-
1
-
-
63449129290
-
Multi-Hop Relay for Next-Generation Wireless Access Networks,
-
G. Shen J. Liu D. Wang J. Wang S. Jin Multi-Hop Relay for Next-Generation Wireless Access Networks, Bell Labs Technical J., 13 4 175 193 2009
-
(2009)
Bell Labs Technical J.,
, vol.13
, Issue.4
, pp. 175-193
-
-
-
2
-
-
43449084339
-
Multihop Cellular Networks: Technology and Economics,
-
X. Li B. Seet P. Chong Multihop Cellular Networks: Technology and Economics, Computer Networks, 52 9 1825 1837 June 2008
-
(2008)
Computer Networks,
, vol.52
, Issue.9
, pp. 1825-1837
-
-
-
3
-
-
62949086368
-
Statistical QoS Routing for IEEE 802.11 Multihop Ad Hoc Networks,
-
A. Abdrabou W. Zhuang Statistical QoS Routing for IEEE 802.11 Multihop Ad Hoc Networks, IEEE Trans. Wireless Comm., 8 3 1542 1552 Mar. 2009
-
(2009)
IEEE Trans. Wireless Comm.,
, vol.8
, Issue.3
, pp. 1542-1552
-
-
-
4
-
-
67349168446
-
BAT: A Robust Signature Scheme for Vehicular Networks Using Binary Authentication Tree,
-
Y. Jiang M. Shi X. Shen C. Lin BAT: A Robust Signature Scheme for Vehicular Networks Using Binary Authentication Tree, IEEE Trans. Wireless Comm., 8 4 1974 1983 Apr. 2009
-
(2009)
IEEE Trans. Wireless Comm.,
, vol.8
, Issue.4
, pp. 1974-1983
-
-
-
5
-
-
33747142749
-
The Capacity of Wireless Networks,
-
P. Gupta P. Kumar The Capacity of Wireless Networks, IEEE Trans. Information Theory, 46 2 388 404 Mar. 2000
-
(2000)
IEEE Trans. Information Theory,
, vol.46
, Issue.2
, pp. 388-404
-
-
-
6
-
-
85176996358
-
-
S. Marti T. Giuli K. Lai M. Baker Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Proc. IEEE/ACM MobiCom, 255 265 Proc. IEEE/ACM MobiCom, 2000-Aug.
-
(2000)
, pp. 255-265
-
-
-
7
-
-
85177017527
-
-
D.B. Johnson D.A. Maltz Y.C. Hu The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks (DSR), Feb. 2007
-
(2007)
-
-
-
8
-
-
85176999319
-
-
P. Michiardi R. Molva Simulation-Based Analysis of Security Exposures in Mobile Ad Hoc Networks, Proc. European Wireless Conf., Proc. European Wireless Conf., 2002-Feb.
-
(2002)
-
-
-
9
-
-
85177022012
-
-
J. Hu Cooperation in Mobile Ad Hoc Networks, Jan. 2005
-
(2005)
-
-
-
10
-
-
33646845802
-
Cooperation Enforcement Schemes for MANETs: A Survey,
-
G. Marias P. Georgiadis D. Flitzanis K. Mandalas Cooperation Enforcement Schemes for MANETs: A Survey, Wireless Comm. and Mobile Computing, 6 3 319 332 2006
-
(2006)
Wireless Comm. and Mobile Computing,
, vol.6
, Issue.3
, pp. 319-332
-
-
-
11
-
-
85177015000
-
-
J. Jaramillo R. Srikant DARWIN: Distributed and Adaptive Reputation Mechanism for Wireless Networks, Proc. ACM MobiCom, 87 98 Proc. ACM MobiCom, 2007-Sept.
