메뉴 건너뛰기




Volumn , Issue , 2010, Pages

INPAC: An enforceable incentive scheme for wireless networks using network coding

Author keywords

[No Author keywords available]

Indexed keywords

BROADBAND NETWORK ACCESS; COMMUNICATION OVERHEADS; CRYPTOGRAPHIC TECHNIQUES; EVALUATION RESULTS; FORWARD PACKETS; FUNDAMENTAL PROBLEM; INCENTIVE COMPATIBILITY; INCENTIVE COMPATIBLE; INCENTIVE SCHEMES; NETWORK CODING; NEW TECHNOLOGIES; PACKET FORWARDING; ROUTING PROBLEMS; SELFISH NODE;

EID: 77953313948     PISSN: 0743166X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/INFCOM.2010.5462003     Document Type: Conference Paper
Times cited : (34)

References (33)
  • 1
    • 84976752387 scopus 로고
    • Cryptographic solution to a problem of access control in a hierarchy
    • S. Akl and P. Taylor. Cryptographic solution to a problem of access control in a hierarchy. ACM Trans. Computer Systems, 1(3):239-248, 1983.
    • (1983) ACM Trans. Computer Systems , vol.1 , Issue.3 , pp. 239-248
    • Akl, S.1    Taylor, P.2
  • 3
    • 1542299118 scopus 로고    scopus 로고
    • Ad hoc-VCG: A truthful and cost-efficient routing protocol for mobile ad hoc networks with selfish agents
    • L. Anderegg and S. Eidenbenz. Ad hoc-VCG: a truthful and cost-efficient routing protocol for mobile ad hoc networks with selfish agents. In Proceedings of ACM MOBICOM, 2003.
    • Proceedings of ACM MOBICOM, 2003
    • Anderegg, L.1    Eidenbenz, S.2
  • 4
    • 0027726717 scopus 로고
    • Random oracles are practical: A paradigm for designing efficient protocols
    • M. Bellare and P. Rogaway. Random oracles are practical: A paradigm for designing efficient protocols. In Proceedings of ACM CCS 1993, pages 62-73, 1993.
    • (1993) Proceedings of ACM CCS 1993 , pp. 62-73
    • Bellare, M.1    Rogaway, P.2
  • 10
    • 77953307811 scopus 로고    scopus 로고
    • Available at
    • W. Dai. Crypto++5.5.2. Available at http://www.eskimo.com/ weidai/cryptlib.html.
    • Crypto++5.5.2
    • Dai, W.1
  • 14
    • 37749013560 scopus 로고    scopus 로고
    • Distributed and adaptive reputation mechanism for wireless ad-hoc networks
    • J. J. Jaramillo and R. Srikant. Darwin: Distributed and adaptive reputation mechanism for wireless ad-hoc networks. In Proceedings of ACM MOBICOM, 2007.
    • Proceedings of ACM MOBICOM, 2007
    • Jaramillo, J.J.1    Darwin, R.S.2
  • 19
    • 77953298232 scopus 로고    scopus 로고
    • http://madwifi.org.
  • 21
    • 77953312043 scopus 로고    scopus 로고
    • Meraki Networks. http://meraki.com.
  • 22
    • 77953316332 scopus 로고    scopus 로고
    • MuniWireless LLC. http://www.muniwireless.com.
  • 24
    • 77953313594 scopus 로고    scopus 로고
    • Rutgers ORBIT project team
    • Rutgers ORBIT project team. http://www.orbit-lab.org.
  • 26
    • 77953310542 scopus 로고    scopus 로고
    • http://www.read.cs.ucla.edu/click/.
  • 28
    • 77953305873 scopus 로고    scopus 로고
    • OURS-optimal unicast routing systems in non-cooperative wireless networks multihop routing in sensor networks
    • W. Wang, S. Eidenbez, Y. Wang, and X.-Y. Li. OURS-optimal unicast routing systems in non-cooperative wireless networks multihop routing in sensor networks. In Proceedings of ACM MOBICOM.
    • Proceedings of ACM MOBICOM
    • Wang, W.1    Eidenbez, S.2    Wang, Y.3    Li, X.-Y.4
  • 30
    • 70349664122 scopus 로고    scopus 로고
    • An efficient signature-based scheme for securing network coding against pollution attacks
    • Z. Yu, Y. Wei, B. Ramkumar, and Y. Guan. An efficient signature-based scheme for securing network coding against pollution attacks. In Proceedings of IEEE INFOCOM, 2008.
    • Proceedings of IEEE INFOCOM, 2008
    • Yu, Z.1    Wei, Y.2    Ramkumar, B.3    Guan, Y.4
  • 32
    • 32144433522 scopus 로고    scopus 로고
    • On designing incentive-compatible routing and forwarding protocols in wireless ad-hoc networks - An integrated approach using game theoretical and cryptographic techniques
    • S. Zhong, L. Li, Y. Liu, and Y. R. Yang. On designing incentive-compatible routing and forwarding protocols in wireless ad-hoc networks - an integrated approach using game theoretical and cryptographic techniques. In Proceedings of ACM MOBICOM, 2005.
    • Proceedings of ACM MOBICOM, 2005
    • Zhong, S.1    Li, L.2    Liu, Y.3    Yang, Y.R.4
  • 33
    • 37749014861 scopus 로고    scopus 로고
    • On designing collusion-resistant routing schemes for non-cooperative wireless ad hoc networks
    • S. Zhong and F. Wu. On designing collusion-resistant routing schemes for non-cooperative wireless ad hoc networks. In Proceedings of ACM MOBICOM, 2007.
    • Proceedings of ACM MOBICOM, 2007
    • Zhong, S.1    Wu, F.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.