-
2
-
-
0035789229
-
The quest for security in mobile ad hoc networks
-
J. Hubaux, L. Buttyan, and S. Capkun, "The quest for security in mobile ad hoc networks," in Proc. of MobiHoc 2001, Long Beach, CA, Oct. 2001.
-
Proc. of MobiHoc 2001, Long Beach, CA, Oct. 2001
-
-
Hubaux, J.1
Buttyan, L.2
Capkun, S.3
-
4
-
-
0242678584
-
Self-organized public-key management for mobile ad hoc networks
-
Jan
-
S. Capkun, L. Buttyan, and J. Hubaux, "Self-organized public-key management for mobile ad hoc networks," IEEE Transactions on Mobile Computing, vol. 2, no. 1, pp. 52-64, Jan. 2003.
-
(2003)
IEEE Transactions on Mobile Computing
, vol.2
, Issue.1
, pp. 52-64
-
-
Capkun, S.1
Buttyan, L.2
Hubaux, J.3
-
5
-
-
51349107952
-
Modeling secure connectivity of self-organized wireless ad hoc networks
-
C. Zhang, Y. Song, and Y. Fang, "Modeling secure connectivity of self-organized wireless ad hoc networks," in Proc. of InfoCom 2008, Phoenix, AZ, April 2008.
-
Proc. of InfoCom 2008, Phoenix, AZ, April 2008
-
-
Zhang, C.1
Song, Y.2
Fang, Y.3
-
6
-
-
33144465932
-
Information theoretic framework of trust modeling and evaluation for ad hoc networks
-
Feb
-
Y.-L. Sun, W. Yu, Z. Han, and K. Liu, "Information theoretic framework of trust modeling and evaluation for ad hoc networks," IEEE Journal on Selected Areas in Communications, vol. 24, no. 2, pp. 305-317, Feb. 2006.
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, Issue.2
, pp. 305-317
-
-
Sun, Y.-L.1
Yu, W.2
Han, Z.3
Liu, K.4
-
7
-
-
67249141928
-
A reputation-based metric for secure routing in wireless mesh networks
-
F. Oliviero and S. Romano, "A reputation-based metric for secure routing in wireless mesh networks," in Proc. of IEEE GLOBECOM 2008, New Orleans, LA, Dec. 2008.
-
Proc. of IEEE GLOBECOM 2008, New Orleans, LA, Dec. 2008
-
-
Oliviero, F.1
Romano, S.2
-
8
-
-
33144465377
-
On trust models and trust evaluation metrics for ad hoc networks
-
Feb
-
G. Theodorakopoulos and J. S. Baras, "On trust models and trust evaluation metrics for ad hoc networks," IEEE Journal on Selected Areas in Communications, vol. 24, no. 2, pp. 318-328, Feb. 2006.
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, Issue.2
, pp. 318-328
-
-
Theodorakopoulos, G.1
Baras, J.S.2
-
10
-
-
65949087881
-
A trustworthiness-based qos routing protocol for wireless ad hoc networks
-
April
-
M. Yu and K. Leung, "A trustworthiness-based qos routing protocol for wireless ad hoc networks," IEEE Transactions on Wireless Communications, vol. 8, no. 4, pp. 1888-1898, April 2009.
-
(2009)
IEEE Transactions on Wireless Communications
, vol.8
, Issue.4
, pp. 1888-1898
-
-
Yu, M.1
Leung, K.2
-
11
-
-
0036670132
-
Algebra and algorithms for qos path computation and hop-by-hop routing in the internet
-
August
-
J. L. Sobrinho, "Algebra and algorithms for qos path computation and hop-by-hop routing in the internet," IEEE/ACM Transactions on Networking, vol. 10, no. 4, pp. 541-550, August 2002.
-
(2002)
IEEE/ACM Transactions on Networking
, vol.10
, Issue.4
, pp. 541-550
-
-
Sobrinho, J.L.1
-
12
-
-
28044460092
-
An algebraic theory of dynamic network routing
-
Oct
-
-, "An algebraic theory of dynamic network routing," IEEE/ACM Transactions on Networking, vol. 13, no. 5, pp. 1160-1173, Oct. 2005.
-
(2005)
IEEE/ACM Transactions on Networking
, vol.13
, Issue.5
, pp. 1160-1173
-
-
-
13
-
-
77953310705
-
Design guidelines for routing metrics in multihop wireless networks
-
Y. Yang and J. Wang, "Design guidelines for routing metrics in multihop wireless networks," in Proc. of InfoCom 2008, Phoenix, AZ, April 2008.
-
Proc. of InfoCom 2008, Phoenix, AZ, April 2008
-
-
Yang, Y.1
Wang, J.2
-
14
-
-
70349677490
-
Opportunistic routing algebra and its applications
-
M. Lu and J. Wu, "Opportunistic routing algebra and its applications," in Proc. of InfoCom 2009, Rio de Janeiro, Brazil, April 2009.
-
Proc. of InfoCom 2009, Rio de Janeiro, Brazil, April 2009
-
-
Lu, M.1
Wu, J.2
-
15
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
S. Marti, T. Giuli, K. Lai, and M. Baker, "Mitigating routing misbehavior in mobile ad hoc networks," in Proc. of MobiCom 2000, Boston, USA, August 2000.
-
Proc. of MobiCom 2000, Boston, USA, August 2000
-
-
Marti, S.1
Giuli, T.2
Lai, K.3
Baker, M.4
-
16
-
-
0242527339
-
Mobility helps security in ad hoc networks
-
S. Capkun, J. Hubaux, and L. Buttyan, "Mobility helps security in ad hoc networks," in Proc. of MobiHoc 2003, Annapolis, MD, June 2003.
-
Proc. of MobiHoc 2003, Annapolis, MD, June 2003
-
-
Capkun, S.1
Hubaux, J.2
Buttyan, L.3
-
20
-
-
0141425904
-
Semiring frameworks and algorithms for shortest-distance problems
-
M. Mohri, "Semiring frameworks and algorithms for shortest-distance problems," Journal of Automata, Languages and Combinatorics, vol. 7, no. 3, pp. 321-350, 2002.
-
(2002)
Journal of Automata, Languages and Combinatorics
, vol.7
, Issue.3
, pp. 321-350
-
-
Mohri, M.1
-
22
-
-
77953310579
-
Unstructured path problems and the making of semirings
-
T. Lengauer and D. Theune, "Unstructured path problems and the making of semirings," in Proc. of Algorithms and Data Structures: 2nd Workshop, WADS'91, Ottawa, Canada, Aug. 1991.
-
Proc. of Algorithms and Data Structures: 2nd Workshop, WADS'91, Ottawa, Canada, Aug. 1991
-
-
Lengauer, T.1
Theune, D.2
-
23
-
-
85032476998
-
-
Technical Report, May [Online]. Available
-
C. Zhang, X. Zhu, Y. Song, and Y. Fang, "A formal study of trust-based routing in wireless ad hoc networks," Technical Report, May 2009. [Online]. Available: http://winet.ece.ufl.edu/~czhang/
-
(2009)
A Formal Study of Trust-based Routing in Wireless Ad Hoc Networks
-
-
Zhang, C.1
Zhu, X.2
Song, Y.3
Fang, Y.4
|