-
2
-
-
13844296355
-
Wireless mesh networks: a survey
-
Akyildiz, I.F., Wang, X. and Wang, W. (2005) ‘Wireless mesh networks: a survey’, Computer Networks Journal (Elsevier), Vol. 47, No. 4, pp.445–487.
-
(2005)
Computer Networks Journal (Elsevier)
, vol.47
, Issue.4
, pp. 445-487
-
-
Akyildiz, I.F.1
Wang, X.2
Wang, W.3
-
3
-
-
4544342186
-
Best current practices for Wireless Internet Service Provider (WISP) roaming, version 1.0.
-
Anton, B., Bullock, B. and Short, J. (2003) ‘Best current practices for Wireless Internet Service Provider (WISP) roaming, version 1.0.’, Wi-Fi Alliance.
-
(2003)
Wi-Fi Alliance
-
-
Anton, B.1
Bullock, B.2
Short, J.3
-
4
-
-
33751044073
-
Talking to strangers: authentication in ad-hoc wireless networks
-
Balfanz, D., Smetters, D., Stewart, P. and Wong, H. (2002) ‘Talking to strangers: authentication in ad-hoc wireless networks’, Proceedings of the Symposium on Network and Distributed Systems Security (NDSS).
-
(2002)
Proceedings of the Symposium on Network and Distributed Systems Security (NDSS)
-
-
Balfanz, D.1
Smetters, D.2
Stewart, P.3
Wong, H.4
-
6
-
-
0036279627
-
Integration of IP mobility and security for secure wireless communications
-
Barton, M., Lee, J., Narain, S., Wong, K.D., Atkins, D., Ritcherson, D. and Tepe, K.E. (2002) ‘Integration of IP mobility and security for secure wireless communications’, Proceedings of IEEE International Conference on Communications (ICC), pp.1045–1049.
-
(2002)
Proceedings of IEEE International Conference on Communications (ICC)
, pp. 1045-1049
-
-
Barton, M.1
Lee, J.2
Narain, S.3
Wong, K.D.4
Atkins, D.5
Ritcherson, D.6
Tepe, K.E.7
-
7
-
-
0242527340
-
A charging and rewarding scheme for packet forwarding in multi-hop cellular networks
-
Ben Salem, N., Buttyan, L., Hubaux, J-P. and Jakobsson, M. (2003) ‘A charging and rewarding scheme for packet forwarding in multi-hop cellular networks’, Proceedings of Forth ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), pp.13–24.
-
(2003)
Proceedings of Forth ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc)
, pp. 13-24
-
-
Ben Salem, N.1
Buttyan, L.2
Hubaux, J.-P.3
Jakobsson, M.4
-
8
-
-
3042829810
-
Integrating hterogeneous wireless technologies: a cellular-assisted mobile ad hoc networks
-
Bhargava, B., Wu, X., Lu, Y. and Wang, W. (2004) ‘Integrating hterogeneous wireless technologies: a cellular-assisted mobile ad hoc networks’, Mobile Network and Applications, Vol. 9, No. 4, pp.393–408.
-
(2004)
Mobile Network and Applications
, vol.9
, Issue.4
, pp. 393-408
-
-
Bhargava, B.1
Wu, X.2
Lu, Y.3
Wang, W.4
-
10
-
-
33746344974
-
ICAM: integrated cellular and ad-hoc multicast
-
Bhatia, R., Li, L.E., Luo, H. and Ramjee, R. (2006) ‘ICAM: integrated cellular and ad-hoc multicast’, IEEE Transactions on Mobile Computing, Vol. 5, No. 8, pp. 1004-1015.
-
(2006)
IEEE Transactions on Mobile Computing
, vol.5
, Issue.8
, pp. 1004-1015
-
-
Bhatia, R.1
Li, L.E.2
Luo, H.3
Ramjee, R.4
-
15
-
-
0042660545
-
Stimulating cooperation in self-organizing mobile ad hoc networks
-
Buttyan, L. and Hubaux, J-P. (2003) ‘Stimulating cooperation in self-organizing mobile ad hoc networks’, Mobile Networks and Applications, Vol. 8, No. 5, pp.579–592.
