-
3
-
-
33846834126
-
A survey of trust and reputation systems for online service provision
-
A. Josang, R. Ismail, and C. Boyd, "A Survey of Trust and Reputation Systems for Online Service Provision," Decision Support Systems, vol.43, no.2, pp. 618-644, 2007.
-
(2007)
Decision Support Systems
, vol.43
, Issue.2
, pp. 618-644
-
-
Josang, A.1
Ismail, R.2
Boyd, C.3
-
5
-
-
23944503145
-
Performance analysis of the confidant protocol
-
Mobile Ad Hoc Networking and Computing
-
S. Buchegger and J. Boudec, "Performance Analysis of the Confidant Protocol," Proc. Int'l Symp. Mobile Ad Hoc Networking and Computing, 2002.
-
(2002)
Proc. Int'l Symp.
-
-
Buchegger, S.1
Boudec, J.2
-
7
-
-
4544308674
-
Observation-based cooperation enforcement in Ad Hoc networks
-
Stanford Univ.
-
S. Bansal and M. Baker, "Observation-Based Cooperation Enforcement in Ad Hoc Networks," Technical Report cs.NI/0307012, Stanford Univ., 2003.
-
(2003)
Technical Report cs.NI/0307012
-
-
Bansal, S.1
Baker, M.2
-
10
-
-
67549124325
-
Exploring different types of trust propagation
-
Trust Management
-
A. Josang, S. Marsh, and S. Pope, "Exploring Different Types of Trust Propagation," Proc. Int'l Conf. Trust Management, 2006.
-
(2006)
Proc. Int'l Conf.
-
-
Josang, A.1
Marsh, S.2
Pope, S.3
-
12
-
-
0038675868
-
A survey of mobility models for Ad Hoc network research
-
T. Camp, J. Boleng, and V. Davies, "A Survey of Mobility Models for Ad Hoc Network Research," Wireless Comm. and Mobile Computing, vol.2, no.5, pp. 483-502, 2002.
-
(2002)
Wireless Comm. and Mobile Computing
, vol.2
, Issue.5
, pp. 483-502
-
-
Camp, T.1
Boleng, J.2
Davies, V.3
-
13
-
-
8344267555
-
Mobility management and its applications in efficient broadcasting in mobile Ad Hoc networks
-
J. Wu and F. Dai, "Mobility Management and Its Applications in Efficient Broadcasting in Mobile Ad Hoc Networks," Proc. IEEE INFOCOM, 2004.
-
(2004)
Proc. IEEE INFOCOM
-
-
Wu, J.1
Dai, F.2
-
14
-
-
34248679594
-
Logarithmic store-carry-forward routing in mobile ad hoc networks
-
DOI 10.1109/TPDS.2007.1061
-
J. Wu, S. Yang, and F. Dai, "Logarithmic Store-Carry-Forward Routing in Mobile Ad Hoc Networks," IEEE Trans. Parallel and Distributed Systems, vol.18, no.6, pp. 735-748, June 2007. (Pubitemid 46767738)
-
(2007)
IEEE Transactions on Parallel and Distributed Systems
, vol.18
, Issue.6
, pp. 735-748
-
-
Wu, J.1
Yang, S.2
Dai, F.3
-
17
-
-
29844438193
-
Least privilege and privilege deprivation: Towards tolerating mobile sink compromises in wireless sensor networks
-
W. Zhang, H. Song, S. Zhu, and G. Cao, "Least Privilege and Privilege Deprivation: Towards Tolerating Mobile Sink Compromises in Wireless Sensor Networks," Proc. ACM MobiHoc, 2005.
