
Lin, X.1
Sun, X.2
Ho, P.H.3
Shen, X.4
|