-
1
-
-
84993201983
-
-
Ironman: Using social networks to add incentives and reputation to opportunistic networks.
-
Bigwood, G., & Henderson, T. (2011). Ironman: Using social networks to add incentives and reputation to opportunistic networks.
-
(2011)
-
-
Bigwood, G.1
Henderson, T.2
-
2
-
-
0014814325
-
Space/time trade-offs in hash coding with allowable errors
-
Bloom, B.H., Space/time trade-offs in hash coding with allowable errors. Communications of the ACM 13:July (7) (1970), 422–426.
-
(1970)
Communications of the ACM
, vol.13
, Issue.7
, pp. 422-426
-
-
Bloom, B.H.1
-
3
-
-
84954161437
-
Enforcing service availability in mobile ad-hoc wans.
-
Buttyán, L., Hubaux, J.-P., Enforcing service availability in mobile ad-hoc wans. Proceedings of the 1st ACM international symposium on Mobile ad hoc networking & computing. MobiHoc ‘00, IEEE Press, Piscataway, NJ, USA, 2000, 87–96.
-
(2000)
Proceedings of the 1st ACM international symposium on Mobile ad hoc networking & computing. MobiHoc ‘00, IEEE Press, Piscataway, NJ, USA
, pp. 87-96
-
-
Buttyán, L.1
Hubaux, J.-P.2
-
4
-
-
47749136199
-
Barter-based cooperation in delay-tolerant personal wireless networks.
-
Buttyan, L., Dora, L., Felegyhazi, M., Vajda, I., Barter-based cooperation in delay-tolerant personal wireless networks.2007. IEEE international symposium on a WoWMoM 2007. World of Wireless, Mobile and Multimedia Networks, 2007, 1–6.
-
(2007)
World of Wireless, Mobile and Multimedia Networks
, pp. 1-6
-
-
Buttyan, L.1
Dora, L.2
Felegyhazi, M.3
Vajda, I.4
-
5
-
-
69249223002
-
Barter trade improves message delivery in opportunistic networks
-
Buttyan, L., Dora, L., Felegyhazi, M., Vajda, I., Barter trade improves message delivery in opportunistic networks. Ad Hoc Networks 8:1 (2010), 1–14.
-
(2010)
Ad Hoc Networks
, vol.8
, Issue.1
, pp. 1-14
-
-
Buttyan, L.1
Dora, L.2
Felegyhazi, M.3
Vajda, I.4
-
6
-
-
0038675868
-
A survey of mobility models for ad hoc network research
-
Camp, T., Boleng, J., Davies, V., A survey of mobility models for ad hoc network research. Wireless Communications and Mobile Computing 2:5 (2002), 483–502.
-
(2002)
Wireless Communications and Mobile Computing
, vol.2
, Issue.5
, pp. 483-502
-
-
Camp, T.1
Boleng, J.2
Davies, V.3
-
7
-
-
34247596905
-
Impact of human mobility on opportunistic forwarding algorithms
-
Chaintreau, A., Hui, P., Crowcroft, J., Diot, C., Gass, R., Scott, J., Impact of human mobility on opportunistic forwarding algorithms. IEEE Transactions on Mobile Computing 6:6 (2007), 606–620.
-
(2007)
IEEE Transactions on Mobile Computing
, vol.6
, Issue.6
, pp. 606-620
-
-
Chaintreau, A.1
Hui, P.2
Crowcroft, J.3
Diot, C.4
Gass, R.5
Scott, J.6
-
8
-
-
77953298005
-
Mobicent: A credit-based incentive system for disruption tolerant network
-
Chen, B.B., Chan, M.C., Mobicent: A credit-based incentive system for disruption tolerant network. Proceedings IEEE INFOCOM, 2010, 2010, 1–9.
-
(2010)
Proceedings IEEE INFOCOM, 2010
, pp. 1-9
-
-
Chen, B.B.1
Chan, M.C.2
-
9
-
-
70449134190
-
Impact of selective dropping attacks on network coding performance in DTNS and a potential mitigation scheme.