-
(2007)
, pp. 87-98
-
-
-
12
-
-
33646823968
-
A Secure Incentive Architecture for Ad-Hoc Networks,
-
Q. He D. Wu P. Khosla A Secure Incentive Architecture for Ad-Hoc Networks, Wireless Comm. and Mobile Computing, 6 3 333 346 May 2006
-
(2006)
Wireless Comm. and Mobile Computing,
, vol.6
, Issue.3
, pp. 333-346
-
-
-
13
-
-
34247167001
-
A Scalable and Robust Approach to Collaboration Enforcement in Mobile Ad-Hoc Networks,
-
N. Jiang K. Hua D. Liu A Scalable and Robust Approach to Collaboration Enforcement in Mobile Ad-Hoc Networks, Comm. and Networks, 9 1 56 66 2007
-
(2007)
Comm. and Networks,
, vol.9
, Issue.1
, pp. 56-66
-
-
-
14
-
-
41549123255
-
Message Dropping Attacks in Overlay Networks: Attack Detection and Attacker Identification,
-
L. Xie S. Zhu Message Dropping Attacks in Overlay Networks: Attack Detection and Attacker Identification, ACM Trans. Information and System Security, 11 3 Mar. 2008
-
(2008)
ACM Trans. Information and System Security,
, vol.11
, Issue.3
-
-
-
15
-
-
34547545598
-
A Secure Authentication and Billing Architecture for Wireless Mesh Networks,
-
Y. Zhang Y. Fang A Secure Authentication and Billing Architecture for Wireless Mesh Networks, ACM Wireless Networks, 13 5 569 582 Oct. 2007
-
(2007)
ACM Wireless Networks,
, vol.13
, Issue.5
, pp. 569-582
-
-
-
16
-
-
85177016193
-
-
L. Buttyan J. Hubaux Nuglets: A Virtual Currency to Stimulate Cooperation in Self Organized Ad Hoc Networks, Jan. 2001
-
(2001)
-
-
-
17
-
-
0042660545
-
Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks,
-
L. Buttyan J. Hubaux Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks, Mobile Networks and Applications, 8 5 579 592 Oct. 2004
-
(2004)
Mobile Networks and Applications,
, vol.8
, Issue.5
, pp. 579-592
-
-
-
18
-
-
85177013614
-
-
A. Weyland T. Braun Cooperation and Accounting Strategy for Multi-Hop Cellular Networks, Proc. IEEE Workshop Local and Metropolitan Area Networks (LANMAN), 193 198 Proc. IEEE Workshop Local and Metropolitan Area Networks (LANMAN), 2004-Apr.
-
(2004)
, pp. 193-198
-
-
-
19
-
-
85177018156
-
-
A. Weyland Cooperation and Accounting in Multi-Hop Cellular Networks, Nov. 2005
-
(2005)
-
-
-
20
-
-
34547532527
-
A Secure Incentive Protocol for Mobile Ad Hoc Networks,
-
Y. Zhang W. Lou Y. Fang A Secure Incentive Protocol for Mobile Ad Hoc Networks, ACM Wireless Networks, 13 5 569 582 Oct. 2007
-
(2007)
ACM Wireless Networks,
, vol.13
, Issue.5
, pp. 569-582
-
-
-
21
-
-
33751255669
-
Identity-Based Secure Collaboration in Wireless Ad Hoc Networks,
-
J. Pan L. Cai X. Shen J. Mark Identity-Based Secure Collaboration in Wireless Ad Hoc Networks, Computer Networks, 51 3 853 865 2007
-
(2007)
Computer Networks,
, vol.51
, Issue.3
, pp. 853-865
-
-
-
22
-
-
85177019446
-
-
S. Zhong J. Chen R. Yang Sprite: A Simple, Cheat-Proof, Credit Based System for Mobile Ad-Hoc Networks, Proc. IEEE INFOCOM, 3 1987 1997 Proc. IEEE INFOCOM, 2003
-
(2003)
, vol.3
, pp. 1987-1997
-
-
-
23
-
-
33644643460
-
Node Cooperation in Hybrid Ad Hoc Networks,
-
N. Salem L. Buttyan J. Hubaux M. Jakobsson Node Cooperation in Hybrid Ad Hoc Networks, IEEE Trans. Mobile Computing, 5 4 365 376 Apr. 2006
-
(2006)
IEEE Trans. Mobile Computing,
, vol.5
, Issue.4
, pp. 365-376
-
-
-
24
-
-
85177002163
-
-
M. Jakobsson J. Hubaux L. Buttyan A Micro-Payment Scheme Encouraging Collaboration in Multi-Hop Cellular Networks, Proc. Seventh Financial Cryptography, 15 33 Proc. Seventh Financial Cryptography, 2003-Jan.
