-
1
-
-
0009788067
-
Mobile Ad Hoch Networks and Routing Protocols
-
Chapter 17, I. Stojmenovic (Eds.), ISBN:0-471-41902, John Wiley & Sons, Inc.
-
Y-C. Tseng, W-H. Liao, S-L. Wu, "Mobile Ad Hoch Networks and Routing Protocols", Chapter 17, Handbook of Wireless Networks ad Mobile Computing, I. Stojmenovic (Eds.), ISBN:0-471-41902, John Wiley & Sons, Inc., pp. 371-392, 2002.
-
(2002)
Handbook of Wireless Networks Ad Mobile Computing
, pp. 371-392
-
-
Tseng, Y.-C.1
Liao, W.-H.2
Wu, S.-L.3
-
2
-
-
84863149546
-
Credit-based Cooperation Enforcement Schemes Tailored to Opportunistic Networks
-
Chapter 3 in: M. Denko et al. (Eds.), Auerbach Publications, Taylor & Francis Group, Boca Raton, Florida, To appear
-
I. Woungang, M. K. Denko, "Credit-based Cooperation Enforcement Schemes Tailored to Opportunistic Networks", Chapter 3 in: M. Denko et al. (Eds.), Mobile Opportunistic Networks: Architectures, Protocols and Applications, Auerbach Publications, Taylor & Francis Group, Boca Raton, Florida, To appear 2011.
-
(2011)
Mobile Opportunistic Networks: Architectures, Protocols and Applications
-
-
Woungang, I.1
Denko, M.K.2
-
3
-
-
0242696192
-
Performance Analysis of the CONFIDANT Protocol: Cooperation of Nodes - Fairness in Dynamic Ad-Hoc NeTworks
-
S. Buchegger and J.-Y. LeBoudec, "Performance Analysis of the CONFIDANT Protocol: Cooperation of Nodes - Fairness In Dynamic Ad-Hoc NeTworks", Proc. of IEEE/ACM Symposium on Mobile Ad Hoc Networking and Computing, Lausanne, Switzerland, June 2002.
-
Proc. of IEEE/ACM Symposium on Mobile Ad Hoc Networking and Computing, Lausanne, Switzerland, June 2002
-
-
Buchegger, S.1
LeBoudec, J.-Y.2
-
4
-
-
71649094416
-
A Survey of Attack and Defense Techniques for Reputation Systems
-
Dec.
-
K. Hoffman, D. Zage, and C. Nita-Rotaru, "A Survey of Attack and Defense Techniques for Reputation Systems", ACM Computing Surveys, vol. 42, Issue 1, Dec. 2009
-
(2009)
ACM Computing Surveys
, vol.42
, Issue.1
-
-
Hoffman, K.1
Zage, D.2
Nita-Rotaru, C.3
-
5
-
-
77951277642
-
CompactPSH: An Efficient Transitive TFT Incentive Scheme for Peer-to-Peer Networks
-
M. Younis, C. Chun Tung, Zurich, Switzerland
-
T. Bocek, Y. El-khatib, F. Victora Hecht, D. Hausheer,A.Stiller, "CompactPSH: An Efficient Transitive TFT Incentive Scheme for Peer-to-Peer Networks", In: M. Younis, C. Chun Tung, Local Computer Networks, Zurich, Switzerland, pp. 483-490, 2009.
-
(2009)
Local Computer Networks
, pp. 483-490
-
-
Bocek, T.1
El-khatib, Y.2
Victora Hecht, F.3
Hausheer, D.4
Stiller, A.5
-
7
-
-
17444426121
-
Ariadne: A secure on-demand routing protocol for ad hoc networks
-
DOI 10.1007/s11276-004-4744-y
-
Y. Hu, A. Perrig, and D. B. Johnson, "Ariadne: A Secure On-demand Routing Protocol for Ad Hoc Networks", Wireless Networks, Vol. 11, Issue 1-2, pp. 21-38, Jan. 2005. (Pubitemid 40536374)
-
(2005)
Wireless Networks
, vol.11
, Issue.1-2
, pp. 21-38
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
8
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
August
-
S. Marti, T.J. Giuli, K. Lai, and M. Baker, "Mitigating routing misbehavior in mobile ad hoc networks", in Proc. of MobiCom 2000, Boston, pp. 255-265, August 2000.
-
(2000)
Proc. of MobiCom 2000, Boston
, pp. 255-265
-
-
Marti, S.1
Giuli, T.J.2
Lai, K.3
Baker, M.4
-
9
-
-
84904904836
-
A Secure routing protocol for ad hoc networks
-
Nov. 12-15
-
K. Sanzgiri, B. N. Levine, C. Shields, B. Dahill, and E.M. Belding-Royer, "A Secure routing protocol for ad hoc networks", in Proc. of the 10th IEEE Intl. Conference on Network Protocols, Paris, France, pp. 78-89, Nov. 12-15, 2002.
-
(2002)
Proc. of the 10th IEEE Intl. Conference on Network Protocols, Paris, France
, pp. 78-89
-
-
Sanzgiri, K.1
Levine, B.N.2
Shields, C.3
Dahill, B.4
Belding-Royer, E.M.5
-
10
-
-
4143061406
-
Security enhancement through multiple path transmission in ad hoc networks
-
June
-
T. Haniotakis, S. Tragoudas, C. Kalapodas, "Security enhancement through multiple path transmission in ad hoc networks", Proc. of IEEE Intl. Conference on Communications, Vol. 7, pp. 4187-4191, June 2004.
