-
1
-
-
63449129290
-
Multi-hop relay for nextgeneration wireless access networks
-
G. Shen, J. Liu, D. Wang, J. Wang, and S. Jin, "Multi-hop relay for nextgeneration wireless access networks," Bell Labs Tech. J., vol.13, no.4, pp. 175-193, 2009.
-
(2009)
Bell Labs Tech. J.
, vol.13
, Issue.4
, pp. 175-193
-
-
Shen, G.1
Liu, J.2
Wang, D.3
Wang, J.4
Jin, S.5
-
2
-
-
43449084339
-
Multihop cellular networks: Technology and economics
-
Jun.
-
X. Li, B. Seet, and P. Chong, "Multihop cellular networks: Technology and economics," Comput. Netw., vol.52, no.9, pp. 1825-1837, Jun. 2008.
-
(2008)
Comput. Netw.
, vol.52
, Issue.9
, pp. 1825-1837
-
-
Li, X.1
Seet, B.2
Chong, P.3
-
3
-
-
62949086368
-
Statistical QoS routing for IEEE 802.11 multihop ad hoc networks
-
Mar.
-
A. Abdrabou and W. Zhuang, "Statistical QoS routing for IEEE 802.11 multihop ad hoc networks," IEEE Trans. Wireless Commun., vol.8, no.3, pp. 1542-1552, Mar. 2009.
-
(2009)
IEEE Trans. Wireless Commun.
, vol.8
, Issue.3
, pp. 1542-1552
-
-
Abdrabou, A.1
Zhuang, W.2
-
4
-
-
33747142749
-
The capacity of wireless networks
-
Mar.
-
P. Gupta and P. Kumar, "The capacity of wireless networks," IEEE Trans. Inf. Theory, vol.46, no.2, pp. 388-404, Mar. 2000.
-
(2000)
IEEE Trans. Inf. Theory
, vol.46
, Issue.2
, pp. 388-404
-
-
Gupta, P.1
Kumar, P.2
-
5
-
-
0003834837
-
-
3rd Generation Partnership Project, Techn. Spec. Group Radio Access Network, Dec.
-
3rd Generation Partnership Project, Techn. Spec. Group Radio Access Network, Opportunity driven multiple access, Dec. 1999.
-
(1999)
Opportunity Driven Multiple Access
-
-
-
6
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
Boston, MA, Aug. 6-11
-
S. Marti, T. Giuli, K. Lai, and M. Baker, "Mitigating routing misbehavior in mobile ad hoc networks," in Proc. ACM MobiCom, Boston, MA, Aug. 6-11, 2000, pp. 255-265.
-
(2000)
Proc. ACM MobiCom
, pp. 255-265
-
-
Marti, S.1
Giuli, T.2
Lai, K.3
Baker, M.4
-
7
-
-
3042542420
-
Simulation-based analysis of security exposures in mobile ad hoc networks
-
Florence, Italy, Feb. 25-28
-
P. Michiardi and R. Molva, "Simulation-based analysis of security exposures in mobile ad hoc networks," in Proc. Eur. Wireless, Florence, Italy, Feb. 25-28, 2002, pp. 287-292.
-
(2002)
Proc. Eur. Wireless
, pp. 287-292
-
-
Michiardi, P.1
Molva, R.2
-
8
-
-
34548255006
-
Cooperation in mobile ad hoc networks
-
Florida State Univ., Tallahassee, FL, Tech. Rep. TR-050111 Jan.
-
J. Hu, "Cooperation in mobile ad hoc networks," Comput. Sci. Dept., Florida State Univ., Tallahassee, FL, Tech. Rep. TR-050111, Jan. 2005.
-
(2005)
Comput. Sci. Dept.
-
-
Hu, J.1
-
9
-
-
33646845802
-
Cooperation enforcement schemes forMANETs: A survey
-
May
-
G. Marias, P. Georgiadis, D. Flitzanis, and K. Mandalas, "Cooperation enforcement schemes forMANETs: A survey,"Wireless Commun. Mobile Comput., vol.6, no.3, pp. 319-332, May 2006.
