-
1
-
-
75349109660
-
Car: Context-aware adaptive routing for delay-tolerant mobile networks
-
M. Musolesi, and C. Mascolo Car: context-aware adaptive routing for delay-tolerant mobile networks IEEE Transactions on Mobile Computing 8 2009 246 260
-
(2009)
IEEE Transactions on Mobile Computing
, vol.8
, pp. 246-260
-
-
Musolesi, M.1
Mascolo, C.2
-
5
-
-
33749041735
-
Practical security for disconnected nodes
-
Boston, Massachusetts, USA
-
A. Seth, S. Keshav, Practical security for disconnected nodes, in: ICNP Workshop on Secure Network Protocols, (NPSec), Boston, Massachusetts, USA, 2005.
-
(2005)
ICNP Workshop on Secure Network Protocols, (NPSec)
-
-
Seth, A.1
Keshav, S.2
-
6
-
-
71449092160
-
Security analysis for delay/disruption tolerant satellite and sensor networks
-
Siena, Italy
-
N. Bhutta, G. Ansa, E. Johnson, N. Ahmad, M. Alsiyabi, H. Cruickshank, Security analysis for delay/disruption tolerant satellite and sensor networks, in: International Workshop on Satellite and Space Communications (IWSSC 2009), Siena, Italy, 2009.
-
(2009)
International Workshop on Satellite and Space Communications (IWSSC 2009)
-
-
Bhutta, N.1
Ansa, G.2
Johnson, E.3
Ahmad, N.4
Alsiyabi, M.5
Cruickshank, H.6
-
7
-
-
84942426861
-
Secure routing in wireless sensor networks: Attacks and countermeasures
-
Anchorage, Alaska, USA
-
C. Karlof, D. Wagner, Secure routing in wireless sensor networks: attacks and countermeasures, in: IEEE Internationl Workshop on Sensor Network Protocols and Applications, Anchorage, Alaska, USA, 2003, pp. 113-127.
-
(2003)
IEEE Internationl Workshop on Sensor Network Protocols and Applications
, pp. 113-127
-
-
Karlof, C.1
Wagner, D.2
-
8
-
-
77951457637
-
Sred: A secure reputation-based dynamic window scheme for disruption-tolerant networks
-
Boston
-
Z. Xu, Y. Jin, W. Shu, X. Liu, J. Luo, Sred: A secure reputation-based dynamic window scheme for disruption-tolerant networks, in: Military Communications Conference (MILCOM 2009), Boston, 2009, pp. 1-7.
-
(2009)
Military Communications Conference (MILCOM 2009)
, pp. 1-7
-
-
Xu, Z.1
Jin, Y.2
Shu, W.3
Liu, X.4
Luo, J.5
-
10
-
-
70449134190
-
Impact of selective dropping attacks on network coding performance in DTNS and a potential mitigation scheme
-
San Francisco, CA
-
M. Chuah, P. Yang, Impact of selective dropping attacks on network coding performance in DTNS and a potential mitigation scheme, in: Computer Communications and Networks (ICCCN 2009), San Francisco, CA, 2009, pp. 1-6.
-
(2009)
Computer Communications and Networks (INFOCOM 2009)
, pp. 1-6
-
-
Chuah, M.1
Yang, P.2
-
12
-
-
69249223002
-
Barter trade improves message delivery in opportunistic networks
-
L. Buttyn, L. Dra, M. Flegyhzi, and I. Vajda Barter trade improves message delivery in opportunistic networks Elsevier Ad Hoc Networks 8 1 2010 1 14
-
(2010)
Elsevier Ad Hoc Networks
, vol.8
, Issue.1
, pp. 1-14
-
-
Buttyn, L.1
Dra, L.2
Flegyhzi, M.3
Vajda, I.4
-
13
-
-
51049106421
-
Cooperative content retrieval in nomadic sensor networks
-
Phoenix, AZ
-
I. Koukoutsidis, E. Jaho, I. Stavrakakis, Cooperative content retrieval in nomadic sensor networks, in: Infocom MObile Networking for Vehicular Environments Workshop (MOVE 2008), Phoenix, AZ.
-
Infocom MObile Networking for Vehicular Environments Workshop (MOVE 2008)
-
-
Koukoutsidis, I.1
Jaho, E.2
Stavrakakis, I.3
-
14
-
-
77951292577
-
Pi: A practical incentive protocol for delay tolerant networks
-
R. Lu, X. Lin, H. Zhu, X. Shen, and B. Preiss Pi: a practical incentive protocol for delay tolerant networks IEEE Transactions on Wireless Communications 9 2010 1483 1493
-
(2010)
IEEE Transactions on Wireless Communications
, vol.9
, pp. 1483-1493
-
-
Lu, R.1
Lin, X.2
Zhu, H.3
Shen, X.4
Preiss, B.5
-
15
-
-
70349684505
-
Thwarting blackhole attacks in disruption-tolerant networks using encounter tickets
-
Rio de Janeiro
-
F. Li, J. Wu, S. Avinash, Thwarting blackhole attacks in disruption-tolerant networks using encounter tickets, in: International Conference on Computer Communications (INFOCOM 2009), Rio de Janeiro, 2009, pp. 2428-2436.
-
(2009)
International Conference on Computer Communications (INFOCOM 2009)
, pp. 2428-2436
-
-
Li, F.1
Wu, J.2
Avinash, S.3
-
16
-
-
77955892916
-
Detecting blackhole attacks in disruption-tolerant networks through packet exchange recording
-
Montreal, QC, Canada
-
Y. Ren, M.C. Chuah, J. Yang, Y. Chen, Detecting blackhole attacks in disruption-tolerant networks through packet exchange recording, in: World of Wireless Mobile and Multimedia Networks (WoWMoM 2010), Montreal, QC, Canada, 2010, pp. 1-6.