-
Chuah, M., Yang, P., Impact of selective dropping attacks on network coding performance in DTNS and a potential mitigation scheme. Proceedings of 18th international conference on computer communications and networks, 2009. ICCCN 2009, 2009, 1–6.
-
(2009)
Proceedings of 18th international conference on computer communications and networks, 2009. ICCCN 2009
, pp. 1-6
-
-
Chuah, M.1
Yang, P.2
-
10
-
-
77953278111
-
Clustering and cluster-based routing protocol for delay-tolerant mobile networks
-
Dang, H., Wu, H., Clustering and cluster-based routing protocol for delay-tolerant mobile networks. IEEE Transactions on Wireless Communications 9:6 (2010), 1874–1881.
-
(2010)
IEEE Transactions on Wireless Communications
, vol.9
, Issue.6
, pp. 1874-1881
-
-
Dang, H.1
Wu, H.2
-
11
-
-
77956540791
-
A reputation-based approach to tolerate misbehaving carriers in delay tolerant networks
-
Dini, G., Lo Duca, A., A reputation-based approach to tolerate misbehaving carriers in delay tolerant networks. IEEE symposium on computers and communications (ISCC), 2010, 2010, 772–777.
-
(2010)
IEEE symposium on computers and communications (ISCC), 2010
, pp. 772-777
-
-
Dini, G.1
Lo Duca, A.2
-
12
-
-
1242310099
-
A delay-tolerant network architecture for challenged internets.
-
Fall, K., A delay-tolerant network architecture for challenged internets. Proceedings of the 2003 conference on applications, technologies, architectures, and protocols for computer communications. SIGCOMM ‘03, ACM, New York, NY, USA, 2003, 27–34.
-
(2003)
Proceedings of the 2003 conference on applications, technologies, architectures, and protocols for computer communications. SIGCOMM ‘03, ACM, New York, NY, USA
, pp. 27-34
-
-
Fall, K.1
-
13
-
-
34547273527
-
Attribute-based encryption for fine-grained access control of encrypted data.
-
Goyal, V., Pandey, O., Sahai, A., Waters, B., Attribute-based encryption for fine-grained access control of encrypted data. Proceedings of the 13th ACM conference on Computer and communications security. CCS ‘06, ACM, New York, NY, USA, 2006, 89–98.
-
(2006)
Proceedings of the 13th ACM conference on Computer and communications security. CCS ‘06, ACM, New York, NY, USA
, pp. 89-98
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
14
-
-
84993236638
-
-
Ben Mokhtar, S., & Brunie, L., (2012). A privacy preserving prediction-based routing protocol for mobile delay tolerant networks. Tech. Rep. RR-LIRIS-2012-011, LIRIS UMR 5205 CNRS/INSA de Lyon/Universit Claude Bernard Lyon 1/Universit Lumire Lyon 2/cole Centrale de Lyon.
-
Hasan, O., Miao, J., Ben Mokhtar, S., & Brunie, L., (2012). A privacy preserving prediction-based routing protocol for mobile delay tolerant networks. Tech. Rep. RR-LIRIS-2012-011, LIRIS UMR 5205 CNRS/INSA de Lyon/Universit Claude Bernard Lyon 1/Universit Lumire Lyon 2/cole Centrale de Lyon.
-
-
-
Hasan, O.1
Miao, J.2
-
15
-
-
84885799779
-
Pocket switched networks and human mobility in conference environments.
-
Hui, P., Chaintreau, A., Scott, J., Gass, R., Crowcroft, J., Diot, C., Pocket switched networks and human mobility in conference environments. Proceedings of the 2005 ACM SIGCOMM workshop on Delay-tolerant networking. WDTN ‘05, ACM, New York, NY, USA, 2005, 244–251.