-
(2005)
Proc. ACM MobiHoc
-
-
Zhang, W.1
Song, H.2
Zhu, S.3
Cao, G.4
-
18
-
-
34548359282
-
Mobility reduces uncertainty in manets
-
F. Li and J. Wu, "Mobility Reduces Uncertainty in MANETs," Proc. IEEE INFOCOM, 2007.
-
(2007)
Proc. IEEE INFOCOM
-
-
Li, F.1
Wu, J.2
-
19
-
-
4444277059
-
A message ferrying approach for data delivery in sparse mobile Ad Hoc networks
-
W. Zhao, M. Ammar, and E. Zegura, "A Message Ferrying Approach for Data Delivery in Sparse Mobile Ad Hoc Networks," Proc. MobiHoc, 2004.
-
(2004)
Proc. MobiHoc
-
-
Zhao, W.1
Ammar, M.2
Zegura, E.3
-
20
-
-
0035017228
-
Mobility increases the capacity of ad-hoc wireless networks
-
M. Grossglauser and D. Tse, "Mobility Increases the Capacity of Ad-Hoc Wireless Networks," Proc. IEEE INFOCOM, 2001.
-
(2001)
Proc. IEEE INFOCOM
-
-
Grossglauser, M.1
Tse, D.2
-
21
-
-
29844435167
-
Mobility improves coverage of sensor networks
-
B. Liu, P. Brass, O. Dousse, P. Nain, and D. Towsley, "Mobility Improves Coverage of Sensor Networks," Proc. Int'l Symp. Mobile Ad Hoc Networking and Computing, 2005.
-
(2005)
Proc. Int'l Symp. Mobile Ad Hoc Networking and Computing
-
-
Liu, B.1
Brass, P.2
Dousse, O.3
Nain, P.4
Towsley, D.5
-
23
-
-
25844432341
-
Controlling the mobility of multiple data transport ferries in a delay-tolerant network
-
W. Zhao, M. Ammar, and E. Zegura, "Controlling the Mobility of Multiple Data Transport Ferries in a Delay-Tolerant Network," Proc. IEEE INFOCOM, 2005.
-
(2005)
Proc. IEEE INFOCOM
-
-
Zhao, W.1
Ammar, M.2
Zegura, E.3
-
24
-
-
3042785862
-
The sybil attack in sensor networks: Analysis & defenses
-
J. Newsome, E. Shi, D.X. Song, and A. Perrig, "The Sybil Attack in Sensor Networks: Analysis & Defenses," Proc. Int'l Symp. Information Processing in Sensor Networks, 2004.
-
(2004)
Proc. Int'l Symp. Information Processing in Sensor Networks
-
-
Newsome, J.1
Shi, E.2
Song, D.X.3
Perrig, A.4
-
25
-
-
34547363189
-
Fourth factor authentication: Somebody you know
-
J. Brainard, A. Juels, R. Rivest, M. Szydlo, and M. Yung, "Fourth Factor Authentication: Somebody You Know," Proc. Conf. Computer and Comm. Security, 2006.
-
(2006)
Proc. Conf. Computer and Comm. Security
-
-
Brainard, J.1
Juels, A.2
Rivest, R.3
Szydlo, M.4
Yung, M.5
-
28
-
-
84892572090
-
A survey of clustering schemes for mobile Ad Hoc networks
-
J. Yu and P. Chong, "A Survey of Clustering Schemes for Mobile Ad Hoc Networks," IEEE Comm. Surveys and Tutorials, vol.7, no.1, pp. 32-48, 2005.
-
(2005)
IEEE Comm. Surveys and Tutorials
, vol.7
, Issue.1
, pp. 32-48
-
-
Yu, J.1
Chong, P.2
-
29
-
-
0038735958
-
On calculating power-aware connected dominating sets for efficient routing in Ad Hoc wireless networks
-
J. Wu, F. Dai, M. Gao, and I. Stojmenovic, "On Calculating Power-Aware Connected Dominating Sets for Efficient Routing in Ad Hoc Wireless Networks," J. Comm. and Networks, vol.4, no.1, pp. 59-70, 2002.
-
(2002)
J. Comm. and Networks
, vol.4
, Issue.1
, pp. 59-70
-
-
Wu, J.1
Dai, F.2
Gao, M.3
Stojmenovic, I.4
|