-
(2006)
Wireless Commun. Mobile Comput.
, vol.6
, Issue.3
, pp. 319-332
-
-
Marias, G.1
Georgiadis, P.2
Flitzanis, D.3
Mandalas, K.4
-
10
-
-
4544308674
-
Observation-based cooperation enforcement in ad-hoc networks
-
Stanford Univ., Stanford, CA Jul.
-
S. Bansal and M. Baker, "Observation-based cooperation enforcement in ad-hoc networks," Comput. Sci. Dept., Stanford Univ., Stanford, CA, Jul. 2003.
-
(2003)
Comput. Sci. Dept.
-
-
Bansal, S.1
Baker, M.2
-
11
-
-
33646823968
-
A secure incentive architecture for ad-hoc networks
-
May
-
Q. He, D. Wu, and P. Khosla, "A secure incentive architecture for ad-hoc networks,"Wireless Commun. Mobile Comput., vol.6, no.3, pp. 333-346, May 2006.
-
(2006)
Wireless Commun. Mobile Comput.
, vol.6
, Issue.3
, pp. 333-346
-
-
He, Q.1
Wu, D.2
Khosla, P.3
-
12
-
-
0035360627
-
An energy-consumption model for performance analysis of routing protocols for mobile ad hoc networks
-
Jun.
-
L. Feeney, "An energy-consumption model for performance analysis of routing protocols for mobile ad hoc networks," Mobile Netw. Appl., vol.6, no.3, pp. 239-249, Jun. 2001.
-
(2001)
Mobile Netw. Appl.
, vol.6
, Issue.3
, pp. 239-249
-
-
Feeney, L.1
-
13
-
-
0036346205
-
Energy efficient communications in ad hoc networks using directional antennas
-
New York Jun.
-
A. Spyropoulos and C. Raghavendra, "Energy efficient communications in ad hoc networks using directional antennas," in Proc. IEEE INFOCOM, New York, Jun. 2002, pp. 220-228.
-
(2002)
Proc. IEEE INFOCOM
, pp. 220-228
-
-
Spyropoulos, A.1
Raghavendra, C.2
-
14
-
-
63449126936
-
Achieving cooperation in multihop wireless networks of selfish nodes
-
Pisa, Italy, Oct.
-
F. Milan, J. Jaramillo, and R. Srikant, "Achieving cooperation in multihop wireless networks of selfish nodes," in Proc. Workshop Game Theory Commun. Netw., Pisa, Italy, Oct. 14, 2006.
-
(2006)
Proc. Workshop Game Theory Commun. Netw.
, vol.14
-
-
Milan, F.1
Jaramillo, J.2
Srikant, R.3
-
15
-
-
51049109874
-
An incentive mechanism for charging scheme in heterogeneous collaborative networks
-
Xi'an, China, Apr. 16-18
-
K. Wang, M. Wu, W. Lu, P. Xia, and S. Shen, "An incentive mechanism for charging scheme in heterogeneous collaborative networks," in Proc. IEEE CSCWD, Xi'an, China, Apr. 16-18, 2008, pp. 559-564.
-
(2008)
Proc. IEEE CSCWD
, pp. 559-564
-
-
Wang, K.1
Wu, M.2
Lu, W.3
Xia, P.4
Shen, S.5
-
16
-
-
25944457774
-
Micropayments for mobile networks
-
Trinity College, Dublin, Ireland
-
M. Peirce and D. O'Mahony, "Micropayments for mobile networks," Dept. Comput. Sci., Trinity College, Dublin, Ireland, 1999.
-
(1999)
Dept. Comput. Sci.
-
-
Peirce, M.1
O'Mahony, D.2
-
17
-
-
23044531795
-
Micropayments revisited
-
Berlin, Germany: Springer-Verlag
-
S. Micali and R. Rivest, "Micropayments revisited," in Topics in Cryptology-CT-RSA 2002. Berlin, Germany: Springer-Verlag, 2002, pp. 171-203.