-
(2003)
Mobile Networks and Applications
, vol.8
, Issue.5
, pp. 579-592
-
-
Buttyan, L.1
Hubaux, J.-P.2
-
17
-
-
0242678584
-
Self-organized public-key management for mobile ad hoc networks
-
Capkun, S., Buttyan, L. and Hubaux, J-P. (2003) ‘Self-organized public-key management for mobile ad hoc networks’, IEEE Transactions on Mobile Computing, Vol. 2, No. 1, pp.52–64.
-
(2003)
IEEE Transactions on Mobile Computing
, vol.2
, Issue.1
, pp. 52-64
-
-
Capkun, S.1
Buttyan, L.2
Hubaux, J.-P.3
-
19
-
-
28444433009
-
Random key predistribution schemes for sensor networks
-
Chan, H., Perrig, A. and Song, D. (2003) ‘Random key predistribution schemes for sensor networks’, Proceedings of the 2003 Symposium on Security and Privacy, pp.197–215.
-
(2003)
Proceedings of the 2003 Symposium on Security and Privacy
, pp. 197-215
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
20
-
-
0033154266
-
Internet-based mobile ad hoc networking
-
Corson, M., Maker, J. and Cernicione, J. (1999) ‘Internet-based mobile ad hoc networking’, IEEE Internet Computing, Vol. 3, No. 4, pp.63–70.
-
(1999)
IEEE Internet Computing
, vol.3
, Issue.4
, pp. 63-70
-
-
Corson, M.1
Maker, J.2
Cernicione, J.3
-
21
-
-
0003956839
-
-
IETF Request for Comments 2246
-
Dierks, T. and Allen, C. (1999) ‘The TLS protocol’, Available at: http://www.ietf.org/rfc/rfc2246.txt. IETF Request for Comments 2246.
-
(1999)
The TLS protocol
-
-
Dierks, T.1
Allen, C.2
-
22
-
-
3042783638
-
A pairwise key pre-distribution scheme for wireless sensor networks
-
Du, W., Deng, J., Han, Y. and Varshney, P. (2003) ‘A pairwise key pre-distribution scheme for wireless sensor networks’, Proceedings of the Tenth ACM Conference on Computer and Communications Security (CCS), pp.42–51.
-
(2003)
Proceedings of the Tenth ACM Conference on Computer and Communications Security (CCS)
, pp. 42-51
-
-
Du, W.1
Deng, J.2
Han, Y.3
Varshney, P.4
-
23
-
-
33745796561
-
Exploiting open functionality in SMS-capable cellular networks
-
Enck, W., Traynor, P., McDaniel, P. and La Porta, T. (2005) ‘Exploiting open functionality in SMS-capable cellular networks’, Proceedings of the 12th ACM Conference on Computer and Communications Security (CCS), pp.393–404.
-
(2005)
Proceedings of the 12th ACM Conference on Computer and Communications Security (CCS)
, pp. 393-404
-
-
Enck, W.1
Traynor, P.2
McDaniel, P.3
La Porta, T.4
-
27
-
-
2642587068
-
-
Technical Report 66, Department of Computer Science, Trinity College, Dublin
-
Gray, E., O’Connell, P., Jensen, C., Weber, S., Seigneur, J. and Yong, C. (2002) ‘Towards a framework for assessing trust-based admission control in collaborative ad hoc applications’, Technical Report 66, Department of Computer Science, Trinity College, Dublin.
-
(2002)
Towards a framework for assessing trust-based admission control in collaborative ad hoc applications
-
-
Gray, E.1
O’Connell, P.2
Jensen, C.3
Weber, S.4
Seigneur, J.5
Yong, C.6
-
28
-
-
0034445661
-
System architecture directions for networked sensors
-
Hill, J., Szewczyk, R., Woo, A., Hollar, S., Culler, D. and Pister, K. (2000) ‘System architecture directions for networked sensors’, Proceedings of Ninth International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS), pp.93–104.
-
(2000)
Proceedings of Ninth International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS)
, pp. 93-104
-
-
Hill, J.1
Szewczyk, R.2
Woo, A.3
Hollar, S.4
Culler, D.5
Pister, K.6
-
32
-
-
35248817953
-
A micropayment scheme encouraging collaboration in multi-hop cellular networks
-
Jakobsson, M., Hubaux, J-P. and Buttyan, L. (2003) ‘A micropayment scheme encouraging collaboration in multi-hop cellular networks’, Lecture Notes in Computer Science, Vol. 2742, pp.15–33.
