-
1
-
-
51349159708
-
Anonymity and security in delay tolerant networks
-
Sep
-
A. Kate, G. Zaverucha, and U. Hengartner, "Anonymity and security in delay tolerant networks," in Proc. SecureComm, Sep. 2007, pp. 504-513.
-
(2007)
Proc. SecureComm
, pp. 504-513
-
-
Kate, A.1
Zaverucha, G.2
Hengartner, U.3
-
2
-
-
70350330400
-
-
H. Zhu, R. Lu, X. Lin, and X. Shen, Security in service-oriented vehicular networks, IEEE Wireless Commun., Special Issue on Service-Oriented Broadband Wireless Network Architecture, 16, no. 4, Aug. 2009, to be published.
-
H. Zhu, R. Lu, X. Lin, and X. Shen, "Security in service-oriented vehicular networks," IEEE Wireless Commun., Special Issue on Service-Oriented Broadband Wireless Network Architecture, vol. 16, no. 4, Aug. 2009, to be published.
-
-
-
-
3
-
-
51349156734
-
ECPP: Efficient conditional privacy preservation protocol for secure vehicular communications
-
Phoenix, AZ, Apr. 14-18
-
R. Lu, X. Lin, H. Zhu, P. H. Ho, and X. Shen, "ECPP: Efficient conditional privacy preservation protocol for secure vehicular communications," in Proc. IEEE Infocom, Phoenix, AZ, Apr. 14-18, 2008, pp. 1229-1237.
-
(2008)
Proc. IEEE Infocom
, pp. 1229-1237
-
-
Lu, R.1
Lin, X.2
Zhu, H.3
Ho, P.H.4
Shen, X.5
-
4
-
-
34248646800
-
VADD: Vehicle-assisted data delivery in vehicular ad hoc networks
-
J. Zhao and G. Cao, "VADD: Vehicle-assisted data delivery in vehicular ad hoc networks," in Proc. Infocom, 2006, pp. 1-12.
-
(2006)
Proc. Infocom
, pp. 1-12
-
-
Zhao, J.1
Cao, G.2
-
5
-
-
57349133691
-
Bubble rap: Social-based forwarding in delay tolerant networks
-
P. Hui, J. Crowcroft, and E. Yoneki, "Bubble rap: Social-based forwarding in delay tolerant networks," in Proc. MobiHoc, 2008, pp. 241-250.
-
(2008)
Proc. MobiHoc
, pp. 241-250
-
-
Hui, P.1
Crowcroft, J.2
Yoneki, E.3
-
6
-
-
42649142915
-
Coupons: A multilevel incentive scheme for information dissemination in mobile networks
-
Jun
-
A. Garyfalos and K. C. Almeroth, "Coupons: A multilevel incentive scheme for information dissemination in mobile networks," IEEE Trans. Mobile Comput., vol. 7, no. 6, pp. 792-804, Jun. 2008.
-
(2008)
IEEE Trans. Mobile Comput
, vol.7
, Issue.6
, pp. 792-804
-
-
Garyfalos, A.1
Almeroth, K.C.2
-
7
-
-
39049095674
-
Impact of human mobility on the design of opportunistic forwarding algorithms
-
A. Chaintreau, P. Hui, J. Crowcroft, C. Diot, R. Gass, and J. Scott, "Impact of human mobility on the design of opportunistic forwarding algorithms," in Proc. IEEE Infocom, 2006, pp. 1-13.
-
(2006)
Proc. IEEE Infocom
, pp. 1-13
-
-
Chaintreau, A.1
Hui, P.2
Crowcroft, J.3
Diot, C.4
Gass, R.5
Scott, J.6
-
8
-
-
33745111889
-
Challenges: Building scalable mobile underwater wireless sensor networks for aquatic applications
-
May
-
J.-H. Cui, J. Kong, M. Gerla, and S. Zhou, "Challenges: Building scalable mobile underwater wireless sensor networks for aquatic applications," IEEE Netw. - Special Issue Wireless Sensor Netw., vol. 20, no. 3, pp. 12-18, May 2006.
-
(2006)
IEEE Netw. - Special Issue Wireless Sensor Netw
, vol.20
, Issue.3
, pp. 12-18
-
-
Cui, J.-H.1
Kong, J.2
Gerla, M.3
Zhou, S.4
-
9
-
-
40749113163
-
Efficient routing in intermittently connected mobile networks: The multiple-copy cast
-
Feb
-
T. Spyropoulos, K. Psounis, and C. S. Raghavendra, "Efficient routing in intermittently connected mobile networks: The multiple-copy cast," IEEE/ACM Trans. Netw., vol. 16, no. 1, pp. 77-90, Feb. 2008.
