-
1
-
-
43149095562
-
Multilayer flavoured dynamic source routing in mobile ad-hoc networks
-
DOI 10.1049/iet-com:20070096
-
S. Adibi, and G.B. Agnew Multilayer flavoured dynamic source routing in mobile ad-hoc networks IET Communications 2 5 2008 690 707 (Pubitemid 351641065)
-
(2008)
IET Communications
, vol.2
, Issue.5
, pp. 690-707
-
-
Adibi, S.1
Agnew, G.B.2
-
4
-
-
67349210618
-
On asymptotically optimal routing in large wireless networks and Geometrical Optics analogy
-
R. Catanuto, S. Toumpis, and G. Morabito On asymptotically optimal routing in large wireless networks and Geometrical Optics analogy Computer Networks 53 1 2009 1939 1955
-
(2009)
Computer Networks
, vol.53
, Issue.1
, pp. 1939-1955
-
-
Catanuto, R.1
Toumpis, S.2
Morabito, G.3
-
5
-
-
79956070567
-
Trust Management in Ad Hoc Network for Secure DSR Routing
-
S. Choudhury, S.D. Roy, and S.A. Singh Trust Management in Ad Hoc Network for Secure DSR Routing Tarek Sobh, Khaled Elleithy, Ausif Mahmood, Mohammad A. Karim, Novel algorithms and techniques in telecommunications, automation and industrial electronics 2008 Springer Netherlands 496 500
-
(2008)
Novel Algorithms and Techniques in Telecommunications, Automation and Industrial Electronics
, pp. 496-500
-
-
Choudhury, S.1
Roy, S.D.2
Singh, S.A.3
-
6
-
-
67650753581
-
Incentive-based control of ad hoc networks: A performance study
-
J. Gobel, A. Krzesinski, and M. Mandjes Incentive-based control of ad hoc networks: A performance study Computer Networks 53 14 2009 2427 2443
-
(2009)
Computer Networks
, vol.53
, Issue.14
, pp. 2427-2443
-
-
Gobel, J.1
Krzesinski, A.2
Mandjes, M.3
-
7
-
-
44649172603
-
Using TPMs to Secure Vehicular Ad-Hoc Networks (VANETs). Lecture Notes in Computer Science, Information Security Theory and Practices
-
G. Guette, and C. Bryce Using TPMs to Secure Vehicular Ad-Hoc Networks (VANETs). Lecture Notes in Computer Science, Information Security Theory and Practices Smart Devices, Convergence and Next Generation Networks 2008 106 116
-
(2008)
Smart Devices, Convergence and Next Generation Networks
, pp. 106-116
-
-
Guette, G.1
Bryce, C.2
-
8
-
-
0000629443
-
Dynamic source routing in ad hoc wireless networks
-
D. Johnson, and D. Maltz Dynamic source routing in ad hoc wireless networks Tomasz Imielinski, Hank Korth, Mobile computing 1996 Kluwer Academic Publishers 153 181 chapter 5
-
(1996)
Mobile Computing
, pp. 153-181
-
-
Johnson, D.1
Maltz, D.2
-
9
-
-
77952085286
-
AODV-RIP: Improved security in mobile ad hoc networks through route investigation procedure
-
B.S. Kang, H.S. Kim, and I.Y. Ko AODV-RIP: improved security in mobile ad hoc networks through route investigation procedure Concurrency and Computation: Practice & Experience 22 7 2010 816 830
-
(2010)
Concurrency and Computation: Practice & Experience
, vol.22
, Issue.7
, pp. 816-830
-
-
Kang, B.S.1
Kim, H.S.2
Ko, I.Y.3
-
11
-
-
68449104742
-
On the detection of signaling DoS attacks on 3 G/WiMax wireless networks
-
PC Patrick Lee, T Bu, and T Woo On the detection of signaling DoS attacks on 3 G/WiMax wireless networks Computer Networks 53 15 2009 2601 2616
-
(2009)
Computer Networks
, vol.53
, Issue.15
, pp. 2601-2616
-
-
Patrick, C.L.P.1
Bu, T.2
Woo, T.3
-
12
-
-
42649129419
-
Future trust management framework for mobile ad hoc networks
-
DOI 10.1109/MCOM.2008.4481349
-
J. Li, R. Li, and J. Kato Future Trust Management Framework for mobile ad hoc networks IEEE Communications Magazine 46 4 2008 108 114 (Pubitemid 351593416)
-
(2008)
IEEE Communications Magazine
, vol.46
, Issue.4
, pp. 108-114
-
-
Li, J.1
Li, R.2
Kato, J.3
-
13
-
-
58049100792
-
Fuzzy trust recommendation based on collaborative filtering for mobile ad-hoc networks
-
October
-
Luo J, Liu X, Zhang Y, Ye D, Xu Z. Fuzzy trust recommendation based on collaborative filtering for mobile ad-hoc networks. In: Proceedings of IEEE conference on local computer networks (LCN'08); October 2008. pp. 30511.
