-
1
-
-
77953737891
-
-
Linksys, http://www.linksysbycisco.com, 2010.
-
Linksys
, vol.2010
-
-
-
2
-
-
77953743872
-
-
Openswan, http://www.openswan.org, 2010.
-
(2010)
Openswan
-
-
-
3
-
-
77953797321
-
-
P2PWNC Project Website
-
P2PWNC Project Website, http://mm.aueb.gr/research/p2pwnc, 2010
-
(2010)
-
-
-
4
-
-
77953803651
-
-
SpeakeasyNetShareService
-
SpeakeasyNetShareService,http://www.speakeasy.net/netshare, 2010.
-
(2010)
-
-
-
6
-
-
0242678584
-
Self-organized public-key management for mobile ad hoc networks
-
Jan.-Mar.
-
S. Capkun, L. Buttyan, and J.P. Hubaux, "Self-Organized Public-Key Management for Mobile Ad Hoc Networks," IEEE Trans. Mobile Computing, vol.2, no.1, pp. 52-64, Jan.-Mar. 2003.
-
(2003)
IEEE Trans. Mobile Computing
, vol.2
, Issue.1
, pp. 52-64
-
-
Capkun, S.1
Buttyan, L.2
Hubaux, J.P.3
-
7
-
-
77953742183
-
The evolution of cooperation
-
first published by Basic Books, 1984
-
R. Axelrod, The Evolution of Cooperation. Penguin Books, 1990 (first published by Basic Books, 1984).
-
(1990)
Penguin Books
-
-
Axelrod, R.1
-
8
-
-
2442597363
-
Performance analysis of the confidant protocol (cooperation of nodes: Fairness in dynamic Ad-Hoc networks)
-
S. Buchegger and J.Y.L. Boudec, "Performance Analysis of the CONFIDANT Protocol (Cooperation of Nodes: Fairness in Dynamic Ad-Hoc Networks)," Proc. ACM MobiHoc, 2002.
-
(2002)
Proc. ACM MobiHoc
-
-
Buchegger, S.1
Boudec, J.Y.L.2
-
9
-
-
0042660545
-
Stimulating cooperation in self-organizing mobile ad hoc networks
-
L. Buttyan and J.P. Hubaux, "Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks," ACM/Kluwer Mobile Networks and Applications, vol.8, no.5, pp. 579-592, 2003.
-
(2003)
ACM/Kluwer Mobile Networks and Applications
, vol.8
, Issue.5
, pp. 579-592
-
-
Buttyan, L.1
Hubaux, J.P.2
-
10
-
-
2642580795
-
A measurement study of vehicular internet access using in situ wi-fi networks
-
V. Bychkovsky, B. Hull, A. Miu, H. Balakrishnan, and S. Madden, "A Measurement Study of Vehicular Internet Access Using in situ Wi-Fi Networks," Proc. ACM MobiCom, 2006.
-
(2006)
Proc. ACM MobiCom
-
-
Bychkovsky, V.1
Hull, B.2
Miu, A.3
Balakrishnan, H.4
Madden, S.5
-
11
-
-
0000122499
-
On implementing the push-relabel method for the maximum flow problem
-
B.V. Cherkassky and A.V. Goldberg, "On Implementing the Push-Relabel Method for the Maximum Flow Problem," Algorithmica, vol.19, no.4, pp. 390-1310, 1997.
-
(1997)
Algorithmica
, vol.19
, Issue.4
, pp. 390-1310
-
-
Cherkassky, B.V.1
Goldberg, A.V.2
-
12
-
-
0003319320
-
Voice over IP performance monitoring
-
R.G. Cole and J.H. Rosenbluth, "Voice over IP Performance Monitoring," ACM Computer Comm. Rev., vol.31, no.2, pp. 9-24, 2001.
-
(2001)
ACM Computer Comm. Rev.
, vol.31
, Issue.2
, pp. 9-24
-
-
Cole, R.G.1
Rosenbluth, J.H.2
-
17
-
-
26844521290
-
Self-organized peering of wireless LAN hotspots
-
Telecomm., special issue on self-organization in mobile networking
-
E.C. Efstathiou and G.C. Polyzos, "Self-Organized Peering of Wireless LAN Hotspots," European Trans. Telecomm., special issue on self-organization in mobile networking, vol.16, no.5, 2005.
-
(2005)
European Trans.
, vol.16
, Issue.5
-
-
Efstathiou, E.C.1
Polyzos, G.C.2
-
18
-
-
77953738927
-
-
Electronic Frontier Foundation (EFF) Wireless Friendly ISP List
-
Electronic Frontier Foundation (EFF), "Wireless Friendly ISP List," http://www.eff.org/Infrastructure/Wireless-cellular-radio/wireless- friendly-isp-list.html, 2009.
-
(2009)
-
-
-
20
-
-
3242802867
-
Robust incentive techniques for peer-to-peer networks
-
M. Feldman, K. Lai, I. Stoica, and J. Chuang, "Robust Incentive Techniques for Peer-to-Peer Networks," Proc. ACM Conf. Electronic Commerce (EC '04), 2004.
-
(2004)
Proc. ACM Conf. Electronic Commerce (EC '04)
-
-
Feldman, M.1
Lai, K.2
Stoica, I.3
Chuang, J.4
-
21
-
-
33645673382
-
Nash equilibria of packet forwarding strategies in wireless ad hoc networks
-
May
-
M. Felegyhazi, J.P. Hubaux, and L. Buttyan, "Nash Equilibria of Packet Forwarding Strategies in Wireless Ad Hoc Networks," IEEE Trans. Mobile Computing, vol.5, no.5, pp. 463-476, May 2006.
-
(2006)
IEEE Trans. Mobile Computing
, vol.5
, Issue.5
, pp. 463-476
-
-
Felegyhazi, M.1
Hubaux, J.P.2
Buttyan, L.3
-
22
-
-
0038675868
-
A survey of mobility models for ad hoc network research
-
T. Camp, J. Boleng, and V. Davies, "A Survey of Mobility Models for Ad Hoc Network Research," Wireless Comm. and Mobile Computing, special issue on mobile ad hoc networking: research, trends, and applications, vol.2, no.5, pp. 483-502, 2002.
-
(2002)
Wireless Comm. and Mobile Computing, Special Issue on Mobile Ad Hoc Networking: Research, Trends, and Applications
, vol.2
, Issue.5
, pp. 483-502
-
-
Camp, T.1
Boleng, J.2
Davies, V.3
-
23
-
-
0039246956
-
The social cost of cheap pseudonyms
-
DOI 10.1162/105864001300122476
-
E. Friedman and P. Resnick, "The Social Cost of Cheap Pseudonyms," J. Economics and Management Strategy, vol.10, no.2, pp. 173-199, 1998. (Pubitemid 33580600)
-
(2001)
Journal of Economics and Management Strategy
, vol.10
, Issue.2
, pp. 173-199
-
-
Friedman, E.J.1
Resnick, P.2
-
25
-
-
0024090156
-
A new approach to the maximum-flow problem
-
A.V. Goldberg and R.E. Tarjan, "A New Approach to the Maximum-Flow Problem," J. ACM, vol.35, no.4, pp. 921-940, 1998.
-
(1998)
J. ACM
, vol.35
, Issue.4
, pp. 921-940
-
-
Goldberg, A.V.1
Tarjan, R.E.2
-
26
-
-
27644478825
-
Indirect reciprocity in cyclical networks\an experimental study
-
Max Planck Inst. of Economics, Strategic Interaction Group
-
B. Greiner and M.V. Levati, "Indirect Reciprocity in Cyclical Networks\An Experimental Study," Discussion Papers on Strategic Interaction 2003-2015, Max Planck Inst. of Economics, Strategic Interaction Group, http://ideas.repec.org/p/esi/discus/2003-15.html, 2003.
-
(2003)
Discussion Papers on Strategic Interaction
, pp. 2003-2015
-
-
Greiner, B.1
Levati, M.V.2
-
27
-
-
0003315821
-
IP encapsulating security payload (ESP)
-
S. Kent and R. Atkinson, "IP Encapsulating Security Payload (ESP)," IETF RFC 2406, 1998.
-
(1998)
IETF RFC
, vol.2406
-
-
Kent, S.1
Atkinson, R.2
-
29
-
-
85084162792
-
Attack-resistant trust metrics for public key certification
-
R. Levien and A. Aiken, "Attack-Resistant Trust Metrics for Public Key Certification," Proc. USENIX Security Symp., 1998.
-
(1998)
Proc. USENIX Security Symp.
-
-
Levien, R.1
Aiken, A.2
-
30
-
-
80051768284
-
Sustaining cooperation in multi-hop wireless networks
-
R. Mahajan, M. Rodrig, D. Wetherall, and J. Zahorjan, "Sustaining Cooperation in Multi-Hop Wireless Networks," Proc. Second USENIX Symp. Networked System Design and Implementation, 2005.
-
(2005)
Proc. Second USENIX Symp. Networked System Design and Implementation
-
-
Mahajan, R.1
Rodrig, M.2
Wetherall, D.3
Zahorjan, J.4
-
32
-
-
0032507958
-
Evolution of indirect reciprocity by image scoring
-
M.A. Nowak and K. Sigmund, "Evolution of Indirect Reciprocity by Image Scoring," Nature, vol.393, pp. 573-577, 1998.
-
(1998)
Nature
, vol.393
, pp. 573-577
-
-
Nowak, M.A.1
Sigmund, K.2
-
33
-
-
46249089418
-
Securing L2TP using Ipsec
-
B. Patel, B. Aboba, W. Dixon, G. Zorn, and S. Booth, "Securing L2TP Using IPsec," IETF RFC 3193, 2001.
-
(2001)
IETF RFC
, vol.3193
-
-
Patel, B.1
Aboba, B.2
Dixon, W.3
Zorn, G.4
Booth, S.5
-
34
-
-
13244288768
-
Authentication metric analysis and design
-
M.K. Reiter and S.G. Stubblebine, "Authentication Metric Analysis and Design," ACM Trans. Information and System Security, vol.2, no.2, pp. 138-158, 1999.
-
(1999)
ACM Trans. Information and System Security
, vol.2
, Issue.2
, pp. 138-158
-
-
Reiter, M.K.1
Stubblebine, S.G.2
-
35
-
-
34547280925
-
Reputation-based Wi-Fi deployment
-
N.B. Salem, J.P. Hubaux, and M. Jakobsson, "Reputation-Based Wi-Fi Deployment," ACM Mobile Computing and Comm. Rev., vol.9, no.3, pp. 69-81, 2005.
-
(2005)
ACM Mobile Computing and Comm. Rev.
, vol.9
, Issue.3
, pp. 69-81
-
-
Salem, N.B.1
Hubaux, J.P.2
Jakobsson, M.3
-
39
-
-
0042933944
-
Sprite: A simple, cheat-proof, credit-based system for mobile Ad-Hoc networks
-
S. Zhong, J. Chen, and Y.R. Yang, "Sprite: A Simple, Cheat-Proof, Credit-Based System for Mobile Ad-Hoc Networks," Proc. IEEE INFOCOM, 2003.
-
(2003)
Proc. IEEE INFOCOM
-
-
Zhong, S.1
Chen, J.2
Yang, Y.R.3
|