-
1
-
-
84976752387
-
Cryptographic solution to a problem of access control in a hierarchy
-
S. Akl and P. Taylor. Cryptographic solution to a problem of access control in a hierarchy. ACM Trans. Computer Systems, 1(3):239-248, 1983.
-
(1983)
ACM Trans. Computer Systems
, vol.1
, Issue.3
, pp. 239-248
-
-
Akl, S.1
Taylor, P.2
-
3
-
-
1542299118
-
Ad hoc-VCG: A truthful and cost-efficient routing protocol for mobile ad hoc networks with selfish agents
-
L. Anderegg and S. Eidenbenz. Ad hoc-VCG: a truthful and cost-efficient routing protocol for mobile ad hoc networks with selfish agents. In Proceedings of ACM MOBICOM, 2003.
-
Proceedings of ACM MOBICOM, 2003
-
-
Anderegg, L.1
Eidenbenz, S.2
-
4
-
-
0027726717
-
Random oracles are practical: A paradigm for designing efficient protocols
-
M. Bellare and P. Rogaway. Random oracles are practical: A paradigm for designing efficient protocols. In Proceedings of ACM CCS 1993, pages 62-73, 1993.
-
(1993)
Proceedings of ACM CCS 1993
, pp. 62-73
-
-
Bellare, M.1
Rogaway, P.2
-
8
-
-
34247384048
-
A study on distributed/ centralized scheduling for wireless mesh network
-
S. Chen, P. Lin, D. Huang, and S. R. Yang. A study on distributed/ centralized scheduling for wireless mesh network. In Proceedings of the 2006 International Conference on Wireless Communications and Mobile Computing, pages 599-604, 2006.
-
(2006)
Proceedings of the 2006 International Conference on Wireless Communications and Mobile Computing
, pp. 599-604
-
-
Chen, S.1
Lin, P.2
Huang, D.3
Yang, S.R.4
-
10
-
-
77953307811
-
-
Available at
-
W. Dai. Crypto++5.5.2. Available at http://www.eskimo.com/ weidai/cryptlib.html.
-
Crypto++5.5.2
-
-
Dai, W.1
-
12
-
-
34548349361
-
Resilient network coding in the presence of byzantine adversaries
-
S. Jaggi, M. Langberg, S. Katti, T. Ho, D. Katabi, and M. Medard. Resilient network coding in the presence of byzantine adversaries. In Proceedings of IEEE INFOCOM, 2007.
-
Proceedings of IEEE INFOCOM, 2007
-
-
Jaggi, S.1
Langberg, M.2
Katti, S.3
Ho, T.4
Katabi, D.5
Medard, M.6
-
17
-
-
34548342249
-
XORs in the air: Practical wireless network coding
-
S. Katti, H. Rahul, W. Hu, D. Katabi, M. Medard, and J. Crowcroft. XORs in the air: Practical wireless network coding. In Proceedings of ACM SIGCOMM '06, Pisa, Italy, Sept. 2006.
-
Proceedings of ACM SIGCOMM '06, Pisa, Italy, Sept. 2006
-
-
Katti, S.1
Rahul, H.2
Hu, W.3
Katabi, D.4
Medard, M.5
Crowcroft, J.6
-
18
-
-
57349192045
-
Hidden information and actions in multi-hop wireless ad hoc networks
-
X.-Y. Li, Y. Wu, P. Xu, G. Chen, and M. Li. Hidden information and actions in multi-hop wireless ad hoc networks. In Proceedings of ACM MOBIHOC, 2008.
-
Proceedings of ACM MOBIHOC, 2008
-
-
Li, X.-Y.1
Wu, Y.2
Xu, P.3
Chen, G.4
Li, M.5
-
19
-
-
77953298232
-
-
http://madwifi.org.
-
-
-
-
21
-
-
77953312043
-
-
Meraki Networks. http://meraki.com.
-
-
-
-
22
-
-
77953316332
-
-
MuniWireless LLC. http://www.muniwireless.com.
-
-
-
-
24
-
-
77953313594
-
-
Rutgers ORBIT project team
-
Rutgers ORBIT project team. http://www.orbit-lab.org.
-
-
-
-
26
-
-
77953310542
-
-
http://www.read.cs.ucla.edu/click/.
-
-
-
-
28
-
-
77953305873
-
OURS-optimal unicast routing systems in non-cooperative wireless networks multihop routing in sensor networks
-
W. Wang, S. Eidenbez, Y. Wang, and X.-Y. Li. OURS-optimal unicast routing systems in non-cooperative wireless networks multihop routing in sensor networks. In Proceedings of ACM MOBICOM.
-
Proceedings of ACM MOBICOM
-
-
Wang, W.1
Eidenbez, S.2
Wang, Y.3
Li, X.-Y.4
-
29
-
-
60149089705
-
Incentive compatible opportunistic routing for wireless networks
-
F. Wu, T. Chen, S. Zhong, L. E. Li, and Y. R. Yang. Incentive compatible opportunistic routing for wireless networks. In Proceedings of ACM MOBICOM, 2008.
-
Proceedings of ACM MOBICOM, 2008
-
-
Wu, F.1
Chen, T.2
Zhong, S.3
Li, L.E.4
Yang, Y.R.5
-
31
-
-
0042933944
-
Sprite, a simple, cheat-proof, credit-based system for mobile ad-hoc networks
-
S. Zhong, J. Chen, and Y. R. Yang. Sprite, a simple, cheat-proof, credit-based system for mobile ad-hoc networks. In Proceedings of IEEE INFOCOM '03, San Francisco, CA, Apr. 2003.
-
Proceedings of IEEE INFOCOM '03, San Francisco, CA, Apr. 2003
-
-
Zhong, S.1
Chen, J.2
Yang, Y.R.3
-
32
-
-
32144433522
-
On designing incentive-compatible routing and forwarding protocols in wireless ad-hoc networks - An integrated approach using game theoretical and cryptographic techniques
-
S. Zhong, L. Li, Y. Liu, and Y. R. Yang. On designing incentive-compatible routing and forwarding protocols in wireless ad-hoc networks - an integrated approach using game theoretical and cryptographic techniques. In Proceedings of ACM MOBICOM, 2005.
-
Proceedings of ACM MOBICOM, 2005
-
-
Zhong, S.1
Li, L.2
Liu, Y.3
Yang, Y.R.4
-
33
-
-
37749014861
-
On designing collusion-resistant routing schemes for non-cooperative wireless ad hoc networks
-
S. Zhong and F. Wu. On designing collusion-resistant routing schemes for non-cooperative wireless ad hoc networks. In Proceedings of ACM MOBICOM, 2007.
-
Proceedings of ACM MOBICOM, 2007
-
-
Zhong, S.1
Wu, F.2
|