-
(2008)
IEEE/ACM Trans. Netw
, vol.16
, Issue.1
, pp. 77-90
-
-
Spyropoulos, T.1
Psounis, K.2
Raghavendra, C.S.3
-
10
-
-
40749157530
-
Efficient routing in intermittently connected mobile networks: The single-copy cast
-
Feb
-
T. Spyropoulos, K. Psounis, and C. S. Raghavendra, "Efficient routing in intermittently connected mobile networks: The single-copy cast," IEEE/ACM Trans. Netw., vol. 16, no. 1, pp. 63-76, Feb. 2008.
-
(2008)
IEEE/ACM Trans. Netw
, vol.16
, Issue.1
, pp. 63-76
-
-
Spyropoulos, T.1
Psounis, K.2
Raghavendra, C.S.3
-
11
-
-
21844451437
-
Routing in a delay tolerant network
-
S. Jain, K. Fall, and R. Patra, "Routing in a delay tolerant network," in Proc. ACM SIGCOMM, 2004, pp. 145-158.
-
(2004)
Proc. ACM SIGCOMM
, pp. 145-158
-
-
Jain, S.1
Fall, K.2
Patra, R.3
-
12
-
-
0003902865
-
-
Duke Univ, Durham, NC, Tech. Rep. CS-200006, Apr
-
A. Vahdat and D. Becker, "Epidemic routing for partially connected ad hoc networks," Duke Univ., Durham, NC, Tech. Rep. CS-200006, Apr. 2000.
-
(2000)
Epidemic routing for partially connected ad hoc networks
-
-
Vahdat, A.1
Becker, D.2
-
13
-
-
34347251103
-
Probabilistic routing in intermittently connected networks
-
A. Lindgren, A. Doria, and O. Schelen, "Probabilistic routing in intermittently connected networks," in Proc. SAPIR, 2004, pp. 239-254.
-
(2004)
Proc. SAPIR
, pp. 239-254
-
-
Lindgren, A.1
Doria, A.2
Schelen, O.3
-
14
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
Boston, MA, Aug
-
S. Marti, T. Giuli, K. Lai, and M. Baker, "Mitigating routing misbehavior in mobile ad hoc networks," in Proc. ACM Mobicom, Boston, MA, Aug. 2000, pp. 255-265.
-
(2000)
Proc. ACM Mobicom
, pp. 255-265
-
-
Marti, S.1
Giuli, T.2
Lai, K.3
Baker, M.4
-
15
-
-
4544283175
-
SORI: A secure and objective reputation-based incentive scheme for ad hoc networks
-
Atlanta, GA, Mar
-
Q. He, D. Wu, and P. Khosla, "SORI: A secure and objective reputation-based incentive scheme for ad hoc networks," in Proc. WCNC, Atlanta, GA, Mar. 2004, pp. 825-830.
-
(2004)
Proc. WCNC
, pp. 825-830
-
-
He, Q.1
Wu, D.2
Khosla, P.3
-
16
-
-
34548211355
-
A fine-grained reputation system for reliable service selection in peer-to-peer networks
-
Aug
-
Y. Zhang and Y. Fang, "A fine-grained reputation system for reliable service selection in peer-to-peer networks," IEEE Trans. Parallel Distrib. Syst., vol. 18, no. 8, pp. 1134-1145, Aug. 2007.
-
(2007)
IEEE Trans. Parallel Distrib. Syst
, vol.18
, Issue.8
, pp. 1134-1145
-
-
Zhang, Y.1
Fang, Y.2
-
17
-
-
0242696192
-
Performance analysis of the CONFIDANT protocol: Cooperation of nodes-fairness in distributed ad-hoc networks
-
Lausanne, Switzerland, Jun
-
S. Buchegger and J. Le Boudec, "Performance analysis of the CONFIDANT protocol: Cooperation of nodes-fairness in distributed ad-hoc networks," in Proc. IEEE/ACM MobiHoc, Lausanne, Switzerland, Jun. 2002, pp. 226-236.
-
(2002)
Proc. IEEE/ACM MobiHoc
, pp. 226-236
-
-
Buchegger, S.1
Le Boudec, J.2
-
18
-
-
34547532527
-
A secure incentive protocol for mobile ad hoc networks
-
Oct
-
Y. Zhang, W. Lou, W. Liu, and Y. Fang, "A secure incentive protocol for mobile ad hoc networks," Wirel. Netw., vol. 13, no. 5, pp. 569-582, Oct. 2007.