-
(2003)
Lecture Notes in Computer Science
, vol.2742
, pp. 15-33
-
-
Jakobsson, M.1
Hubaux, J.-P.2
Buttyan, L.3
-
35
-
-
0000000447
-
Emerging challenges: mobile networking for smart dust
-
Kahn, J., Katz, R. and Pister, K. (2000) ‘Emerging challenges: mobile networking for smart dust’, Journal of Communications and Networks, Vol. 2, No. 3, pp.188–196.
-
(2000)
Journal of Communications and Networks
, vol.2
, Issue.3
, pp. 188-196
-
-
Kahn, J.1
Katz, R.2
Pister, K.3
-
36
-
-
4644320619
-
Performance evaluation of public key based authentication in future mobile communication systems
-
Kambourakis, G., Rouskas, A. and Gritzalis, S. (2004) ‘Performance evaluation of public key based authentication in future mobile communication systems’, EURASIP Journal on Wireless Communications and Networking, Vol. 2004, No. 1, pp.184–197.
-
(2004)
EURASIP Journal on Wireless Communications and Networking
, vol.2004
, Issue.1
, pp. 184-197
-
-
Kambourakis, G.1
Rouskas, A.2
Gritzalis, S.3
-
38
-
-
26444574670
-
TinySec: a link layer security architecture for wireless sensor networks
-
Karlof, C., Sastry, N. and Wagner, D. (2004) ‘TinySec: a link layer security architecture for wireless sensor networks’, Proceedings of the Second ACM Conference on Embedded Networked Sensor Systems, pp.162–175.
-
(2004)
Proceedings of the Second ACM Conference on Embedded Networked Sensor Systems
, pp. 162-175
-
-
Karlof, C.1
Sastry, N.2
Wagner, D.3
-
40
-
-
0345755816
-
Adaptive security for multi-level ad-hoc networks
-
Kong, J., Luo, H., Xu, K., Lihui Gu, D., Gerla, M. and Lu, S. (2002a) ‘Adaptive security for multi-level ad-hoc networks’, Wireless Communications and Mobile Computing, Vol. 2, No. 5, pp.533–547.
-
(2002)
Wireless Communications and Mobile Computing
, vol.2
, Issue.5
, pp. 533-547
-
-
Kong, J.1
Luo, H.2
Xu, K.3
Lihui, G.D.4
Gerla, M.5
Lu, S.6
-
41
-
-
27744573242
-
Providing multi-layer security support for wireless communications across multiple trusted domains
-
Computer Science Department, UCLA
-
Kong, J., Gerla, M., Prabhu, B.S. and Gadh, R. (2002b) ‘Providing multi-layer security support for wireless communications across multiple trusted domains’, Technical Report 020032, Computer Science Department, UCLA.
-
(2002)
Technical Report 020032
-
-
Kong, J.1
Gerla, M.2
Prabhu, B.S.3
Gadh, R.4
-
44
-
-
0037715383
-
Charging support for ad hoc stub networks
-
Lamparter, B., Paul, K. and Westhoff, D. (2003) ‘Charging support for ad hoc stub networks’, Journal of Computer Communication, Vol. 26, No. 13, pp.1504—1515.
-
(2003)
Journal of Computer Communication
, vol.26
, Issue.13
, pp. 1504-1515
-
-
Lamparter, B.1
Paul, K.2
Westhoff, D.3
-
46
-
-
0034772467
-
Analysis of cone-based distributed topology control algorithm for wireless multi-hop networks
-
Li, L., Halpen, J.Y., Bahl, P., Wangand, Y. and Wattenhofer, R. (2001) ‘Analysis of cone-based distributed topology control algorithm for wireless multi-hop networks’, Proceedings of ACM Principles of Distributed Computing Conference (PODC’01), pp.264–273.
-
(2001)
Proceedings of ACM Principles of Distributed Computing Conference (PODC’01)
, pp. 264-273
-
-
Li, L.1
Halpen, J.Y.2
Bahl, P.3
Wangand, Y.4
Wattenhofer, R.5
-
47
-
-
28044469699
-
A novel caching scheme for improving internet-based mobile ad hoc networks performance
-
Lim, S., Lee, W., Cao, G., Das, C. (2006) ‘A novel caching scheme for improving internet-based mobile ad hoc networks performance’, Ad Hoc Networks, Vol. 4, No. 2, pp.225–239.
