-
1
-
-
46449089099
-
Heap: A packet authentication scheme for mobile ad hoc networks
-
R. Akbani, T. Korkmaz, and G. V. S. Raju. HEAP: A Packet Authentication Scheme for Mobile Ad hoc Networks. Ad Hoc Netw., 6:1134-1150, 2008.
-
(2008)
Ad Hoc Netw.
, vol.6
, pp. 1134-1150
-
-
Akbani, R.1
Korkmaz, T.2
Raju, G.V.S.3
-
2
-
-
67649521992
-
A game theoretical framework on intrusion detection in heterogeneous networks
-
Jun.
-
L. Chen and J. Leneutre. A game theoretical framework on intrusion detection in heterogeneous networks. IEEE Trans. Info. For. Sec., 4:165-178, Jun. 2009.
-
(2009)
IEEE Trans. Info. For. Sec.
, vol.4
, pp. 165-178
-
-
Chen, L.1
Leneutre, J.2
-
3
-
-
79960557311
-
Capacity-optimized topology control for manets with cooperative communications
-
July
-
Q. Guan, F. R. Yu, S. Jiang, and V. Leung. Capacity-optimized topology control for MANETs with cooperative communications. IEEE Trans. Wireless Commun., 10(7):2162-2170, July 2011.
-
(2011)
IEEE Trans. Wireless Commun.
, vol.10
, Issue.7
, pp. 2162-2170
-
-
Guan, Q.1
Yu, F.R.2
Jiang, S.3
Leung, V.4
-
4
-
-
84860568922
-
Topology control in mobile ad hoc networks with cooperative communications
-
Apr.
-
Q. Guan, F. R. Yu, S. Jiang, V. C. M. Leung, and H. Mehrvar. Topology control in mobile ad hoc networks with cooperative communications. IEEE Wireless Comm. Mag. Special Issue on User Cooperation for Wireless Networks, 19(2), Apr. 2012.
-
(2012)
IEEE Wireless Comm. Mag. Special Issue on User Cooperation for Wireless Networks
, vol.19
, Issue.2
-
-
Guan, Q.1
Yu, F.R.2
Jiang, S.3
Leung, V.C.M.4
Mehrvar, H.5
-
5
-
-
70350755765
-
Alpha: An adaptive and lightweight protocol for hop-by-hop authentication
-
T. Heer, S. Götz, O. G. Morchon, and K. Wehrle. ALPHA: An Adaptive and Lightweight Protocol for Hop-by-Hop Authentication. In Proceedings of the 2008 ACM CoNEXT Conference, pages 23:1-23:12, 2008.
-
(2008)
Proceedings of the 2008 ACM CoNEXT Conference
, pp. 231-2312
-
-
Heer, T.1
Götz, S.2
Morchon, O.G.3
Wehrle, K.4
-
7
-
-
7244244208
-
Cooperative communication in wireless networks
-
A. Nosratinia, T. E. Hunter, and A. Hedayat. Cooperative communication in wireless networks. IEEE Communications Magazine, 42(10):74-80, 2004.
-
(2004)
IEEE Communications Magazine
, vol.42
, Issue.10
, pp. 74-80
-
-
Nosratinia, A.1
Hunter, T.E.2
Hedayat, A.3
-
8
-
-
0242426103
-
The tesla broadcast authentication protocol
-
A. Perrig, R. Canetti, J. D. Tygar, and D. Song. The TESLA broadcast authentication protocol. RSA CryptoBytes, 5(Summer), 2002.
-
(2002)
RSA CryptoBytes
, vol.5
, Issue.SUMMER
-
-
Perrig, A.1
Canetti, R.2
Tygar, J.D.3
Song, D.4
-
9
-
-
79951805842
-
Combined authentication and quality of service in cooperative communication networks
-
R. Ramamoorthy, F. R. Yu, H. Tang, and P. Mason. Combined authentication and quality of service in cooperative communication networks. IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, 0:566-571, 2010.
-
(2010)
IEEE/IFIP International Conference on Embedded and Ubiquitous Computing
, pp. 566-571
-
-
Ramamoorthy, R.1
Yu, F.R.2
Tang, H.3
Mason, P.4
-
10
-
-
77953788397
-
Distributed optimal relay selection in wireless cooperative networks with finite-state markov channels
-
June
-
Y. Wei, F. R. Yu, and M. Song. Distributed optimal relay selection in wireless cooperative networks with finite-state markov channels. IEEE Trans. Veh. Tech., 59(5):2149-2158, June 2010.
-
(2010)
IEEE Trans. Veh. Tech.
, vol.59
, Issue.5
, pp. 2149-2158
-
-
Wei, Y.1
Yu, F.R.2
Song, M.3
-
11
-
-
0035510358
-
Virtual branch analysis of symbol error probability for hybrid selection/maximal-ratio combining in rayleigh fading
-
M. Z. Win, S. Member, and J. H. Winters. Virtual branch analysis of symbol error probability for hybrid selection/maximal-ratio combining in rayleigh fading. IEEE Trans. Commun, 49:1926-1934, 2001.
-
(2001)
IEEE Trans. Commun
, vol.49
, pp. 1926-1934
-
-
Win, M.Z.1
Member, S.2
Winters, J.H.3
-
12
-
-
1842815887
-
Security in mobile ad hoc networks: Challenges and solutions
-
H. Yang, H. Luo, F. Ye, S. Lu, and L. Zhang. Security in mobile ad hoc networks: Challenges and Solutions. IEEE Trans. on Wireless Communications, 11:38-47, 2004.
-
(2004)
IEEE Trans. on Wireless Communications
, vol.11
, pp. 38-47
-
-
Yang, H.1
Luo, H.2
Ye, F.3
Lu, S.4
Zhang, L.5
-
13
-
-
84943529186
-
Lhap: A lightweight hop-by-hop authentication protocol for ad-hoc networks
-
S. Zhu, S. Xu, S. Setia, and S. Jajodia. LHAP: A Lightweight Hop-by-Hop Authentication Protocol for Ad-Hoc Networks. In ICDCS Workshops'03, pages 749-749, 2003.
-
(2003)
ICDCS Workshops'03
, pp. 749-749
-
-
Zhu, S.1
Xu, S.2
Setia, S.3
Jajodia, S.4
|