-
(2005)
Proceedings of the 2005 ACM SIGCOMM workshop on Delay-tolerant networking. WDTN ‘05, ACM, New York, NY, USA
, pp. 244-251
-
-
Hui, P.1
Chaintreau, A.2
Scott, J.3
Gass, R.4
Crowcroft, J.5
Diot, C.6
-
16
-
-
58149293607
-
Distributed community detection in delay tolerant networks.
-
pp. 7:1–7:8
-
Hui, P., Yoneki, E., Chan, S.Y., Crowcroft, J., Distributed community detection in delay tolerant networks. Proceedings of 2nd ACM/IEEE international workshop on mobility in the evolving internet architecture. MobiArch ‘07, ACM, New York, NY, USA, 2007 pp. 7:1–7:8.
-
(2007)
Proceedings of 2nd ACM/IEEE international workshop on mobility in the evolving internet architecture. MobiArch ‘07, ACM, New York, NY, USA
-
-
Hui, P.1
Yoneki, E.2
Chan, S.Y.3
Crowcroft, J.4
-
17
-
-
80052124479
-
Bubble rap: Social-based forwarding in delay-tolerant networks
-
Hui, P., Crowcroft, J., Yoneki, E., Bubble rap: Social-based forwarding in delay-tolerant networks. IEEE Transactions on Mobile Computing 10:11 (2011), 1576–1589.
-
(2011)
IEEE Transactions on Mobile Computing
, vol.10
, Issue.11
, pp. 1576-1589
-
-
Hui, P.1
Crowcroft, J.2
Yoneki, E.3
-
18
-
-
21844451437
-
Routing in a delay tolerant network
-
Jain, S., Fall, K., Patra, R., Routing in a delay tolerant network. SIGCOMM Computer Communication Review 34 (2004), 145–158.
-
(2004)
SIGCOMM Computer Communication Review
, vol.34
, pp. 145-158
-
-
Jain, S.1
Fall, K.2
Patra, R.3
-
19
-
-
79951660476
-
Toward anonymity in DTNS: Threshold pivot scheme.
-
Jansen, R., Beverly, R., Toward anonymity in DTNS: Threshold pivot scheme. Proceedings of MILCOM, 2010, 587–592.
-
(2010)
Proceedings of MILCOM
, pp. 587-592
-
-
Jansen, R.1
Beverly, R.2
-
20
-
-
0000629443
-
Dynamic source routing in ad hoc wireless networks
-
T. Imielinski H.F. Korth Springer US
-
Johnson, D.B., Maltz, D.A., Dynamic source routing in ad hoc wireless networks. Imielinski, T., Korth, H.F., (eds.) Mobile computing. Vol. 353 of the Kluwer international series in engineering and computer science, 1996, Springer, US, 153–181.
-
(1996)
Mobile computing. Vol. 353 of the Kluwer international series in engineering and computer science
, pp. 153-181
-
-
Johnson, D.B.1
Maltz, D.A.2
-
21
-
-
73449145700
-
Assessing the vulnerability of DTN data relaying schemes to node selfishness
-
Karaliopoulos, M., Assessing the vulnerability of DTN data relaying schemes to node selfishness. IEEE Communications Letters 13:12 (2009), 923–925.
-
(2009)
IEEE Communications Letters
, vol.13
, Issue.12
, pp. 923-925
-
-
Karaliopoulos, M.1
-
22
-
-
51349159708
-
Anonymity and security in delay tolerant networks
-
Kate, A., Zaverucha, G., Hengartner, U., Anonymity and security in delay tolerant networks. IEEE third international conference on security and privacy in communications networks and the workshops, 2007. SecureComm 2007, 2007, 504–513.
-
(2007)
IEEE third international conference on security and privacy in communications networks and the workshops, 2007. SecureComm 2007
, pp. 504-513
-
-
Kate, A.1
Zaverucha, G.2
Hengartner, U.3
-
23
-
-
84922954336
-
The one simulator for dtn protocol evaluation
-
pp. 55:1–55:10
-
Keränen, A., Ott, J., Kärkkä inen, T., The one simulator for dtn protocol evaluation. Proceedings of the 2nd international conference on simulation tools and techniques. Simutools ‘09, ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), ICST, Brussels, Belgium, Belgium, 2009 pp. 55:1–55:10.