-
(2010)
World of Wireless Mobile and Multimedia Networks (WoWMoM 2010)
, pp. 1-6
-
-
Ren, Y.1
Chuah, M.C.2
Yang, J.3
Chen, Y.4
-
17
-
-
77955047964
-
Muton: Detecting malicious nodes in disruption-tolerant networks
-
Sidney, NSW
-
Y. Ren, M.C. Chuah, J. Yang, Y. Chen, Muton: Detecting malicious nodes in disruption-tolerant networks, in: Wireless Communications and Networking Conference (WCNC 2010), Sidney, NSW, 2010, pp. 1-6.
-
(2010)
Wireless Communications and Networking Conference (WCNC 2010)
, pp. 1-6
-
-
Ren, Y.1
Chuah, M.C.2
Yang, J.3
Chen, Y.4
-
18
-
-
37849034148
-
Surviving attacks on disruption-tolerant networks without authentication
-
Montreal, Quebec, Canada
-
J. Burgess, G.D. Bissias, M.D. Corner, B.N. Levine, Surviving attacks on disruption-tolerant networks without authentication, in: Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing (MobiHoc '07), Montreal, Quebec, Canada, 2007, pp. 61-70.
-
(2007)
Proceedings of the 8th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc '07)
, pp. 61-70
-
-
Burgess, J.1
Bissias, G.D.2
Corner, M.D.3
Levine, B.N.4
-
19
-
-
51749105065
-
Optimal buffer management policies for delay tolerant networks
-
San Francisco, CA
-
A. Krifa, C. Baraka, T. Spyropoulos, Optimal buffer management policies for delay tolerant networks, in: Sensor, Mesh and Ad Hoc Communications and Networks (SECON 2008), San Francisco, CA, 2008, pp. 260-268.
-
(2008)
Sensor, Mesh and Ad Hoc Communications and Networks (SECON 2008)
, pp. 260-268
-
-
Krifa, A.1
Baraka, C.2
Spyropoulos, T.3
-
20
-
-
78650358999
-
Routing protocols in delay tolerant networks - A survey
-
Islamabad, Pakistan
-
S.Q. Ali, A. Junaid Baig, Routing protocols in delay tolerant networks - a survey, in: International Conference on Emerging Technologies (ICET 2010), Islamabad, Pakistan, 2010, pp. 70-75.
-
(2010)
International Conference on Emerging Technologies (ICET 2010)
, pp. 70-75
-
-
Ali, S.Q.1
Junaid Baig, A.2
-
21
-
-
39049118503
-
Maxprop: Routing for vehicle-based disruption-tolerant networks
-
Barcelona, Spain
-
J. Burgess, B. Gallagher, D. Jensen, B.N. Levine, Maxprop: Routing for vehicle-based disruption-tolerant networks, in: Conference on Computer Communications (INFOCOM 2006), Barcelona, Spain, 2006, pp. 1-11.
-
(2006)
Conference on Computer Communications (INFOCOM 2006)
, pp. 1-11
-
-
Burgess, J.1
Gallagher, B.2
Jensen, D.3
Levine, B.N.4
-
22
-
-
36949009831
-
DTN routing as a resource allocation problem
-
DOI 10.1145/1282380.1282422, ACM SIGCOMM 2007: Conference on Computer Communications
-
A. Balasubramanian, B.N. Levine, A. Venkataramani, Dtn routing as a resource allocation problem, in: Conference on Applications, technologies, architectures, and protocols for computer communications (SIGCOMM 2007), Kyoto, Japan, pp. 373-384. (Pubitemid 350239799)
-
(2007)
ACM SIGCOMM 2007: Conference on Computer Communications
, pp. 373-384
-
-
Balasubramanian, A.1
Levine, B.2
Venkataramani, A.3
-
24
-
-
0035683523
-
Depender graphs: A method of fault-tolerant certificate distribution
-
R.N. Wright, P.D. Lincoln, and J.K. Millen Dependent graphs: a method of fault-tolerant certificate distribution Journal of Computer Security 9 2001 323 338 (Pubitemid 34063916)
-
(2001)
Journal of Computer Security
, vol.9
, Issue.4
, pp. 323-338
-
-
Wright, R.N.1
Lincoln, P.D.2
Millen, J.K.3
-
25
-
-
0034449903
-
Efficient fault-tolerant certificate revocation
-
R.N. Wright, P.D. Lincoln, J.K. Millen, Efficient fault-tolerant certificate revocation, in: Proceedings of the 7th ACM Conference on Computer and Communications Security (CCS '00), Athens, Greece, 2000, pp. 19-24. (Pubitemid 32393897)
-
(2000)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 19-24
-
-
Wright, R.N.1
Lincoln, P.D.2
Millen, J.K.3
-
27
-
-
63749114135
-
A survey of identity-based cryptography
-
Melbourne, Australia
-
J. Baek, J. Newmarch, R. Safavi-naini, W. Susilo, A survey of identity-based cryptography, in: Australian Unix Users Group Annual Conference (AUUG 2004), Melbourne, Australia, 2004, pp. 95-102.
-
(2004)
Australian Unix Users Group Annual Conference (AUUG 2004)
, pp. 95-102
-
-
Baek, J.1
Newmarch, J.2
Safavi-Naini, R.3
Susilo, W.4
|