-
(2002)
Topics in Cryptology-CT-RSA 2002
, pp. 171-203
-
-
Micali, S.1
Rivest, R.2
-
18
-
-
35048898480
-
Microcredits for verifiable foreign service provider metering
-
Berlin, Germany: Springer-Verlag
-
C. Gentry and Z. Ramzan, "Microcredits for verifiable foreign service provider metering," in Financial Cryptography. Berlin, Germany: Springer-Verlag, 2004, pp. 9-23.
-
(2004)
Financial Cryptography
, pp. 9-23
-
-
Gentry, C.1
Ramzan, Z.2
-
19
-
-
33746634610
-
Evaluation of micropayment transaction costs
-
I. Papaefstathiou and C. Manifavas, "Evaluation of micropayment transaction costs," Electron. Commerce Res., vol.5, no.2, pp. 99-113, 2004.
-
(2004)
Electron. Commerce Res.
, vol.5
, Issue.2
, pp. 99-113
-
-
Papaefstathiou, I.1
Manifavas, C.2
-
20
-
-
0040507201
-
Digital newspapers explore marketing on the Internet
-
Sep.
-
J. Palmer and L. Eriksen, "Digital newspapers explore marketing on the Internet," Commun. ACM, vol.42, no.9, pp. 33-40, Sep. 1999.
-
(1999)
Commun. ACM
, vol.42
, Issue.9
, pp. 33-40
-
-
Palmer, J.1
Eriksen, L.2
-
21
-
-
70449488787
-
DSC: Cooperation incentive mechanism for multi-hop cellular networks
-
Dresden, Germany, Jun. 14-18
-
M. Mahmoud and X. Shen, "DSC: Cooperation incentive mechanism for multi-hop cellular networks," in Proc. IEEE ICC, Dresden, Germany, Jun. 14-18, 2009, pp. 569-574.
-
(2009)
Proc. IEEE ICC
, pp. 569-574
-
-
Mahmoud, M.1
Shen, X.2
-
22
-
-
0042660545
-
Stimulating cooperation in self-organizing mobile ad hoc networks
-
Oct.
-
L. Buttyan and J. Hubaux, "Stimulating cooperation in self-organizing mobile ad hoc networks," Mobile Netw. Appl., vol.8, no.5, pp. 579-592, Oct. 2004.
-
(2004)
Mobile Netw. Appl.
, vol.8
, Issue.5
, pp. 579-592
-
-
Buttyan, L.1
Hubaux, J.2
-
23
-
-
34547532527
-
A secure incentive protocol for mobile ad hoc networks
-
DOI 10.1007/s11276-006-6220-3
-
Y. Zhang, W. Lou, and Y. Fang, "A secure incentive protocol for mobile ad hoc networks," ACM Wireless Netw., vol.13, no.5, pp. 569-582, Oct. 2007. (Pubitemid 47185248)
-
(2007)
Wireless Networks
, vol.13
, Issue.5
, pp. 569-582
-
-
Zhang, Y.1
Lou, W.2
Liu, W.3
Fang, Y.4
-
24
-
-
11244281904
-
Cooperation and accounting strategy for multi-hop cellular networks
-
13th IEEE Workshop on Local and Metropolitan Area Networks (LANMAN 2004)
-
A.Weyland and T. Braun, "Cooperation and accounting strategy formultihop cellular networks," in Proc. IEEE Workshop LANMAN, Mill Valley, CA, Apr. 25-28, 2004, pp. 193-198. (Pubitemid 40061164)
-
(2004)
13th IEEE Workshop on Local and Metropolitan Area Networks (LANMAN 2004)
, pp. 193-198
-
-
Weyland, A.1
Braun, T.2
-
25
-
-
46149123833
-
-
Ph.D. dissertation, Univ. Bern, Bern, Switzerland Nov.
-
A. Weyland, "Cooperation and accounting in multi-hop cellular networks," Ph.D. dissertation, Univ. Bern, Bern, Switzerland, Nov. 2005.