-
(2009)
Proceedings of the 2nd international conference on simulation tools and techniques. Simutools ‘09, ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), ICST, Brussels, Belgium, Belgium
-
-
Keränen, A.1
Ott, J.2
Kärkkä inen, T.3
-
24
-
-
80052765349
-
Effect of non-cooperative nodes in mobile dtns.
-
Keranen, A., Pitkanen, M., Vuori, M., Ott, J., Effect of non-cooperative nodes in mobile dtns. IEEE international symposium on a world of wireless, mobile and multimedia networks (WoWMoM), 2011, 2011, 1–7.
-
(2011)
IEEE international symposium on a world of wireless, mobile and multimedia networks (WoWMoM), 2011
, pp. 1-7
-
-
Keranen, A.1
Pitkanen, M.2
Vuori, M.3
Ott, J.4
-
25
-
-
0034266911
-
Location-aided routing (LAR) in mobile ad hoc networks
-
Jul
-
Ko, Y.-B., Vaidya, N.H., Location-aided routing (LAR) in mobile ad hoc networks. Wireless Networks 6:4 (2000 Jul), 307–321.
-
(2000)
Wireless Networks
, vol.6
, Issue.4
, pp. 307-321
-
-
Ko, Y.-B.1
Vaidya, N.H.2
-
26
-
-
33845575250
-
The scalability problem of vehicular ad hoc networks and how to solve it
-
Kosch, T., Adler, C., Eichler, S., Schroth, C., Strassberger, M., The scalability problem of vehicular ad hoc networks and how to solve it. IEEE Wireless Communications 13:5 (2006), 22–28.
-
(2006)
IEEE Wireless Communications
, vol.13
, Issue.5
, pp. 22-28
-
-
Kosch, T.1
Adler, C.2
Eichler, S.3
Schroth, C.4
Strassberger, M.5
-
27
-
-
70450250238
-
Peon: Privacy-enhanced opportunistic networks with applications in assistive environments
-
pp. 76:1–76:8
-
Le, Z., Vakde, G., Wright, M., Peon: Privacy-enhanced opportunistic networks with applications in assistive environments. Proceedings of the 2nd international conference on PErvasive technologies related to assistive environments. PETRA ‘09, ACM, New York, NY, USA, 2009 pp. 76:1–76:8.
-
(2009)
Proceedings of the 2nd international conference on PErvasive technologies related to assistive environments. PETRA ‘09, ACM, New York, NY, USA
-
-
Le, Z.1
Vakde, G.2
Wright, M.3
-
28
-
-
77952910261
-
Radon: Reputation-assisted data forwarding in opportunistic networks.
-
Li, N., Das, S.K., Radon: Reputation-assisted data forwarding in opportunistic networks. Proceedings of the second international workshop on mobile opportunistic networking. MobiOpp ‘10, ACM, New York, NY, USA, 2010, 8–14.
-
(2010)
Proceedings of the second international workshop on mobile opportunistic networking. MobiOpp ‘10, ACM, New York, NY, USA
, pp. 8-14
-
-
Li, N.1
Das, S.K.2
-
29
-
-
78449306437
-
Evaluating the impact of social selfishness on the epidemic routing in delay tolerant networks.
-
Li, Y., Hui, P., Jin, D., Su, L., Zeng, L., Evaluating the impact of social selfishness on the epidemic routing in delay tolerant networks. IEEE Communications Letters 14:11 (2010), 1026–1028.
-
(2010)
IEEE Communications Letters
, vol.14
, Issue.11
, pp. 1026-1028
-
-
Li, Y.1
Hui, P.2
Jin, D.3
Su, L.4
Zeng, L.5
-
30
-
-
80052176507
-
Performance evaluation of routing schemes for energy-constrained delay tolerant networks.