-
(2008)
Proceedings of IEEE Conference on Local Computer Networks (LCN'08)
, pp. 305-311
-
-
Luo, J.1
Liu, X.2
Zhang, Y.3
Ye, D.4
Xu, Z.5
-
14
-
-
67349173961
-
A trust degree based access control in grid environments
-
J. Luo, X. Ni, and J. Yong A trust degree based access control in grid environments Information Science 179 15 2009 2618 2628
-
(2009)
Information Science
, vol.179
, Issue.15
, pp. 2618-2628
-
-
Luo, J.1
Ni, X.2
Yong, J.3
-
15
-
-
67549118440
-
Design and implementation of MobiSEC: A complete security architecture for wireless mesh networks
-
F. Martignon, S. Paris, and A. Capone Design and implementation of MobiSEC: A complete security architecture for wireless mesh networks Computer Networks 53 12 2009 2192 2207
-
(2009)
Computer Networks
, vol.53
, Issue.12
, pp. 2192-2207
-
-
Martignon, F.1
Paris, S.2
Capone, A.3
-
16
-
-
38749146509
-
Analysis of a reputation system for Mobile Ad-Hoc Networks with liars
-
DOI 10.1016/j.peva.2007.05.004, PII S016653160700048X
-
J. Mundinger, and Boudec J.-Y. Le Analysis of a reputation system for Mobile Ad-Hoc Networks with liars Performance Evaluation 65 34 2008 212 226 (Pubitemid 351179860)
-
(2008)
Performance Evaluation
, vol.65
, Issue.3-4
, pp. 212-226
-
-
Mundinger, J.1
Le Boudec, J.-Y.2
-
17
-
-
77950193796
-
Trusted Routing Based on Dynamic Trust Mechanism in Mobile Ad-Hoc Networks
-
S.C. Peng, W.J. Jia, G.J. Wang, J. Wu, and M.Y. Guo Trusted Routing Based on Dynamic Trust Mechanism in Mobile Ad-Hoc Networks IEICE TRANSACTIONS on Information and Systems E93-D 3 2010 510 517
-
(2010)
IEICE TRANSACTIONS on Information and Systems E93-D
, Issue.3
, pp. 510-517
-
-
Peng, S.C.1
Jia, W.J.2
Wang, G.J.3
Wu, J.4
Guo, M.Y.5
-
18
-
-
33747431615
-
Incorporating trust and reputation in the DSR protocol for dependable routing
-
DOI 10.1016/j.comcom.2005.10.032, PII S0140366405004226
-
A.A. Pirzada, A. Datta, and C. McDonald Incorporating trust and reputation in the DSR protocol for dependable routing Computer Communications 29 15 2006 2806 2821 (Pubitemid 44251146)
-
(2006)
Computer Communications
, vol.29
, Issue.15
, pp. 2806-2821
-
-
Pirzada, A.A.1
Datta, A.2
McDonald, C.3
-
20
-
-
33845726678
-
Securing vehicular ad hoc networks
-
M. Raya, and J.P. Hubaux Securing vehicular ad hoc networks Journal of Computer Security 15 1 2007 39 68 (Pubitemid 46012642)
-
(2007)
Journal of Computer Security
, vol.15
, Issue.1
, pp. 39-68
-
-
Raya, M.1
Hubaux, J.-P.2
-
21
-
-
65949087881
-
A trustworthiness-based QoS routing protocol for wireless ad hoc networks
-
M. Yu, and K.K. Leung A trustworthiness-based QoS routing protocol for wireless ad hoc networks IEEE Transactions on Wireless Communications 8 4 2009 1888 1898
-
(2009)
IEEE Transactions on Wireless Communications
, vol.8
, Issue.4
, pp. 1888-1898
-
-
Yu, M.1
Leung, K.K.2
-
22
-
-
59649116337
-
A secure routing protocol against Byzantine attacks for MANETs in adversarial environments
-
M. Yu, M. Zhou, and W. Su A secure routing protocol against Byzantine attacks for MANETs in adversarial environments IEEE Transactions on Vehicular Technology 58 1 2009 449 460
-
(2009)
IEEE Transactions on Vehicular Technology
, vol.58
, Issue.1
, pp. 449-460
-
-
Yu, M.1
Zhou, M.2
Su, W.3
-
23
-
-
29144503110
-
Attack-resistant cooperation stimulation in autonomous Ad Hoc networks
-
DOI 10.1109/JSAC.2005.857201
-
W. Yu, and K.J.R. Liu Attack-resistant cooperation stimulation in autonomous ad hoc networks IEEE Journal on Selected Areas in Communications 23 12 2005 2260 2271 (Pubitemid 41811977)
-
(2005)
IEEE Journal on Selected Areas in Communications
, vol.23
, Issue.12
, pp. 2260-2271
-
-
Yu, W.1
Ray Liu, K.J.2
|