-
(2005)
Cooperation and Accounting in Multi-hop Cellular Networks
-
-
Weyland, A.1
-
26
-
-
33746770977
-
Comparison of motivation-based cooperation mechanisms for hybrid wireless networks
-
Aug.
-
A.Weyland, T. Staub, and T. Braun, "Comparison of motivation-based cooperation mechanisms for hybrid wireless networks," Comput. Commun., vol. 29, no. 13/14, pp. 2661-2670, Aug. 2006.
-
(2006)
Comput. Commun.
, vol.29
, Issue.13-14
, pp. 2661-2670
-
-
Weyland, A.1
Staub, T.2
Braun, T.3
-
27
-
-
33751255669
-
Identity-based secure collaboration in wireless ad hoc networks
-
DOI 10.1016/j.comnet.2006.05.012, PII S1389128606001496
-
J. Pan, L. Cai, X. Shen, and J. Mark, "Identity-based secure collaboration in wireless ad hoc networks," Comput. Netw., vol.51, no.3, pp. 853-865, Feb. 2007. (Pubitemid 44792529)
-
(2007)
Computer Networks
, vol.51
, Issue.3
, pp. 853-865
-
-
Pan, J.1
Cai, L.2
Shen, X.3
Mark, J.W.4
-
28
-
-
35248817953
-
A micro-payment scheme encouraging collaboration in multi-hop cellular networks
-
La Guadeloupe Jan.
-
M. Jakobsson, J. Hubaux, and L. Buttyan, "A micro-payment scheme encouraging collaboration in multi-hop cellular networks," in Proc. 7th FC, La Guadeloupe, Jan. 2003, vol.2742, pp. 15-33.
-
(2003)
Proc. 7th FC
, vol.2742
, pp. 15-33
-
-
Jakobsson, M.1
Hubaux, J.2
Buttyan, L.3
-
29
-
-
77953317183
-
Stimulating cooperation in multi-hop wireless networks using cheating detection system
-
San Diego, CA, Mar. 14-19
-
M. Mahmoud and X. Shen, "Stimulating cooperation in multi-hop wireless networks using cheating detection system," in Proc. IEEE INFOCOM, San Diego, CA, Mar. 14-19, 2010, pp. 776-784.
-
(2010)
Proc. IEEE INFOCOM
, pp. 776-784
-
-
Mahmoud, M.1
Shen, X.2
-
30
-
-
33644643460
-
Node cooperation in hybrid ad hoc networks
-
Apr.
-
N. Salem, L. Buttyan, J. Hubaux, and M. Jakobsson, "Node cooperation in hybrid ad hoc networks," IEEE Trans. Mobile Comput., vol.5, no.4, pp. 365-376, Apr. 2006.
-
(2006)
IEEE Trans. Mobile Comput.
, vol.5
, Issue.4
, pp. 365-376
-
-
Salem, N.1
Buttyan, L.2
Hubaux, J.3
Jakobsson, M.4
-
31
-
-
0042933944
-
Sprite: A simple, cheat-proof, credit based system for mobile ad-hoc networks
-
San Francisco, CA, Mar. 30-Apr. 3
-
S. Zhong, J. Chen, and R. Yang, "Sprite: A simple, cheat-proof, credit based system for mobile ad-hoc networks," in Proc. IEEE INFOCOM, San Francisco, CA, Mar. 30-Apr. 3, 2003, vol.3, pp. 1987-1997.
-
(2003)
Proc. IEEE INFOCOM
, vol.3
, pp. 1987-1997
-
-
Zhong, S.1
Chen, J.2
Yang, R.3
-
32
-
-
77953313948
-
INPAC: An enforceable incentive scheme for wireless networks using network coding
-
San Diego, CA, Mar. 14-19
-
T. Chen and S. Zhong, "INPAC: An enforceable incentive scheme for wireless networks using network coding," in Proc. IEEE INFOCOM, San Diego, CA, Mar. 14-19, 2010, pp. 1-9.