-
Li, Y., Hui, P., Jin, D., Su, L., Zeng, L., Performance evaluation of routing schemes for energy-constrained delay tolerant networks. IEEE international conference on communications (ICC), 2011, 2011, 1–5.
-
(2011)
IEEE international conference on communications (ICC), 2011
, pp. 1-5
-
-
Li, Y.1
Hui, P.2
Jin, D.3
Su, L.4
Zeng, L.5
-
31
-
-
79959276613
-
The impact of node selfishness on multicasting in delay tolerant networks
-
Li, Y., Su, G., Wu, D., Jin, D., Su, L., Zeng, L., The impact of node selfishness on multicasting in delay tolerant networks. IEEE Transactions on Vehicular Technology 60:5 (2011), 2224–2238.
-
(2011)
IEEE Transactions on Vehicular Technology
, vol.60
, Issue.5
, pp. 2224-2238
-
-
Li, Y.1
Su, G.2
Wu, D.3
Jin, D.4
Su, L.5
Zeng, L.6
-
32
-
-
84863369462
-
A routing protocol for socially selfish delay tolerant networks
-
Li, Q., Gao, W., Zhu, S., Cao, G., A routing protocol for socially selfish delay tolerant networks. Ad Hoc Networks 10:8 (2012), 1619–1632.
-
(2012)
Ad Hoc Networks
, vol.10
, Issue.8
, pp. 1619-1632
-
-
Li, Q.1
Gao, W.2
Zhu, S.3
Cao, G.4
-
33
-
-
81155152700
-
Evaluating the effects of node cooperation on DTN routing
-
Li, Y., Su, G., Wang, Z., Evaluating the effects of node cooperation on DTN routing. AEU – International Journal of Electronics and Communications 66:1 (2012), 62–67.
-
(2012)
AEU – International Journal of Electronics and Communications
, vol.66
, Issue.1
, pp. 62-67
-
-
Li, Y.1
Su, G.2
Wang, Z.3
-
34
-
-
20344383943
-
Probabilistic routing in intermittently connected networks. SIGMOBILE Mob
-
Lindgren, A., Doria, A., Schelén, O., Probabilistic routing in intermittently connected networks. SIGMOBILE Mob. Computer Communication Review 7 (2003), 19–20.
-
(2003)
Computer Communication Review
, vol.7
, pp. 19-20
-
-
Lindgren, A.1
Doria, A.2
Schelén, O.3
-
35
-
-
33847008265
-
Enhanced reputation mechanism for mobile ad hoc networks
-
C. Jensen S. Poslad T. Dimitrakos Springer Berlin/Heidelberg
-
Liu, J., Issarny, V., Enhanced reputation mechanism for mobile ad hoc networks. Jensen, C., Poslad, S., Dimitrakos, T., (eds.) Trust management. Vol. 2995 of lecture notes in computer science, 2004, Springer, Berlin/Heidelberg, 48–62.
-
(2004)
Trust management. Vol. 2995 of lecture notes in computer science
, pp. 48-62
-
-
Liu, J.1
Issarny, V.2
-
36
-
-
77953313061
-
Spring: A social-based privacy-preserving packet forwarding protocol for vehicular delay tolerant networks
-
Lu, R., Lin, X., Shen, X., Spring: A social-based privacy-preserving packet forwarding protocol for vehicular delay tolerant networks. Proceedings IEEE INFOCOM, 2010, 2010, 1–9.
-
(2010)
Proceedings IEEE INFOCOM, 2010
, pp. 1-9
-
-
Lu, R.1
Lin, X.2
Shen, X.3
-
37
-
-
77951292577
-
Pi: A practical incentive protocol for delay tolerant networks
-
Lu, R., Lin, X., Zhu, H., Shen, X., Preiss, B., Pi: A practical incentive protocol for delay tolerant networks. IEEE Transactions on Wireless Communications 9:4 (2010), 1483–1493.