-
(2007)
Wirel. Netw
, vol.13
, Issue.5
, pp. 569-582
-
-
Zhang, Y.1
Lou, W.2
Liu, W.3
Fang, Y.4
-
19
-
-
37849009419
-
Secure incentives for commercial ad dissemination in vehicular networks
-
Sep
-
S. B. Lee, G. Pan, J.-S. Park, M. Gerla, and S. Lu, "Secure incentives for commercial ad dissemination in vehicular networks," in Proc. MobiHoc, Sep. 2007, pp. 150-159.
-
(2007)
Proc. MobiHoc
, pp. 150-159
-
-
Lee, S.B.1
Pan, G.2
Park, J.-S.3
Gerla, M.4
Lu, S.5
-
20
-
-
51649130466
-
A novel fair incentive protocol for mobile ad hoc networks
-
Las Vegas, NV, Mar. 31-Apr. 3
-
R. Lu, X. Lin, H. Zhu, C. Zhang, P. H. Ho, and X. Shen, "A novel fair incentive protocol for mobile ad hoc networks," in Proc. IEEE WCNC. Las Vegas, NV, Mar. 31-Apr. 3 2008, pp. 3237-3242.
-
(2008)
Proc. IEEE WCNC
, pp. 3237-3242
-
-
Lu, R.1
Lin, X.2
Zhu, H.3
Zhang, C.4
Ho, P.H.5
Shen, X.6
-
21
-
-
33645673382
-
Nash equilibria of packet forwarding strategies in wireless ad hoc networks
-
May
-
M. Felegyhazi, J.-P. Hubaux, and L. Buttyan, "Nash equilibria of packet forwarding strategies in wireless ad hoc networks," IEEE Trans. Mobile Comput., vol. 5, no. 5, pp. 463-476, May 2006.
-
(2006)
IEEE Trans. Mobile Comput
, vol.5
, Issue.5
, pp. 463-476
-
-
Felegyhazi, M.1
Hubaux, J.-P.2
Buttyan, L.3
-
22
-
-
42649121690
-
Security in vehicular ad hoc networks
-
Apr
-
X. Lin, R. Lu, C. Zhang, H. Zhu, P. H. Ho, and X. Shen, "Security in vehicular ad hoc networks," IEEE Commun. Mag., vol. 46, no. 4, pp. 88-95, Apr. 2008.
-
(2008)
IEEE Commun. Mag
, vol.46
, Issue.4
, pp. 88-95
-
-
Lin, X.1
Lu, R.2
Zhang, C.3
Zhu, H.4
Ho, P.H.5
Shen, X.6
-
23
-
-
33749041735
-
Practical security for disconnected nodes
-
Nov
-
A. Seth, U. Hengartner, and S. Keshav, "Practical security for disconnected nodes," in Proc. NPSec, Nov. 2005, pp. 31-36.
-
(2005)
Proc. NPSec
, pp. 31-36
-
-
Seth, A.1
Hengartner, U.2
Keshav, S.3
-
24
-
-
0042933944
-
Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks
-
S. Zhong, J. Chen, and Y. Yang, "Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks," in Proc. IEEE Infocom, 2003, pp. 1987-1997.
-
(2003)
Proc. IEEE Infocom
, pp. 1987-1997
-
-
Zhong, S.1
Chen, J.2
Yang, Y.3
-
25
-
-
34548493227
-
On designing incentive-compatible routing and forwarding protocols in wireless ad-hoc networks
-
Dec
-
S. Zhong, L. Li, Y. Liu, and Y. Yang, "On designing incentive-compatible routing and forwarding protocols in wireless ad-hoc networks," Wirel. Netw., vol. 13, no. 6, pp. 799-816, Dec. 2007.
-
(2007)
Wirel. Netw
, vol.13
, Issue.6
, pp. 799-816
-
-
Zhong, S.1
Li, L.2
Liu, Y.3
Yang, Y.4
-
26
-
-
34247251606
-
-
Feb, draft-irtf-dtnrg-bundle-security-05.txt, work-in-progress
-
S. Symington, S. Farrell, H. Weiss, and P. Lovell, Bundle Security Protocol Specification, Feb. 2008. draft-irtf-dtnrg-bundle-security-05.txt, work-in-progress.