-
(2010)
Proc. IEEE INFOCOM
, pp. 1-9
-
-
Chen, T.1
Zhong, S.2
-
33
-
-
67349189496
-
A secure credit-based cooperation stimulating mechanism for MANETs using hash chains
-
Sep.
-
H. Janzadeh, K. Fayazbakhsh, M. Dehghan, and M. Fallah, "A secure credit-based cooperation stimulating mechanism for MANETs using hash chains," Future Gener. Comput. Syst., vol.25, no.8, pp. 926-934, Sep. 2009.
-
(2009)
Future Gener. Comput. Syst.
, vol.25
, Issue.8
, pp. 926-934
-
-
Janzadeh, H.1
Fayazbakhsh, K.2
Dehghan, M.3
Fallah, M.4
-
34
-
-
0037715383
-
Charging support for ad hoc stub networks
-
Aug.
-
B. Lamparter, K. Paul, and D. Westhoff, "Charging support for ad hoc stub networks," Comput. Commun., vol.26, no.13, pp. 1504-1514, Aug. 2003.
-
(2003)
Comput. Commun.
, vol.26
, Issue.13
, pp. 1504-1514
-
-
Lamparter, B.1
Paul, K.2
Westhoff, D.3
-
35
-
-
0000629443
-
Dynamic source routing in ad hoc wireless networks
-
Norwell, MA: Kluwer ch. 5
-
D. Johnson and D. Maltz, "Dynamic source routing in ad hoc wireless networks," in Mobile Computing. Norwell, MA: Kluwer, 1996, ch. 5, pp. 153-181.
-
(1996)
Mobile Computing
, pp. 153-181
-
-
Johnson, D.1
Maltz, D.2
-
36
-
-
34347349933
-
Ad-hoc on-demand distance vector routing
-
New Orleans, LA Feb.
-
C. Perkins and E. Royer, "Ad-hoc on-demand distance vector routing," in Proc. IEEE Workshop Mobile Comput. Syst. Appl., New Orleans, LA, Feb. 1999, pp. 90-100.
-
(1999)
Proc. IEEE Workshop Mobile Comput. Syst. Appl.
, pp. 90-100
-
-
Perkins, C.1
Royer, E.2
-
37
-
-
0003960505
-
On the impossibility of fair exchange without a trusted third party
-
Darmstadt, Germany, Tech. Rep. TUD-BS- 1999-2002 Mar.
-
H. Pagnia and F. Gartner, "On the impossibility of fair exchange without a trusted third party," Darmstadt Univ. Technol., Darmstadt, Germany, Tech. Rep. TUD-BS-1999-2002, Mar. 1999.
-
(1999)
Darmstadt Univ. Technol.
-
-
Pagnia, H.1
Gartner, F.2
-
38
-
-
0035789229
-
The quest for security in mobile ad hoc networks
-
Oct.
-
J. Hubaux, L. Buttyán, and S. Capkun, "The quest for security in mobile ad hoc networks," in Proc. ACM Symp. Mobile Ad Hoc Netw. Comput., Oct. 2001, pp. 146-155.
-
(2001)
Proc. ACM Symp. Mobile Ad Hoc Netw. Comput.
, pp. 146-155
-
-
Hubaux, J.1
Buttyán, L.2
Capkun, S.3
-
39
-
-
32144433522
-
On designing incentive compatible routing and forwarding protocols in wireless ad-hoc networks
-
New York Aug.
-
S. Zhong, L. Li, Y. G. Liu, and Y. R. Yang, "On designing incentive compatible routing and forwarding protocols in wireless ad-hoc networks," in Proc. ACM MobiCom, New York, Aug. 2005, pp. 117-131.
-
(2005)
Proc. ACM MobiCom
, pp. 117-131
-
-
Zhong, S.1
Li, L.2
Liu, Y.G.3
Yang, Y.R.4
-
40
-
-
1542299118
-
Ad hoc-VCG: A trustful and costefficient routing protocol for mobile ad hoc networks with selfish agents
-
San Diego, CA Sep.