-
(2006)
Ad Hoc Networks
, vol.4
, Issue.2
, pp. 225-239
-
-
Lim, S.1
Lee, W.2
Cao, G.3
Das, C.4
-
48
-
-
0033890503
-
Multihop cellular: a new architecture for wireless communications
-
Lin, Y. and Hsu, Y., (2000) ‘Multihop cellular: a new architecture for wireless communications’, Proceedings of IEEE INFOCOM 2000, pp.1273–1282.
-
(2000)
Proceedings of IEEE INFOCOM 2000
, pp. 1273-1282
-
-
Lin, Y.1
Hsu, Y.2
-
49
-
-
0034997115
-
Transmission scheduling for efficient wireless utilization
-
Liu, X., Chong, E. and Shroff, N. (2001) ‘Transmission scheduling for efficient wireless utilization’, Proceedings of IEEE INFOCOM 2001, pp.776–785.
-
(2001)
Proceedings of IEEE INFOCOM 2001
, pp. 776-785
-
-
Liu, X.1
Chong, E.2
Shroff, N.3
-
52
-
-
1542358969
-
UCAN: a unified cellular and ad-hoc network architecture
-
Luo, H., Ramjee, R., Sinha, P., Li, L. and Lu, S. (2003) ‘UCAN: a unified cellular and ad-hoc network architecture’, Proceedings of the Ninth Annual International Conference on Mobile Computing and Networking (MobiCom). pp.353–367.
-
(2003)
Proceedings of the Ninth Annual International Conference on Mobile Computing and Networking (MobiCom)
, pp. 353-367
-
-
Luo, H.1
Ramjee, R.2
Sinha, P.3
Li, L.4
Lu, S.5
-
53
-
-
84978428047
-
TAG: a tiny aggregation service for ad-hoc sensor networks
-
Madden, S., Franklin, M., Hellerstein, J. and Hong, W. (2002) ‘TAG: a tiny aggregation service for ad-hoc sensor networks’, Proceedings of the Fifth Symposium on Operating Systems Design and Implementation (OSDI 2002).
-
(2002)
Proceedings of the Fifth Symposium on Operating Systems Design and Implementation (OSDI 2002)
-
-
Madden, S.1
Franklin, M.2
Hellerstein, J.3
Hong, W.4
-
56
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
Marti, S., Giuli, T., Lai, K. and Baker, M. (2000) ‘Mitigating routing misbehavior in mobile ad hoc networks’, Proceedings of ACM Mobile Computing and Networking, pp.255–265.
-
(2000)
Proceedings of ACM Mobile Computing and Networking
, pp. 255-265
-
-
Marti, S.1
Giuli, T.2
Lai, K.3
Baker, M.4
-
57
-
-
1642412044
-
Secure authentication system for public WLAN roaming
-
Matsunaga, Y., Merino, A.S., Suzuki, T. and Katz, R.H. (2003) ‘Secure authentication system for public WLAN roaming’, Proceedings of First ACM International Workshop on Wireless Mobile Applications and Services on WLAN Hotspots (WMASH), pp.113–121.
-
(2003)
Proceedings of First ACM International Workshop on Wireless Mobile Applications and Services on WLAN Hotspots (WMASH)
, pp. 113-121
-
-
Matsunaga, Y.1
Merino, A.S.2
Suzuki, T.3
Katz, R.H.4
-
61
-
-
0033690336
-
Efficient authentication and signing of multicast streams over lossy channels
-
Perrig, A., Canetti, R., Tygar, J. and Song, D. (2000) ‘Efficient authentication and signing of multicast streams over lossy channels’, Proceedings of the 21st IEEE Symposium on Security and Privacy, pp.56–73.
-
(2000)
Proceedings of the 21st IEEE Symposium on Security and Privacy
, pp. 56-73
-
-
Perrig, A.1
Canetti, R.2
Tygar, J.3
Song, D.4
-
62
-
-
0034771605
-
SPINS: security protocols for sensor networks
-
Perrig, A., Szewczyk, R., Wen, V., Culler, D. and Tygar, J. (2001) ‘SPINS: security protocols for sensor networks’, Proceedings of the Seventh Annual International Conference on Mobile Computing and Networking (MobiCom), pp.189–199.
