-
1
-
-
62249166562
-
DTN based dominating set routing for MANET in heterogeneous wireless networking
-
April
-
H. Samuel, W. Zhuang, and B. Preiss, "DTN based dominating set routing for MANET in heterogeneous wireless networking," Mobile Networks and Applications, vol. 14, pp. 154-164, April 2009.
-
(2009)
Mobile Networks and Applications
, vol.14
, pp. 154-164
-
-
Samuel, H.1
Zhuang, W.2
Preiss, B.3
-
2
-
-
51249097215
-
Routing over interconnected heterogeneous wireless networks with intermittent connections
-
May
-
H. Samuel, W. Zhuang, and B. Preiss, "Routing over interconnected heterogeneous wireless networks with intermittent connections," in Proc. IEEE ICC'08, pp. 2282-2286, May 2008.
-
(2008)
Proc. IEEE Icc'08
, pp. 2282-2286
-
-
Samuel, H.1
Zhuang, W.2
Preiss, B.3
-
3
-
-
1242310099
-
A delay-tolerant network architecture for challenged internets," in
-
K. Fall, "A delay-tolerant network architecture for challenged internets," in Proc. ACM SIGCOMM'03, pp. 27-34, 2003.
-
(2003)
Proc. Acm Sigcomm'03
, pp. 27-34
-
-
Fall, K.1
-
5
-
-
84945186803
-
Message ferrying: Proactive routing in highly-partitioned wireless ad hoc networks,"
-
W. Zhao and M. H. Ammar, "Message ferrying: proactive routing in highly-partitioned wireless ad hoc networks," in Proc. IEEE FTDCS'03, pp. 308-314, 2003.
-
(2003)
Proc. IEEE Ftdcs'03
, pp. 308-314
-
-
Zhao, W.1
Ammar, M.H.2
-
6
-
-
4444277059
-
A message ferrying approach for data delivery in sparse mobile ad hoc networks," in
-
W. Zhao, M. Ammar, and E. Zegura, "A message ferrying approach for data delivery in sparse mobile ad hoc networks," in Proc. ACM MobiHoc'04, pp. 187-198, 2004.
-
(2004)
Proc. Acm Mobihoc'04
, pp. 187-198
-
-
Zhao, W.1
Ammar, M.2
Zegura, E.3
-
7
-
-
78651524487
-
DTN based dominating set routing technique for mobile ad hoc networks
-
July
-
Hany Samuel, W. Zhuang, and B. Preiss, "DTN based dominating set routing technique for mobile ad hoc networks," in Proc. QShine '08, July 2008.
-
(2008)
Proc. Qshine '08
-
-
Samuel, H.1
Zhuang, W.2
Preiss, B.3
-
8
-
-
34247271637
-
-
IRTF, DTN research group, February
-
S. Farrell, S. Symington, H. Weiss, and P. Lovell, "Delay-tolerant networking security overview," IRTF, DTN research group, February 2008.
-
(2008)
Delay-tolerant Networking Security Overview
-
-
Farrell, S.1
Symington, S.2
Weiss, H.3
Lovell, P.4
-
9
-
-
43549089535
-
Multi-user broadcast authentication in wireless sensor networks
-
June
-
K. Ren, W. Lou, and Y. Zhang, "Multi-user broadcast authentication in wireless sensor networks," in Proc. IEEE SECON'07, pp. 223-232, June 2007.
-
(2007)
Proc. IEEE Secon'07
, pp. 223-232
-
-
Ren, K.1
Lou, W.2
Zhang, Y.3
-
10
-
-
33845726678
-
Securing vehicular ad hoc networks
-
M. Raya and J. P. Hubaux, "Securing vehicular ad hoc networks," Journal of Computer Security, vol. 15, no. 1, pp. 39-68, 2007.
-
(2007)
Journal of Computer Security
, vol.15
, Issue.1
, pp. 39-68
-
-
Raya, M.1
Hubaux, J.P.2
-
11
-
-
51349156734
-
ECPP: Efficient conditional privacy preservation protocol for secure vehicular communications," in
-
April
-
R. Lu, X. Lin, H. Zhu, P.-H. Ho, and X. Shen, "ECPP: efficient conditional privacy preservation protocol for secure vehicular communications," in Proc. IEEE INFOCOM 2008,pp. 1229-1237, April 2008.
-
(2008)
Proc. IEEE Infocom 2008
, pp. 1229-1237
-
-
Lu, R.1
Lin, X.2
Zhu, H.3
Ho, P.-H.4
Shen, X.5
-
12
-
-
51449098979
-
An efficient identity-based batch verification scheme for vehicular sensor networks," in
-
April
-
C. Zhang, R. Lu, X. Lin, P.-H. Ho, and X. Shen, "An efficient identity-based batch verification scheme for vehicular sensor networks," in Proc. IEEE INFOCOM 2008, pp. 246-250, April 2008.
-
(2008)
Proc. IEEE Infocom
, vol.2008
, pp. 246-250
-
-
Zhang, C.1
Lu, R.2
Lin, X.3
Ho, P.-H.4
Shen, X.5
-
13
-
-
36749076982
-
GSIS: A secure and privacy-preserving protocol for vehicular communications
-
Nov.
