-
1
-
-
13944266651
-
A delay tolerant network architecture for challengednetworks
-
K. Fall, " A delay tolerant network architecture for challengednetworks", Proceedings of ACM Sigcomm, 2003.
-
(2003)
Proceedings of ACM Sigcomm
-
-
Fall, K.1
-
2
-
-
77951592282
-
Delay tolerant networking architecture
-
April
-
V. Cerf et al, "Delay Tolerant Networking Architecture", RFC4838, April, 2007.
-
(2007)
RFC4838
-
-
Cerf, V.1
-
4
-
-
39049118503
-
Maxprop: Routing for vehicle-based disruption tolerant networks
-
J. Burgess et al, "MaxProp: Routing for vehicle-based disruption tolerant networks", Proceedings of IEEE Infocom, 2006.
-
(2006)
Proceedings of IEEE Infocom
-
-
Burgess, J.1
-
5
-
-
36349001541
-
Message ferry route design for sparse Ad hoc networks with mobile nodes
-
May22-25
-
M.M.B. Tariq, M. Ammar, and E. Zegura, "Message Ferry Route Design for Sparse Ad hoc Networks with Mobile Nodes", ACM MobiHoc, May22-25, 2006.
-
(2006)
ACM MobiHoc
-
-
Tariq, M.M.B.1
Ammar, M.2
Zegura, E.3
-
6
-
-
29244444837
-
Routing in a delay tolerant network
-
Aug. 30-Sept.
-
S. Jain, K. Fall, and R. Patra, "Routing in a Delay Tolerant Network", SIGCOMM'04, Aug. 30-Sept. 3, 2004.
-
(2004)
SIGCOMM'04
, vol.3
-
-
Jain, S.1
Fall, K.2
Patra, R.3
-
7
-
-
47949110318
-
Erasure-coding based routing for opportunistic networks
-
Y. Wang et al, "Erasure-Coding Based Routing for Opportunistic Networks", Proceedings of ACM workshop on WDTN, 2005.
-
(2005)
Proceedings of ACM Workshop on WDTN
-
-
Wang, Y.1
-
8
-
-
33847749302
-
Using redundancy to cope with failures in a delay tolerant network
-
Philadelphia, PA, Aug
-
S. Jain, M. Demmer, R. Patra, K. Fall, "Using Redundancy to Cope with Failures in a Delay Tolerant Network", Proceedings of ACM Sigcomm, Philadelphia, PA, Aug, 2005.
-
(2005)
Proceedings of ACM Sigcomm
-
-
Jain, S.1
Demmer, M.2
Patra, R.3
Fall, K.4
-
9
-
-
37749011061
-
XORs in the air: Practical wireless network coding
-
S. Katti et al, "XORs in the Air: Practical Wireless Network Coding", Proceedings of ACM Sigcomm, 2006.
-
(2006)
Proceedings of ACM Sigcomm
-
-
Katti, S.1
-
10
-
-
51949087889
-
Efficient routing in intermittently connected mobile networks: Multiple copy case
-
to appear in
-
T. Spyropoulos et al, "Efficient routing in intermittently connected mobile networks: multiple copy case" to appear in IEEE/ACM Transactions on Networking, 2007.
-
(2007)
IEEE/ACM Transactions on Networking
-
-
Spyropoulos, T.1
-
12
-
-
44649192154
-
Efficient network coded data transmissions in disruption tolerant networks
-
April
-
Y. Lin, B. Li, B. Liang, "Efficient Network Coded Data Transmissions In Disruption Tolerant Networks", Proceedings of IEEE Infocom, April, 2008.
-
(2008)
Proceedings of IEEE Infocom
-
-
Lin, Y.1
Li, B.2
Liang, B.3
-
14
-
-
36949027308
-
Trading structure for randomness in wireless opportunistic routing
-
S. Chachulski et al, "Trading Structure For Randomness in Wireless Opportunistic Routing", Proceedings of ACM Sigcomm, 2007.
-
(2007)
Proceedings of ACM Sigcomm
-
-
Chachulski, S.1
-
15
-
-
17444426121
-
Ariadne : A secure on-demand routing protocol for ad hoc networks
-
Y. C. Hu, A. Perrig, D. B. Johnson, "Ariadne : a secure on-demand routing protocol for ad hoc networks", Wireless Networks, Vol 11, No 1-2 pp 21-28, 2005.
-
(2005)
Wireless Networks
, vol.11
, Issue.1-2
, pp. 21-28
-
-
Hu, Y.C.1
Perrig, A.2
Johnson, D.B.3
-
16
-
-
0041973497
-
Packet leashes: A defense against wormhole attacks in wireless ad hoc networks
-
Y.C. Hu, A. Perrig, D. B. Johnson, "Packet leashes: a defense against wormhole attacks in wireless ad hoc networks", Proceedings of IEEE Infocom, 2003.
-
(2003)
Proceedings of IEEE Infocom
-
-
Hu, Y.C.1
Perrig, A.2
Johnson, D.B.3
-
17
-
-
46149096001
-
Truelink: A practical countermeasure to the wormhole attack in wireless networks
-
J. Eriksson, S. Krishnamurthy, M. Faloutsos, "TrueLink: A practical countermeasure to the wormhole attack in wireless networks", Proceedings of ICNP, 2006.
-
(2006)
Proceedings of ICNP
-
-
Eriksson, J.1
Krishnamurthy, S.2
Faloutsos, M.3
-
18
-
-
34548321774
-
Detecting wormhole attacks in wireless networks using connectivity information
-
R. Maheshwari et al, "Detecting Wormhole Attacks in Wireless Networks Using Connectivity Information", Proceedings of IEEE Infocom, 2007.
-
(2007)
Proceedings of IEEE Infocom
-
-
Maheshwari, R.1
-
19
-
-
51849139830
-
DCAR: Distributed coding-aware routing in wireless networks
-
J. Le, J. S. Liu, D. M. Chiu, "DCAR: distributed coding-aware routing in wireless networks", Proceedings of ICDCS, 2008.
-
(2008)
Proceedings of ICDCS
-
-
Le, J.1
Liu, J.S.2
Chiu, D.M.3
-
21
-
-
58049209586
-
Toward secure network coding in wireless networks: Threats and challenges
-
NPSEC, Oct
-
J. Dong, R. Curtmola, R. Sethi, C. Nita-Rotaru, "Toward Secure Network Coding in Wireless Networks: Threats and Challenges", Proceedings of Fourth Workshop on Secure Network Protocols, NPSEC, Oct, 2008.
-
(2008)
Proceedings of Fourth Workshop on Secure Network Protocols
-
-
Dong, J.1
Curtmola, R.2
Sethi, R.3
Nita-Rotaru, C.4
-
22
-
-
35148872603
-
Comparison of two intrusion detection schemes for sparsely connected Ad Hoc networks
-
Oct
-
M. Chuah, P. Yang, "Comparison of Two Intrusion Detection Schemes for Sparsely Connected Ad Hoc Networks", Proceedings of IEEE Milcom, Oct, 2006.
-
(2006)
Proceedings of IEEE Milcom
-
-
Chuah, M.1
Yang, P.2
-
23
-
-
70449091587
-
How mobility model affects the design of network coding schemes in DTNs
-
Sept
-
M. Chuah, P. Yang, Y. Xi, "How Mobility Model Affects the Design of Network Coding Schemes in DTNs", Lehigh CSE Technical Report, LU-CSE-08-004, Sept, 2008.
-
(2008)
Lehigh CSE Technical Report, LU-CSE-08-004
-
-
Chuah, M.1
Yang, P.2
Xi, Y.3
|