-
(2001)
Proceedings of the Seventh Annual International Conference on Mobile Computing and Networking (MobiCom)
, pp. 189-199
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.4
Tygar, J.5
-
63
-
-
4243082091
-
Security in wireless sensor networks
-
Perrig, A., Stankovic, J. and Wagner, D. (2004) ‘Security in wireless sensor networks’, Communications of the ACM, Vol. 47, No. 6, pp.53–57.
-
(2004)
Communications of the ACM
, vol.47
, Issue.6
, pp. 53-57
-
-
Perrig, A.1
Stankovic, J.2
Wagner, D.3
-
64
-
-
0034239278
-
IP-based access network infrastructure for next-generation wireless data networks
-
August 2000
-
Ramjee, R., La Porta, T., Salgarelli, L., Thuel, S., Varadhan, K. and Li, L. (2000) ‘IP-based access network infrastructure for next-generation wireless data networks’, IEEE Personal Communications Systems Magazine, August 2000, pp.34—41.
-
(2000)
IEEE Personal Communications Systems Magazine
, pp. 34-41
-
-
Ramjee, R.1
La Porta, T.2
Salgarelli, L.3
Thuel, S.4
Varadhan, K.5
Li, L.6
-
65
-
-
3142569233
-
Highly reliable trust establishment scheme in ad-hoc networks
-
Ren, K., Li, T., Wan, Z., Bao, F., Deng, R. and Kim, K. (2004) ‘Highly reliable trust establishment scheme in ad-hoc networks’, Computer Networks, Vol. 45, No. 6, pp.687–699.
-
(2004)
Computer Networks
, vol.45
, Issue.6
, pp. 687-699
-
-
Ren, K.1
Li, T.2
Wan, Z.3
Bao, F.4
Deng, R.5
Kim, K.6
-
66
-
-
0003535506
-
-
IETF Request for Comments 2138
-
Rigney, C., Rubens, A., Simpson, W. and Willens, S. (1997) ‘Remote Authentication Dial In User Service (RADIUS)’, Available at: http://www.ietf.org/rfc/rfc2138.txt. IETF Request for Comments 2138.
-
(1997)
Remote Authentication Dial In User Service (RADIUS)
-
-
Rigney, C.1
Rubens, A.2
Simpson, W.3
Willens, S.4
-
67
-
-
17144404567
-
Security challenges in the personal distributed environment
-
Schwiderski-Grosche, S., Tomlinson, A., Goo, S. and Irvine, J. (2004) ‘Security challenges in the personal distributed environment’, Proceedings of the IEEE 60th Vehicular Technology Conference.
-
(2004)
Proceedings of the IEEE 60th Vehicular Technology Conference
-
-
Schwiderski-Grosche, S.1
Tomlinson, A.2
Goo, S.3
Irvine, J.4
-
68
-
-
0018545449
-
How to share a secret
-
Shamir, A. (1979) ‘How to share a secret’, Communications of the ACM, Vol. 22, No. 11, pp.612–613.
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
69
-
-
4544241048
-
IEEE802.11 roaming and authentication in wireless LAN/cellular mobile networks
-
Shi, M., Shen, X. and Mark, J. (2004) ‘IEEE802.11 roaming and authentication in wireless LAN/cellular mobile networks’, IEEE Wireless Communications, Vol. 11, No. 4, pp.66–75.
-
(2004)
IEEE Wireless Communications
, vol.11
, Issue.4
, pp. 66-75
-
-
Shi, M.1
Shen, X.2
Mark, J.3
-
70
-
-
0036986445
-
Survivable mobile wireless networks: issues, challenges, and research directions
-
Sterbenz, J., Krishnan, R., Hain, R., Jackson, A., Levin, D., Ramanathan, R. and Zao, J. (2002) ‘Survivable mobile wireless networks: issues, challenges, and research directions’, Proceedings of the First ACM Workshop on Wireless Security (WISE), pp.31–40.
-
(2002)
Proceedings of the First ACM Workshop on Wireless Security (WISE)
, pp. 31-40
-
-
Sterbenz, J.1
Krishnan, R.2
Hain, R.3
Jackson, A.4
Levin, D.5
Ramanathan, R.6
Zao, J.7
-
73
-
-
25444517601
-
Integration of authentication and mobility management in third generation and WLAN data networks
-
Wang, W., Liang, W. and Agarwal, A. (2005) ‘Integration of authentication and mobility management in third generation and WLAN data networks’, Journal of Wireless Communications and Mobile Computing, Vol. 5, No. 6, pp.665–678.