-
X. Lin, X. Sun, P.-H. Ho, and X. Shen, "GSIS: a secure and privacy-preserving protocol for vehicular communications," IEEE Trans. Vehicular Technology, vol. 56, no. 6, pp. 3442-3456, Nov. 2007.
-
(2007)
IEEE Trans. Vehicular Technology
, vol.56
, Issue.6
, pp. 3442-3456
-
-
Lin, X.1
Sun, X.2
Ho, P.-H.3
Shen, X.4
-
14
-
-
51249100419
-
RAISE: An efficient rsuaided message authentication scheme in vehicular communication networks," in
-
May
-
C. Zhang, X. Lin, R. Lu, and P.-H. Ho, "RAISE: An efficient rsuaided message authentication scheme in vehicular communication networks," in Proc. IEEE ICC'08, pp. 1451-1457, May 2008.
-
(2008)
Proc. IEEE Icc'08
, pp. 1451-1457
-
-
Zhang, C.1
Lin, X.2
Lu, R.3
Ho, P.-H.4
-
15
-
-
35448931599
-
Applicability of identity-based cryptography for disruption-tolerant networking," in
-
N. Asokan, K. Kostiainen, P. Ginzboorg, J. Ott, and C. Luo, "Applicability of identity-based cryptography for disruption-tolerant networking," in Proc. ACM MobiOpp'07, pp. 52-56, 2007.
-
(2007)
Proc. Acm Mobiopp'07
, pp. 52-56
-
-
Asokan, N.1
Kostiainen, K.2
Ginzboorg, P.3
Ott, J.4
Luo, C.5
-
16
-
-
33746103748
-
Cross-layer design for resource allocation in 3G wireless networks and beyond
-
Dec.
-
H. Jiang, W. Zhuang, and X. Shen, "Cross-layer design for resource allocation in 3G wireless networks and beyond," IEEE Communications Magazine, vol. 43, no. 12, pp. 20-126, Dec. 2005.
-
(2005)
IEEE Communications Magazine
, vol.43
, Issue.12
, pp. 20-126
-
-
Jiang, H.1
Zhuang, W.2
Shen, X.3
-
17
-
-
33749423633
-
Scalable supernode selection in peer-to-peer overlay networks
-
July
-
V. Lo, D. Zhou, Y. Liu, C. GauthierDickey, and J. Li, "Scalable supernode selection in peer-to-peer overlay networks," in Proc. Second International Workshop on Hot Topics in Peer-to-Peer Systems, pp. 18-25, July 2005.
-
(2005)
Proc. Second International Workshop On Hot Topics In Peer-to-peer Systems
, pp. 18-25
-
-
Lo, V.1
Zhou, D.2
Liu, Y.3
Gauthierdickey, C.4
Li, J.5
-
18
-
-
0035101078
-
Toward self-organized mobile ad hoc networks: The terminodes project
-
Jan
-
J.-P. Hubaux, T. Gross, J.-Y. Le Boudec, and M. Vetterli, "Toward self-organized mobile ad hoc networks: the terminodes project," IEEE Communications Magazine, vol. 39, no. 1, pp. 118-124, Jan 2001.
-
(2001)
IEEE Communications Magazine
, vol.39
, Issue.1
, pp. 118-124
-
-
Hubaux, J.-P.1
Gross, T.2
le Boudec, J.-Y.3
Vetterli, M.4
-
19
-
-
37849034148
-
Surviving attacks on disruption-tolerant networks without authentication," in
-
J. Burgess, G. D. Bissias, M. D. Corner, and B. N. Levine, "Surviving attacks on disruption-tolerant networks without authentication," in Proc. ACM MobiHoc'07, pp. 61-70, 2007.
-
(2007)
Proc. Acm Mobihoc'07
, pp. 61-70
-
-
Burgess, J.1
Bissias, G.D.2
Corner, M.D.3
Levine, B.N.4
-
21
-
-
0035789229
-
The Quest For Security In Mobile Ad Hoc Networks
-
J.-P. Hubaux, L. Buttyán, and S. Capkun, "The quest for security in mobile ad hoc networks," in Proc. ACM MobiHoc'01, pp. 146-155,2001.
-
(2001)
Proc. Acm Mobihoc'01
, pp. 146-155
-
-
Hubaux, J.-P.1
Buttyán, L.2
Capkun, S.3
-
22
-
-
51649086444
-
Performance evaluation of vehicular DTN routing under realistic mobility models
-
April
-
P. Luo, H. Huang, W. Shu, M. Li, and M.-Y. Wu, "Performance evaluation of vehicular DTN routing under realistic mobility models," in Proc. IEEE WCNC 2008, pp. 2206-2211, April 2008.
-
(2008)
Proc. IEEE Wcnc 2008
, pp. 2206-2211
-
-
Luo, P.1
Huang, H.2
Shu, W.3
Li, M.4
Wu, M.-Y.5
|