-
1
-
-
20344383943
-
Probabilistic routing in intermittently connected networks
-
A. Lindgren, A. Doria, and O. Schelén, "Probabilistic routing in intermittently connected networks," SIGMOBILE Mob. Comput. Commun. Rev., vol.7, no.3, pp. 19-20, 2003.
-
(2003)
SIGMOBILE Mob. Comput. Commun. Rev.
, vol.7
, Issue.3
, pp. 19-20
-
-
Lindgren, A.1
Doria, A.2
Schelén, O.3
-
2
-
-
0003902865
-
Epidemic routing for partially-connected ad hoc networks
-
A. Vahdat and D. Becker, "Epidemic routing for partially-connected ad hoc networks," Tech. Rep., 2000.
-
(2000)
Tech. Rep.
-
-
Vahdat, A.1
Becker, D.2
-
3
-
-
17444426121
-
Ariadne: A secure on-demand routing protocol for ad hoc networks
-
DOI 10.1007/s11276-004-4744-y
-
Y.-C. Hu, A. Perrig, and D. B. Johnson, "Ariadne: a secure on-demand routing protocol for ad hoc networks," Wirel. Netw., vol.11, no.1-2, pp. 21-38, 2005. (Pubitemid 40536374)
-
(2005)
Wireless Networks
, vol.11
, Issue.1-2
, pp. 21-38
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
4
-
-
84961572484
-
Sead: Secure efficient distance vector routing for mobile wireless ad hoc networks
-
Washington, DC, USA: IEEE Computer Society
-
Y.-C. Hu, D. B. Johnson, and A. Perrig, "Sead: Secure efficient distance vector routing for mobile wireless ad hoc networks," in WMCSA '02: Proceedings of the Fourth IEEE Workshop on Mobile Computing Systems and Applications. Washington, DC, USA: IEEE Computer Society, 2002, p. 3.
-
(2002)
WMCSA '02: Proceedings of the Fourth IEEE Workshop on Mobile Computing Systems and Applications
, pp. 3
-
-
Hu, Y.-C.1
Johnson, D.B.2
Perrig, A.3
-
6
-
-
15244339622
-
Authenticated routing for ad hoc networks
-
March
-
K. Sanzgiri, D. LaFlamme, B. Dahill, B. Levine, C. Shields, and E. Belding-Royer, "Authenticated routing for ad hoc networks," IEEE Journal on Selected Areas in Communications, vol.23, no.3, pp. 598-610, March 2005.
-
(2005)
IEEE Journal on Selected Areas in Communications
, vol.23
, Issue.3
, pp. 598-610
-
-
Sanzgiri, K.1
Laflamme, D.2
Dahill, B.3
Levine, B.4
Shields, C.5
Belding-Royer, E.6
-
7
-
-
0242696192
-
Performance analysis of the confidant protocol
-
New York, NY, USA: ACM
-
S. Buchegger and J.-Y. L. Boudec, "Performance analysis of the confidant protocol," in MobiHoc '02: Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing. New York, NY, USA: ACM, 2002, pp. 226-236.
-
(2002)
MobiHoc '02: Proceedings of the 3rd ACM International Symposium on Mobile Ad Hoc Networking & Computing
, pp. 226-236
-
-
Buchegger, S.1
Boudec, J.-Y.L.2
-
9
-
-
0041973497
-
Packet leashes: A defense against wormhole attacks in wireless networks
-
March-3 April
-
Y.-C. Hu, A. Perrig, and D. Johnson, "Packet leashes: a defense against wormhole attacks in wireless networks," INFOCOM 2003. TwentySecond Annual Joint Conference of the IEEE Computer and Communications Societies. IEEE, vol.3, pp. 1976-1986 vol.3, March-3 April 2003.
-
(2003)
INFOCOM 2003. TwentySecond Annual Joint Conference of the IEEE Computer and Communications Societies. IEEE
, vol.3
, pp. 1976-19863
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.3
-
10
-
-
44249088028
-
-
Helsinki University of Technology, Networking Laboratory, Tech. Rep., July
-
A. Keränen and J. Ott, "Increasing reality for dtn protocol simulations," Helsinki University of Technology, Networking Laboratory, Tech. Rep., July 2007.
-
(2007)
Increasing Reality for Dtn Protocol Simulations
-
-
Keränen, A.1
Ott, J.2
-
11
-
-
7744225358
-
Efficient identity-based security schemes for ad hoc network routing protocols
-
M. Bohio and A. Miri, "Efficient identity-based security schemes for ad hoc network routing protocols," Ad Hoc Networks, pp. 309-317, 2004.
-
(2004)
Ad Hoc Networks
, pp. 309-317
-
-
Bohio, M.1
Miri, A.2
-
12
-
-
7744232568
-
Tids: Threshold and identity-based security scheme for wireless ad hoc networks
-
July
-
H. Deng and D. P. Agrawal, "Tids: threshold and identity-based security scheme for wireless ad hoc networks," Ad Hoc Networks, pp. 291-307, July 2004.
-
(2004)
Ad Hoc Networks
, pp. 291-307
-
-
Deng, H.1
Agrawal, D.P.2
-
13
-
-
35448931599
-
Applicability of identity-based cryptography for disruption-tolerant networking
-
New York, NY, USA: ACM
-
N. Asokan, K. Kostiainen, P. Ginzboorg, J. Ott, and C. Luo, "Applicability of identity-based cryptography for disruption-tolerant networking," in MobiOpp '07: Proceedings of the 1st international MobiSys workshop on Mobile opportunistic networking. New York, NY, USA: ACM, 2007, pp. 52-56.