-
(2010)
IEEE Transactions on Wireless Communications
, vol.9
, Issue.4
, pp. 1483-1493
-
-
Lu, R.1
Lin, X.2
Zhu, H.3
Shen, X.4
Preiss, B.5
-
38
-
-
77955422013
-
Anti-localization anonymous routing for delay tolerant network
-
Lu, X., Hui, P., Towsley, D., Pu, J., Xiong, Z., Anti-localization anonymous routing for delay tolerant network. Computer Networks 54:11 (2010), 1899–1910.
-
(2010)
Computer Networks
, vol.54
, Issue.11
, pp. 1899-1910
-
-
Lu, X.1
Hui, P.2
Towsley, D.3
Pu, J.4
Xiong, Z.5
-
39
-
-
84864186959
-
A self-regulating protocol for efficient routing in mobile delay tolerant networks.
-
Miao, J., Hasan, O., Ben Mokhtar, S., Brunie, L., A self-regulating protocol for efficient routing in mobile delay tolerant networks. 6th IEEE international Conference on digital ecosystems technologies (DEST), 2012, 2012, 1–6.
-
(2012)
6th IEEE international Conference on digital ecosystems technologies (DEST), 2012
, pp. 1-6
-
-
Miao, J.1
Hasan, O.2
Ben Mokhtar, S.3
Brunie, L.4
-
40
-
-
84993203074
-
-
Reputation-based enforcement schemes tailored to opportunistic networks design.
-
Modarresi, A., Woungang, I., Reyhani, L., & Razavi, H., (2011). Reputation-based enforcement schemes tailored to opportunistic networks design.
-
(2011)
-
-
Modarresi, A.1
Woungang, I.2
Reyhani, L.3
Razavi, H.4
-
41
-
-
0001058478
-
Two-person cooperative games
-
Nash, J., Two-person cooperative games. Econometrica 21:1 (1953), 128–140.
-
(1953)
Econometrica
, vol.21
, Issue.1
, pp. 128-140
-
-
Nash, J.1
-
42
-
-
84857781918
-
DNA-like linguistic secret sharing for strategic information systems
-
Ogiela, M.R., Ogiela, U., DNA-like linguistic secret sharing for strategic information systems. International Journal of Information Management 32:2 (2012), 175–181.
-
(2012)
International Journal of Information Management
, vol.32
, Issue.2
, pp. 175-181
-
-
Ogiela, M.R.1
Ogiela, U.2
-
43
-
-
69249217162
-
Optimistic fair exchange for secure forwarding.
-
Onen, M., Shikfa, A., Molva, R., Optimistic fair exchange for secure forwarding. Fourth annual international conference on mobile and ubiquitous systems: Networking services, 2007. MobiQuitous 2007, 2007, 1–5.
-
(2007)
Fourth annual international conference on mobile and ubiquitous systems: Networking services, 2007. MobiQuitous 2007
, pp. 1-5
-
-
Onen, M.1
Shikfa, A.2
Molva, R.3
-
44
-
-
34748884927
-
On the effects of cooperation in dtns.
-
Panagakis, A., Vaios, A., Stavrakakis, I., On the effects of cooperation in dtns. 2nd international conference on communication systems software and middleware, 2007. COMSWARE 2007, 2007, 1–6.
-
(2007)
2nd international conference on communication systems software and middleware, 2007. COMSWARE 2007
, pp. 1-6
-
-
Panagakis, A.1
Vaios, A.2
Stavrakakis, I.3
-
45
-
-
81255142215
-
Privacy-enhanced social-network routing
-
Parris, I., Henderson, T., Privacy-enhanced social-network routing. Computer Communications 35:1 (2012), 62–74.
-
(2012)
Computer Communications
, vol.35
, Issue.1
, pp. 62-74
-
-
Parris, I.1
Henderson, T.2
-
46
-
-
70349664091
-
Fair routing in delay tolerant networks.
-
Pujol, J., Toledo, A., Rodriguez, P., Fair routing in delay tolerant networks. IEEE INFOCOM 2009, 2009, 837–845.