-
(2008)
Bundle Security Protocol Specification
-
-
Symington, S.1
Farrell, S.2
Weiss, H.3
Lovell, P.4
-
27
-
-
84874324906
-
Identity based encryption from the Weil pairing
-
Proc. Crypto. New York: Springer-Verlag
-
D. Boneh and M. Franklin, "Identity based encryption from the Weil pairing," in Proc. Crypto. New York: Springer-Verlag, 2001, vol. 2139, LNCS, pp. 213-229.
-
(2001)
LNCS
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
28
-
-
66449108023
-
PPAB: A privacy preserving authentication and billing architecture for metropolitan area sharing networks
-
Jun
-
H. Zhu, X. Lin, M. Shi, P.-H. Ho, and X. Shen, "PPAB: A privacy preserving authentication and billing architecture for metropolitan area sharing networks," IEEE Trans. Veh. Technol., vol. 58, no. 5, pp. 2529-2543, Jun. 2009.
-
(2009)
IEEE Trans. Veh. Technol
, vol.58
, Issue.5
, pp. 2529-2543
-
-
Zhu, H.1
Lin, X.2
Shi, M.3
Ho, P.-H.4
Shen, X.5
-
29
-
-
55149100626
-
SLAB: Secure localized authentication and billing scheme for wireless mesh networks
-
Oct
-
H. Zhu, X. Lin, R. Lu, P. H. Ho, and X. Sheng, "SLAB: Secure localized authentication and billing scheme for wireless mesh networks," IEEE Trans. Wireless Commun., vol. 17, no. 10, pp. 3858-3868, Oct. 2008.
-
(2008)
IEEE Trans. Wireless Commun
, vol.17
, Issue.10
, pp. 3858-3868
-
-
Zhu, H.1
Lin, X.2
Lu, R.3
Ho, P.H.4
Sheng, X.5
-
30
-
-
23044435711
-
Short signatures from the Weil pairing
-
Sep
-
D. Boneh, B. Lynn, and H. Shacham, "Short signatures from the Weil pairing," J. Cryptol., vol. 17, no. 4, pp. 297-319, Sep. 2004.
-
(2004)
J. Cryptol
, vol.17
, Issue.4
, pp. 297-319
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
31
-
-
44649172478
-
DTN: An architectural retrospective
-
Jun
-
S. Farrell and V. Cahill, "DTN: An architectural retrospective," IEEE J. Sel. Areas Commun., vol. 26, no. 5, pp. 828-836, Jun. 2008.
-
(2008)
IEEE J. Sel. Areas Commun
, vol.26
, Issue.5
, pp. 828-836
-
-
Farrell, S.1
Cahill, V.2
-
32
-
-
52049092314
-
Message fragmentation in opportunistic DTNs
-
M. Pitkanen, M. Keranen, and J. Ott, "Message fragmentation in opportunistic DTNs," in Proc. WoWMoM, 2008, pp. 1-7.
-
(2008)
Proc. WoWMoM
, pp. 1-7
-
-
Pitkanen, M.1
Keranen, M.2
Ott, J.3
-
33
-
-
84920380941
-
Protocols for public key cryptosystems
-
R. Merkle, "Protocols for public key cryptosystems," in Proc. IEEE SP, 1980, pp. 122-133.
-
(1980)
Proc. IEEE SP
, pp. 122-133
-
-
Merkle, R.1
-
35
-
-
35448931599
-
Applicability of identity-based cryptography for disruption-tolerant networking
-
Jun
-
N. Asokan, K. Kostiainen, P. Ginzboorg, J. Ott, and C. Luo, "Applicability of identity-based cryptography for disruption-tolerant networking," in Proc. 1st Int. MobiOpp, Jun. 2007, pp. 52-56.
-
(2007)
Proc. 1st Int. MobiOpp
, pp. 52-56
-
-
Asokan, N.1
Kostiainen, K.2
Ginzboorg, P.3
Ott, J.4
Luo, C.5
-
36
-
-
70350244957
-
-
Available
-
The One Simulator. [Online]. Available: http://www.netlab.tkk.fi/ tutkimus/dtn/theone/
-
The One Simulator. [Online]
-
-
-
37
-
-
35248844436
-
An identity-based signature from gap Diffie-Hellman groups
-
J. C. Cha and J. H. Cheon, "An identity-based signature from gap Diffie-Hellman groups," in Proc. PKC, 2003, vol. 2567, pp. 18-30.
-
(2003)
Proc. PKC
, vol.2567
, pp. 18-30
-
-
Cha, J.C.1
Cheon, J.H.2
|