-
7
-
-
6444221582
-
Building a reference combinatorial model for MANETs
-
A. Ferreira. Building a reference combinatorial model for MANETs. IEEE Network, 18(5):24-29, 2007.
-
(2007)
IEEE Network
, vol.18
, Issue.5
, pp. 24-29
-
-
Ferreira, A.1
-
8
-
-
51249107652
-
Space-time routing in wireless networks with predictable mobility
-
Technical Report GIT-CC-04-07, College of Computing, Georgia Institute of Technology
-
S. Merugu, M. Ammar, and E. Zegura. Space-time routing in wireless networks with predictable mobility. In Technical Report GIT-CC-04-07, College of Computing, Georgia Institute of Technology, 2004.
-
(2004)
-
-
Merugu, S.1
Ammar, M.2
Zegura, E.3
-
9
-
-
0742285890
-
Daknet: Rethinking connectivity in developing nations
-
A. Pentland, R. Fletcher, and A. Hasson. Daknet: Rethinking connectivity in developing nations. IEEE Computer, 37(1):78-83, 2004.
-
(2004)
IEEE Computer
, vol.37
, Issue.1
, pp. 78-83
-
-
Pentland, A.1
Fletcher, R.2
Hasson, A.3
-
10
-
-
39149143349
-
MORA routing and capacity building in disruption-tolerant networks
-
June
-
B. Burns, O. Brock, and B. Levine. MORA routing and capacity building in disruption-tolerant networks. Elsevier Ad hoc Networks Journal, 6(4):600-620, June 2008.
-
(2008)
Elsevier Ad hoc Networks Journal
, vol.6
, Issue.4
, pp. 600-620
-
-
Burns, B.1
Brock, O.2
Levine, B.3
-
12
-
-
34547699980
-
Spray and focus: Efficient mobility-assisted routing for heterogeneous and correlated mobility
-
T. Spyropoulos, K. Psounis, and C. S. Raghavendra. Spray and focus: Efficient mobility-assisted routing for heterogeneous and correlated mobility. In Proc. of IEEE PERCOM, 2007.
-
(2007)
Proc. of IEEE PERCOM
-
-
Spyropoulos, T.1
Psounis, K.2
Raghavendra, C.S.3
-
13
-
-
34548321774
-
Detecting wormhole attacks in wireless networks using connectivity information
-
R. Maheshwari, J. Gao, and S. R. Das. Detecting wormhole attacks in wireless networks using connectivity information. In Proc. of IEEE INFOCOM, 2007.
-
(2007)
Proc. of IEEE INFOCOM
-
-
Maheshwari, R.1
Gao, J.2
Das, S.R.3
-
14
-
-
0036957315
-
Ariadne: A secure on-demand routing protocol for ad hoc networks
-
Y. Hu, A. Perrig, and D. Johnson. Ariadne: A secure on-demand routing protocol for ad hoc networks. In Proc. of ACM MobiCom, 2002.
-
(2002)
Proc. of ACM MobiCom
-
-
Hu, Y.1
Perrig, A.2
Johnson, D.3
-
16
-
-
4544259841
-
Sector: Secure tracking of node encounters in multi-hop wireless networks
-
S. Capkun, L. Buttyan, and J. Hubaux. Sector: Secure tracking of node encounters in multi-hop wireless networks. In Proc. of ACM SASN, 2003.
-
(2003)
Proc. of ACM SASN
-
-
Capkun, S.1
Buttyan, L.2
Hubaux, J.3
-
17
-
-
39049116456
-
A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks
-
Y. Sun, Z. Han, W. Yu, and K. Liu. A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks. In Proc. of IEEE INFOCOM, 2006.
-
(2006)
Proc. of IEEE INFOCOM
-
-
Sun, Y.1
Han, Z.2
Yu, W.3
Liu, K.4
-
19
-
-
2442597363
-
Performance analysis of the confidant protocol
-
S. Buchegger and J. Boudec. Performance analysis of the confidant protocol. In Proc. of ACM MobiHoc, pages 226-236, 2002.
-
(2002)
Proc. of ACM MobiHoc
, pp. 226-236
-
-
Buchegger, S.1
Boudec, J.2
-
20
-
-
85113133621
-
Core: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks
-
P. Michiardi and R. Molva. Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In Communications and Multimedia Security, pages 107-121, 2002.
-
(2002)
Communications and Multimedia Security
, pp. 107-121
-
-
Michiardi, P.1
Molva, R.2
-
21
-
-
34548359282
-
Mobility reduces uncertainty in MANETs
-
F. Li and J. Wu. Mobility reduces uncertainty in MANETs. In Proc. of IEEE INFOCOM, 2007.
-
(2007)
Proc. of IEEE INFOCOM
-
-
Li, F.1
Wu, J.2
|