-
(2009)
IEEE INFOCOM 2009
, pp. 837-845
-
-
Pujol, J.1
Toledo, A.2
Rodriguez, P.3
-
47
-
-
0032074579
-
Anonymous connections and onion routing.
-
Reed, M., Syverson, P., Goldschlag, D., Anonymous connections and onion routing. IEEE Journal on Selected Areas in Communications 16:4 (1998), 482–494.
-
(1998)
IEEE Journal on Selected Areas in Communications
, vol.16
, Issue.4
, pp. 482-494
-
-
Reed, M.1
Syverson, P.2
Goldschlag, D.3
-
48
-
-
0032621035
-
A review of current routing protocols for ad hoc mobile wireless networks
-
Royer, E., Toh, C., A review of current routing protocols for ad hoc mobile wireless networks. IEEE Personal Communications 6:2 (1999), 46–55.
-
(1999)
IEEE Personal Communications
, vol.6
, Issue.2
, pp. 46-55
-
-
Royer, E.1
Toh, C.2
-
49
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
G. Blakley D. Chaum Springer Berlin/Heidelberg
-
Shamir, A., Identity-based cryptosystems and signature schemes. Blakley, G., Chaum, D., (eds.) Advances in cryptology. Vol. 196 of lecture notes in computer science, 1985, Springer, Berlin/Heidelberg, 47–53.
-
(1985)
Advances in cryptology. Vol. 196 of lecture notes in computer science
, pp. 47-53
-
-
Shamir, A.1
-
50
-
-
67249083783
-
Incentive-aware routing in dtns.
-
Shevade, U., Song, H.H., Qiu, L., Zhang, Y., Incentive-aware routing in dtns. IEEE international conference on network protocols, 2008. ICNP 2008, 2008, 238–247.
-
(2008)
IEEE international conference on network protocols, 2008. ICNP 2008
, pp. 238-247
-
-
Shevade, U.1
Song, H.H.2
Qiu, L.3
Zhang, Y.4
-
51
-
-
84859744344
-
Arden: Anonymous networking in delay tolerant networks
-
Shi, C., Luo, X., Traynor, P., Ammar, M.H., Zegura, E.W., Arden: Anonymous networking in delay tolerant networks. Ad Hoc Networks 10:6 (2012), 918–930.
-
(2012)
Ad Hoc Networks
, vol.10
, Issue.6
, pp. 918-930
-
-
Shi, C.1
Luo, X.2
Traynor, P.3
Ammar, M.H.4
Zegura, E.W.5
-
52
-
-
84885775524
-
Spray and wait: An efficient routing scheme for intermittently connected mobile networks.
-
Spyropoulos, T., Psounis, K., Raghavendra, C.S., Spray and wait: An efficient routing scheme for intermittently connected mobile networks. Proceedings of the 2005 ACM SIGCOMM workshop on delay-tolerant networking. WDTN ‘05, ACM, New York, NY, USA, 2005, 252–259.
-
(2005)
Proceedings of the 2005 ACM SIGCOMM workshop on delay-tolerant networking. WDTN ‘05, ACM, New York, NY, USA
, pp. 252-259
-
-
Spyropoulos, T.1
Psounis, K.2
Raghavendra, C.S.3
-
53
-
-
40749113163
-
Efficient routing in intermittently connected mobile networks: The multiple-copy case
-
Spyropoulos, T., Psounis, K., Raghavendra, C.S., Efficient routing in intermittently connected mobile networks: The multiple-copy case. IEEE/ACM Transactions on Networking 16 (2008), 77–90.
-
(2008)
IEEE/ACM Transactions on Networking
, vol.16
, pp. 77-90
-
-
Spyropoulos, T.1
Psounis, K.2
Raghavendra, C.S.3
-
54
-
-
40749157530
-
Efficient routing in intermittently connected mobile networks: The single-copy case
-
Spyropoulos, T., Psounis, K., Raghavendra, C.S., Efficient routing in intermittently connected mobile networks: The single-copy case. IEEE/ACM Transactions on Networking 16:1 (2008), 63–76.