-
(2004)
Proc. of IEEE Intl. Conference on Communications
, vol.7
, pp. 4187-4191
-
-
Haniotakis, T.1
Tragoudas, S.2
Kalapodas, C.3
-
11
-
-
39049100803
-
Security in mobile ad-hoc networks using soft encryption and trust-based multi-path routing
-
DOI 10.1016/j.comcom.2007.10.021, PII S0140366407004276
-
P. Narula, S. K. Dhurandher, S. Misra, I. Woungang, "Security in mobile ad-hoc networks using soft encryption and trust based multipath routing", Computer Communications, Vol. 31, pp. 760-769, 2008. (Pubitemid 351248943)
-
(2008)
Computer Communications
, vol.31
, Issue.4
, pp. 760-769
-
-
Narula, P.1
Dhurandher, S.K.2
Misra, S.3
Woungang, I.4
-
12
-
-
77949284154
-
Multi-path and Message Trust- Based Secure Routing in Ad Hoc Networks
-
Dec. 28-29
-
S. K. Dhurandher and V. Mehra, "Multi-path and Message Trust- Based Secure Routing in Ad Hoc Networks", in Proc. of Intl. Conference on Advances in Computing, Control and Telecommunication Technologies (ACT 2009), Trivandrum, India, pp. 189-194, Dec. 28-29, 2009.
-
(2009)
Proc. of Intl. Conference on Advances in Computing, Control and Telecommunication Technologies (ACT 2009), Trivandrum, India
, pp. 189-194
-
-
Dhurandher, S.K.1
Mehra, V.2
-
13
-
-
40649109581
-
Symmetric Cipher Design Using Recurrent Neural Networks
-
M. Arvandi, S. Wu, A. Sadeghian, W. Melek, and I. Woungang, "Symmetric Cipher Design Using Recurrent Neural Networks", In Proc. of the 2006 Intl. Joint Conference on Neural Networks (IJCNN 2006), July 16-21, Vancouver, B.C., Canada, 2006.
-
Proc. of the 2006 Intl. Joint Conference on Neural Networks (IJCNN 2006), July 16-21, Vancouver, B.C., Canada, 2006
-
-
Arvandi, M.1
Wu, S.2
Sadeghian, A.3
Melek, W.4
Woungang, I.5
-
14
-
-
0000629443
-
Dynamic Source Routing in ad hoc wireless networks
-
T. Imielinski, H. Korth (Eds.), Book Chapter Kluwer Academic Publishers, Dordrecht, Netherlands
-
D. Johnson, D. Maltz, "Dynamic Source Routing in ad hoc wireless networks", in T. Imielinski, H. Korth (Eds.), Book Chapter in Mobile Computing, Kluwer Academic Publishers, Dordrecht, Netherlands, pp. 131-181, 1996.
-
(1996)
Mobile Computing
, pp. 131-181
-
-
Johnson, D.1
Maltz, D.2
-
15
-
-
13844250146
-
-
Last visited Dec 3, 2010
-
QualNet Simulator, http://www.scalable-networks.com/ (Last visited Dec 3, 2010).
-
QualNet Simulator
-
-
-
16
-
-
84863155532
-
SMART: A Secure Multi-Layer Credit Based Incentive Scheme for Delay-Tolerant Networks
-
To appear
-
H. Zhu, X. Lin, R. Lu, Y. Fan, and X. Shen, "SMART: A Secure Multi-Layer Credit Based Incentive Scheme for Delay-Tolerant Networks", To appear in IEEE Transactions on Vehicular Technology, 2010
-
(2010)
IEEE Transactions on Vehicular Technology
-
-
Zhu, H.1
Lin, X.2
Lu, R.3
Fan, Y.4
Shen, X.5
-
17
-
-
67349189496
-
A Secure Credit - Based Cooperation Stimulating Mechanism for MANETs Using Hash Chains
-
Sept.
-
H. Janzadeh, K. Fayazbakhsh, M. Dehghan, M. S. Fallah, "A Secure Credit - Based Cooperation Stimulating Mechanism for MANETs Using Hash Chains", In Future Generation Computer Systems, vol. 25, Issue 8, Sept., pp. 926-934, 2009.
-
(2009)
Future Generation Computer Systems
, vol.25
, Issue.8
, pp. 926-934
-
-
Janzadeh, H.1
Fayazbakhsh, K.2
Dehghan, M.3
Fallah, M.S.4
-
20
-
-
0017018484
-
New Directions in Cryptography
-
W. Diffie, and M. E. Hellman, "New Directions in Cryptography", IEEE Transactions on Information Theory, IT-22(6), 644-654, 1976
-
(1976)
IEEE Transactions on Information Theory
, vol.IT-22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.E.2
-
21
-
-
70549106079
-
Trust-based SAODV Protocol with Intrusion Detection and Incentive Cooperation in MANET
-
F. De Rango, S. Marano, "Trust-based SAODV Protocol with Intrusion Detection and Incentive Cooperation in MANET", In Proc. of Intl. Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly, Leipzig, Germany, pp. 1443-1448, 2009.
-
(2009)
Proc. of Intl. Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly, Leipzig, Germany
, pp. 1443-1448
-
-
De Rango, F.1
Marano, S.2
|