-
L. Anderegg and S. Eidenbenz, "Ad hoc-VCG: A trustful and costefficient routing protocol for mobile ad hoc networks with selfish agents," in Proc. ACM MobiCom, San Diego, CA, Sep. 2003, pp. 245-259.
-
(2003)
Proc. ACM MobiCom
, pp. 245-259
-
-
Anderegg, L.1
Eidenbenz, S.2
-
42
-
-
85029731561
-
A survey of attacks and countermeasures in mobile ad hoc networks
-
Berlin, Germany: Springer-Verlag, ser. Network Theory and Applications
-
B. Wu, J. Chen, J. Wu, and M. Cardei, "A survey of attacks and countermeasures in mobile ad hoc networks," in Wireless Network Security. Berlin, Germany: Springer-Verlag, 2007, ser. Network Theory and Applications, pp. 103-135.
-
(2007)
Wireless Network Security
, pp. 103-135
-
-
Wu, B.1
Chen, J.2
Wu, J.3
Cardei, M.4
-
43
-
-
15244339622
-
Authenticated routing for ad hoc networks
-
Mar.
-
K. Sanzgiri, D. LaFlamme, B. Dahill, B. Levine, C. Shields, and E. Belding-Royer, "Authenticated routing for ad hoc networks," IEEE J. Sel. Areas Commun., vol.23, no.3, pp. 598-610, Mar. 2005.
-
(2005)
IEEE J. Sel. Areas Commun.
, vol.23
, Issue.3
, pp. 598-610
-
-
Sanzgiri, K.1
Laflamme, D.2
Dahill, B.3
Levine, B.4
Shields, C.5
Belding-Royer, E.6
-
44
-
-
0036957315
-
Ariadne: A secure on-demand routing protocol for ad hoc networks
-
Atlanta, GA Sep.
-
Y. Hu, A. Perrig, and D. Johnson, "Ariadne: A secure on-demand routing protocol for ad hoc networks," in Proc. ACM MobiCom, Atlanta, GA, Sep. 2002, pp. 12-23.
-
(2002)
Proc. ACM MobiCom
, pp. 12-23
-
-
Hu, Y.1
Perrig, A.2
Johnson, D.3
-
45
-
-
85028913061
-
On-line/off-line digital signatures
-
Berlin, Germany: Springer- Verlag
-
S. Even, O. Goldreich, and S. Micali, "On-line/off-line digital signatures," in Advances in Cryptology-Crypto'89. Berlin, Germany: Springer- Verlag, 1990, pp. 263-277.
-
(1990)
Advances in Cryptology-Crypto'89
, pp. 263-277
-
-
Even, S.1
Goldreich, O.2
Micali, S.3
-
46
-
-
20844452371
-
Fast architectures for FPGA-based implementation of RSA encryption algorithm
-
Proceedings - 2004 IEEE International Conference on Field-Programmable Technology, FPT '04
-
O. Nibouche,M. Nibouche, A. Bouridane, and A. Belatreche, "Fast architectures for FPGA-based implementation of RSA encryption algorithm," in Proc. IEEE Field-Programmable Technol. Conf., Brisbane, Australia, Dec. 2004, pp. 271-278. (Pubitemid 40859508)
-
(2004)
Proceedings - 2004 IEEE International Conference on Field-Programmable Technology, FPT '04
, pp. 271-278
-
-
Nibouche, O.1
Nibouche, M.2
Bouridane, A.3
Belatreche, A.4
-
47
-
-
1542358984
-
Sound mobility models
-
San Diego, CA Sep.
-
J. Yoon, M. Liu, and B. Nobles, "Sound mobility models," in Proc. ACM MobiCom, San Diego, CA, Sep. 2003, pp. 205-216.
-
(2003)
Proc. ACM MobiCom
, pp. 205-216
-
-
Yoon, J.1
Liu, M.2
Nobles, B.3
|