-
(2008)
IEEE/ACM Transactions on Networking
, vol.16
, Issue.1
, pp. 63-76
-
-
Spyropoulos, T.1
Psounis, K.2
Raghavendra, C.S.3
-
55
-
-
84993203027
-
-
Epidemic routing for partially connected ad hoc networks. Tech. rep., Citeseer.
-
Vahdat, A., & Becker, D. (2000). Epidemic routing for partially connected ad hoc networks. Tech. rep., Citeseer.
-
(2000)
-
-
Vahdat, A.1
Becker, D.2
-
56
-
-
33847309213
-
A privacy preserving reputation system for mobile information dissemination networks.
-
Voss, M., Heinemann, A., Muhlhauser, M., A privacy preserving reputation system for mobile information dissemination networks. First international conference on security and privacy for emerging areas in communications networks, 2005. SecureComm 2005, 2005, 171–181.
-
(2005)
First international conference on security and privacy for emerging areas in communications networks, 2005. SecureComm 2005
, pp. 171-181
-
-
Voss, M.1
Heinemann, A.2
Muhlhauser, M.3
-
57
-
-
79960370629
-
Mobiid: A user-centric and social-aware reputation based incentive scheme for delay/disruption tolerant networks
-
H. Frey X. Li S. Ruehrup Springer Berlin/Heidelberg
-
Wei, L., Zhu, H., Cao, Z., Shen, X., Mobiid: A user-centric and social-aware reputation based incentive scheme for delay/disruption tolerant networks. Frey, H., Li, X., Ruehrup, S., (eds.) Ad-hoc, mobile, and wireless networks. Vol. 6811 of lecture notes in computer science, 2011, Springer, Berlin/Heidelberg, 177–190.
-
(2011)
Ad-hoc, mobile, and wireless networks. Vol. 6811 of lecture notes in computer science
, pp. 177-190
-
-
Wei, L.1
Zhu, H.2
Cao, Z.3
Shen, X.4
-
58
-
-
84863149546
-
Credit-based cooperation enforcement schemes tailored to opportunistic networks
-
Woungang, I., Denko, M., Credit-based cooperation enforcement schemes tailored to opportunistic networks. Mobile Opportunistic Networks, 2011, 51.
-
(2011)
Mobile Opportunistic Networks
, pp. 51
-
-
Woungang, I.1
Denko, M.2
-
59
-
-
70449601749
-
Bargain-based stimulation mechanism for selfish mobile nodes in participatory sensing network.
-
Xie, X., Chen, H., Wu, H., Bargain-based stimulation mechanism for selfish mobile nodes in participatory sensing network. 6th annual IEEE communications society conference on sensor, mesh and ad hoc communications and networks, 2009. SECON ‘09, 2009, 1–9.
-
(2009)
6th annual IEEE communications society conference on sensor, mesh and ad hoc communications and networks, 2009. SECON ‘09
, pp. 1-9
-
-
Xie, X.1
Chen, H.2
Wu, H.3
-
60
-
-
84872001538
-
Utilizing social links for location privacy in opportunistic delay-tolerant networks.
-
Zakhary, S., Radenkovic, M., Utilizing social links for location privacy in opportunistic delay-tolerant networks. the Proc IEEE ICC, 2012.
-
(2012)
the Proc IEEE ICC
-
-
Zakhary, S.1
Radenkovic, M.2
-
61
-
-
83555164320
-
N-nemo: A comprehensive network mobility solution in proxy mobile IPV6 network
-
Zhiwei Yan, H.Z., You, I., N-nemo: A comprehensive network mobility solution in proxy mobile IPV6 network. Journal of Wireless Mobile Networks, Ubiquitous Computing and Dependable Applications Vol 1:2/3 (2010), 52–70.
-
(2010)
Journal of Wireless Mobile Networks, