-
1
-
-
0242696192
-
Performance analysis of the confidant, protocol cooperation of nodes fairness in dynamic ad hoc networks
-
June, Lausanne, Switzerland
-
Buchegger, S. and Boudec, J-Y.L. (2002) 'Performance analysis of the confidant, protocol cooperation of nodes fairness in dynamic ad hoc networks', Third ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc'02), June, Lausanne, Switzerland, pp.80-91.
-
(2002)
Third ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc'02)
, pp. 80-91
-
-
Buchegger, S.1
Boudec, J-Y.L.2
-
2
-
-
0004118144
-
-
Swiss Federal Institution of Technology, Lausanne, Switzerland, Tech. Rep. DSC/2001/001, January
-
Buttyan, L. and Hubaux, J-P. (2001) Nuglets: A Virtual Currency to Stimulate Cooperation in Self-Organized Mobile Ad Hoc Networks, Swiss Federal Institution of Technology, Lausanne, Switzerland, Tech. Rep. DSC/2001/001, January, pp.1-15.
-
(2001)
Nuglets: A Virtual Currency to Stimulate Cooperation in Self-Organized Mobile Ad Hoc Networks
, pp. 1-15
-
-
Buttyan, L.1
Hubaux, J.-P.2
-
3
-
-
0042660545
-
Stimulating cooperation in selforganizing mobile ad hoc networks
-
Buttyan, L. and Hubaux, J-P. (2003) 'Stimulating cooperation in selforganizing mobile ad hoc networks', ACM/Kluwer Mobile Networks and Applications, Vol. 8, No. 5, October, pp.579-592.
-
(2003)
ACM/Kluwer Mobile Networks and Applications
, vol.8
, Issue.5
, pp. 579-592
-
-
Buttyan, L.1
Hubaux, J.-P.2
-
4
-
-
0242678584
-
Self-organized public-key management for mobile ad hoc networks
-
Capkun, S., Buttyan, L. and Hubaux, J-P. (2003) 'Self-organized public-key management for mobile ad hoc networks', IEEE Transactions on Mobile Computing, Vol. 2, No. 1, January, pp.52-64.
-
(2003)
IEEE Transactions on Mobile Computing
, vol.2
, Issue.1
, pp. 52-64
-
-
Capkun, S.1
Buttyan, L.2
Hubaux, J.-P.3
-
5
-
-
0000629443
-
Dynamic source routing in ad hoc wireless networks
-
Chapter 5
-
David, B. and David, A. (1996) 'Dynamic source routing in ad hoc wireless networks', Mobile Computing, Chapter 5, pp.153-181.
-
(1996)
Mobile Computing
, pp. 153-181
-
-
David, B.1
David, A.2
-
6
-
-
10444289086
-
An energy efficient routing protocol for mobile ad hoc network
-
June, Mahdia, Tunisia
-
Djenouri, D. and Badache, N. (2003) 'An energy efficient routing protocol for mobile ad hoc network', The Second Proceeding of the Mediterranean Workshop on Ad-Hoc Networks, Med-Hoc-Nets 2003, June, Mahdia, Tunisia, pp.113-122.
-
(2003)
The Second Proceeding of the Mediterranean Workshop on Ad-Hoc Networks, Med-Hoc-Nets 2003
, pp. 113-122
-
-
Djenouri, D.1
Badache, N.2
-
8
-
-
0347709584
-
An on-demand minimum energy routing protocol for a wireless ad hoc network
-
Doshi, S., Bhandare, S. Brown, T.X. (2002) 'An on-demand minimum energy routing protocol for a wireless ad hoc network', Mobile Computing and Communications Review, Vol. 6, No. 3, pp.50-66.
-
(2002)
Mobile Computing and Communications Review
, vol.6
, Issue.3
, pp. 50-66
-
-
Doshi, S.1
Bhandare, S.2
Brown, T.X.3
-
9
-
-
0035101078
-
Towards self-organized mobile ad hoc networks: The terminodes project
-
Hubaux, J-P., Gross, T., Boudec, J-Y.L. and Vetterli, M. (2001) 'Towards self-organized mobile ad hoc networks: the terminodes project', IEEE Communications Magazine, Vol. 39, January, pp.118-124.
-
(2001)
IEEE Communications Magazine
, vol.39
, pp. 118-124
-
-
Hubaux, J.-P.1
Gross, T.2
Boudec, J-Y.L.3
Vetterli, M.4
-
10
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
Marti, S., Giuli, T., Lai, K. and Baker, M. (2000) 'Mitigating routing misbehavior in mobile ad hoc networks', ACM Mobile Computing and Networking, MOBICOM, pp.255-265.
-
(2000)
ACM Mobile Computing and Networking, MOBICOM
, pp. 255-265
-
-
Marti, S.1
Giuli, T.2
Lai, K.3
Baker, M.4
-
11
-
-
85113133621
-
Core: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks
-
26-27 September, Portoroz, Slovenia
-
Michiardi, P. and Molva, R. (2002) 'Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks', Communication and Multimedia Security 2002 Conference, 26-27 September, Portoroz, Slovenia, pp.107-121.
-
(2002)
Communication and Multimedia Security 2002 Conference
, pp. 107-121
-
-
Michiardi, P.1
Molva, R.2
-
12
-
-
1542287664
-
Secure data transmission in mobile ad hoc networks
-
September, San Diego, California, USA
-
Papadimitratos, P. and Haas, Z.J. (2003) 'Secure data transmission in mobile ad hoc networks', ACM MOBICOM Wireless Security Workshop (WiSe'03), September, San Diego, California, USA, pp.41-50.
-
(2003)
ACM MOBICOM Wireless Security Workshop (WiSe'03)
, pp. 41-50
-
-
Papadimitratos, P.1
Haas, Z.J.2
-
13
-
-
0018545449
-
How to share a secret
-
613
-
Shamir, A. (1979) 'How to share a secret', Communications of the ACM, Vol. 22, No. 11, November, pp.612, 613.
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612
-
-
Shamir, A.1
-
14
-
-
11244273689
-
Cooperation in wireless ad hoc networks
-
April, San Francisco, California, USA
-
Srinivasan, V., Nuggehalli, P., Chiasserini, C.F. and Rao, R.R. (2003) 'Cooperation in wireless ad hoc networks', IEEE INFOCOM' 03, April, San Francisco, California, USA, pp.1325-1338.
-
(2003)
IEEE INFOCOM' 03
, pp. 1325-1338
-
-
Srinivasan, V.1
Nuggehalli, P.2
Chiasserini, C.F.3
Rao, R.R.4
-
15
-
-
0036980295
-
Self-organized network layer security in mobile ad hoc networks
-
September, Georgia, Atlanta, USA
-
Yang, H., Meng, X. and Lu, S. (2002) 'Self-organized network layer security in mobile ad hoc networks', ACM MOBICOM Wireless Security Workshop (WiSe'02), September, Georgia, Atlanta, USA, pp.11-20.
-
(2002)
ACM MOBICOM Wireless Security Workshop (WiSe'02)
, pp. 11-20
-
-
Yang, H.1
Meng, X.2
Lu, S.3
-
16
-
-
17144398990
-
Moca : Mobile certificate authority for wireless ad hoc networks
-
April, Gaithersburg, Maryland
-
Yi, S. and Kravetso, R. (2003) 'Moca : mobile certificate authority for wireless ad hoc networks', The Second Anunual PKI Research Workshop (PKI 03), April, Gaithersburg, Maryland, pp.52-64.
-
(2003)
The Second Anunual PKI Research Workshop (PKI 03)
, pp. 52-64
-
-
Yi, S.1
Kravetso, R.2
|