-
(2007)
MobiOpp '07: Proceedings of the 1st International MobiSys Workshop on Mobile Opportunistic Networking
, pp. 52-56
-
-
Asokan, N.1
Kostiainen, K.2
Ginzboorg, P.3
Ott, J.4
Luo, C.5
-
14
-
-
77951452394
-
A secure credit based incentive scheme for delay tolerant networks
-
Aug.25-27.
-
Z. Haojin, L. Xiaodong, L. Rongxing, and S. Xuemin, "A secure credit based incentive scheme for delay tolerant networks," in Chinacom'08. IEEE, Aug.25-27.
-
Chinacom'08. IEEE
-
-
Haojin, Z.1
Xiaodong, L.2
Rongxing, L.3
Xuemin, S.4
-
15
-
-
39049103908
-
Plus: Parameterized and localized trust management scheme for sensor networks security
-
Oct.
-
Z. Yao, D. Kim, and Y. Doh, "Plus: Parameterized and localized trust management scheme for sensor networks security," 2006 IEEE International Conference on Mobile Adhoc and Sensor Systems (MASS), pp. 437-446, Oct. 2006.
-
(2006)
2006 IEEE International Conference on Mobile Adhoc and Sensor Systems (MASS)
, pp. 437-446
-
-
Yao, Z.1
Kim, D.2
Doh, Y.3
-
16
-
-
58049100792
-
Fuzzy trust recommendation based on collaborative filtering for mobile ad-hoc networks
-
IEEE
-
J. Luo, X. Liu, Y. Zhang, D. Ye, and Z. Xu, "Fuzzy trust recommendation based on collaborative filtering for mobile ad-hoc networks," in Proceedings of the 33rd Annual IEEE Conference on Local Computer Networks (LCN 2008). IEEE, 2008.
-
(2008)
Proceedings of the 33rd Annual IEEE Conference on Local Computer Networks (LCN 2008)
-
-
Luo, J.1
Liu, X.2
Zhang, Y.3
Ye, D.4
Xu, Z.5
-
17
-
-
37849034148
-
Surviving attacks on disruption-tolerant networks without authentication
-
New York, NY, USA: ACM
-
J. Burgess, G. D. Bissias, M. D. Corner, and B. N. Levine, "Surviving attacks on disruption-tolerant networks without authentication," in MobiHoc '07: Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing. New York, NY, USA: ACM, 2007, pp. 61-70.
-
(2007)
MobiHoc '07: Proceedings of the 8th ACM International Symposium on Mobile Ad Hoc Networking and Computing
, pp. 61-70
-
-
Burgess, J.1
Bissias, G.D.2
Corner, M.D.3
Levine, B.N.4
-
18
-
-
48349085839
-
Routing amid colluding attackers
-
Oct.
-
J. Eriksson, M. Faloutsos, and S. Krishnamurthy, "Routing amid colluding attackers," Network Protocols, 2007. ICNP 2007. IEEE International Conference on, pp. 184-193, Oct. 2007.
-
(2007)
Network Protocols, 2007. ICNP 2007. IEEE International Conference on
, pp. 184-193
-
-
Eriksson, J.1
Faloutsos, M.2
Krishnamurthy, S.3
-
19
-
-
37849012001
-
Containing denial-of-service attacks in broadcast authentication in sensor networks
-
New York, NY, USA: ACM
-
R. Wang, W. Du, and P. Ning, "Containing denial-of-service attacks in broadcast authentication in sensor networks," in MobiHoc '07: Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing. New York, NY, USA: ACM, 2007, pp. 71-79.
-
(2007)
MobiHoc '07: Proceedings of the 8th ACM International Symposium on Mobile Ad Hoc Networking and Computing
, pp. 71-79
-
-
Wang, R.1
Du, W.2
Ning, P.3
-
20
-
-
25844501977
-
Mv routing and capacity building in disruption tolerant networks
-
March
-
B. Burns, O. Brock, and B. Levine, "Mv routing and capacity building in disruption tolerant networks," INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings IEEE, vol.1, pp. 398-408 vol. 1, March 2005.
-
(2005)
INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings IEEE
, vol.1
, pp. 398-4081
-
-
Burns, B.1
Brock, O.2
Levine, B.3
-
21
-
-
84942246351
-
Identity based authenticated key agreement protocols from pairings
-
00
-
L. Chen and C. Kudla, "Identity based authenticated key agreement protocols from pairings," csfw, vol.00, p. 219, 2003.
-
(2003)
Csfw
, pp. 219
-
-
Chen, L.1
Kudla, C.2
-
22
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
S. Marti, T. J. Giuli, K. Lai, and M. Baker, "Mitigating routing misbehavior in mobile ad hoc networks," in MobiCom '00: Proceedings of the 6th annual international conference on Mobile computing and networking. New York, NY, USA: ACM, 2000, pp. 255-265. (Pubitemid 32024700)
-
(2000)
Proceedings of the Annual International Conference on Mobile Computing and Networking, MOBICOM
, pp. 255-265
-
-
Marti, S.1
Giuli, T.J.2
Lai, K.3
Baker, M.4
|