-
(2003)
, pp. 15-33
-
-
-
25
-
-
0037715383
-
Charging Support for AdHoc Stub Networks,
-
B. Lamparter K. Paul D. Westhoff Charging Support for AdHoc Stub Networks, Computer Comm., 26 13 1504 1514 2003
-
(2003)
Computer Comm.,
, vol.26
, Issue.13
, pp. 1504-1514
-
-
-
26
-
-
85176991905
-
-
M. Mahmoud X. Shen DSC: Cooperation Incentive Mechanism for Multi-Hop Cellular Networks, Proc. IEEE Int'l Conf. Comm. (ICC '09), 569 574 Proc. IEEE Int'l Conf. Comm. (ICC '09), 2009-June
-
(2009)
, pp. 569-574
-
-
-
27
-
-
85176992065
-
-
M. Mahmoud X. Shen Stimulating Cooperation in Multi-Hop Wireless Networks Using Cheating Detection System, Proc. IEEE INFOCOM, 776 785 Proc. IEEE INFOCOM, 2010-Mar.
-
(2010)
, pp. 776-785
-
-
-
28
-
-
85177015727
-
-
L. Anderegg S. Eidenbenz Ad Hoc-VCG: A Trustful and Cost-Efficient Routing Protocol for Mobile Ad Hoc Networks with Selfish Agents, Proc. ACM MobiCom, Proc. ACM MobiCom, 2003-Sept.
-
(2003)
-
-
-
29
-
-
85177013291
-
-
H. Pagnia F. Gartner On the Impossibility of Fair Exchange without a Trusted Third Party, Mar. 1999
-
(1999)
-
-
-
30
-
-
85176994853
-
-
D. Boneh M. Franklin Identity Based Encryption from the Weil Pairing, Proc. 21st Ann. Int'l Cryptology Conf. Advances in Cryptology (Crypto '01), 213 229 Proc. 21st Ann. Int'l Cryptology Conf. Advances in Cryptology (Crypto '01), 2001
-
(2001)
, pp. 213-229
-
-
-
31
-
-
85176998743
-
-
Recommendation for Key ManagementPart 1: General (Revised), 2007
-
(2007)
-
-
-
32
-
-
0003923962
-
Handbook of Applied Cryptography,
-
A. Menzies P. Orschot S. Vanstone Handbook of Applied Cryptography, 1996 http://www.cacr.math.uwaterloo.ca/hac
-
(1996)
-
-
-
33
-
-
85177019966
-
-
J. Yoon M. Liu B. Nobles Sound Mobility Models, Proc. ACM MobiCom, Proc. ACM MobiCom, 2003-Sept.
-
(2003)
-
-
-
34
-
-
85176995571
-
-
W. Dai Crypto++ Library 5.6.0, 2009 http://www.cryptopp.com
-
(2009)
-
-
-
35
-
-
33646382089
-
A Study of the Energy Consumption Characteristics of Cryptographic Algorithms and Security Protocols,
-
N. Potlapally S. Ravi A. Raghunathan N. Jha A Study of the Energy Consumption Characteristics of Cryptographic Algorithms and Security Protocols, IEEE Trans. Mobile Computing, 2 128 143 Mar.-Apr. 2006
-
(2006)
IEEE Trans. Mobile Computing,
, Issue.2
, pp. 128-143
-
-
-
36
-
-
33144476837
-
Location-Based Compromise-Tolerant Security Mechanisms for Wireless Sensor Networks,
-
Y. Zhang W. Liu W. Lou Y. Fang Location-Based Compromise-Tolerant Security Mechanisms for Wireless Sensor Networks, IEEE J. Selected Areas Comm., 24 2 247 260 Feb. 2006
-
(2006)
IEEE J. Selected Areas Comm.,
, vol.24
, Issue.2
, pp. 247-260
-
-
|