-
(2005)
Journal of Wireless Communications and Mobile Computing
, vol.5
, Issue.6
, pp. 665-678
-
-
Wang, W.1
Liang, W.2
Agarwal, A.3
-
74
-
-
0035482169
-
Integrated cellular and ad hoc relaying systems: iCAR
-
Wu, H., Qiao, C., De, S. and Tonguz, O. (2001) ‘Integrated cellular and ad hoc relaying systems: iCAR’, IEEE Journal on Selected Areas in Communications, Vol. 19, No. 10, pp.2105–2115.
-
(2001)
IEEE Journal on Selected Areas in Communications
, vol.19
, Issue.10
, pp. 2105-2115
-
-
Wu, H.1
Qiao, C.2
De, S.3
Tonguz, O.4
-
77
-
-
11244279243
-
Virtual operator based AAA in wireless LAN hot spots with ad-hoc networking support
-
Zhang, J., Li, S., Weinstein, N. and Tu, N. (2002a) ‘Virtual operator based AAA in wireless LAN hot spots with ad-hoc networking support’, ACM Mobile Computing and Communications Review, Vol. 6, No. 3, pp.10–21.
-
(2002)
ACM Mobile Computing and Communications Review
, vol.6
, Issue.3
, pp. 10-21
-
-
Zhang, J.1
Li, S.2
Weinstein, N.3
Tu, N.4
-
78
-
-
1642403770
-
Comparison of inter-area rekeying algorithms for secure wireless group communications
-
Zhang, C., DeCleene, B., Kurose, J. and Towsley, D. (2002b) ‘Comparison of inter-area rekeying algorithms for secure wireless group communications’, Performance Evaluation, Vol. 49, Nos. 1-4, pp.1–20.
-
(2002)
Performance Evaluation
, vol.49
, Issue.1-4
, pp. 1-20
-
-
Zhang, C.1
DeCleene, B.2
Kurose, J.3
Towsley, D.4
-
79
-
-
0042933944
-
Sprite: a simple, cheat-proof, credit-based system for mobile ad hoc networks
-
Zhong, S., Yang, Y. and Chen. J. (2003) ‘Sprite: a simple, cheat-proof, credit-based system for mobile ad hoc networks’, Proceedings of IEEE INFOCOM 2003, pp.1987–1997.
-
(2003)
Proceedings of IEEE INFOCOM
, vol.2003
, pp. 1987-1997
-
-
Zhong, S.1
Yang, Y.2
Chen., J.3
-
80
-
-
84943553152
-
Establishing pair wise keys for secure communication in ad hoc networks: a probabilistic approach
-
Zhu, S., Xu, S., Setia, S. and Jajodia, S. (2003) ‘Establishing pair wise keys for secure communication in ad hoc networks: a probabilistic approach’, Proceedings of the 11th IEEE International Conference on Network Protocols (ICNP’03), pp.326–335.
-
(2003)
Proceedings of the 11th IEEE International Conference on Network Protocols (ICNP’03)
, pp. 326-335
-
-
Zhu, S.1
Xu, S.2
Setia, S.3
Jajodia, S.4
-
81
-
-
85001593279
-
Host mobility using an internet indirection infrastructure
-
Zhuang, S., Lai, K., Stoica, I., Katz, R. and Shenker, S. (2003) ‘Host mobility using an internet indirection infrastructure’, Proceedings of First International Conference on Mobile Systems, Applications, and Services (ACM/USENIX Mobisys).
-
(2003)
Proceedings of First International Conference on Mobile Systems, Applications, and Services (ACM/USENIX Mobisys)
-
-
Zhuang, S.1
Lai, K.2
Stoica, I.3
Katz, R.4
Shenker, S.5
-
82
-
-
33745940320
-
A quantitative trust establishment framework for reliable data packet delivery in MANETs
-
Zouridaki, C., Mark, B., Hejmo, M. and Thomas R. (2005) ‘A quantitative trust establishment framework for reliable data packet delivery in MANETs’, Proceedings of the Third ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN), pp.1–10.
-
(2005)
Proceedings of the Third ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN)
, pp. 1-10
-
-
Zouridaki, C.1
Mark, B.2
Hejmo, M.3
Thomas, R.4
|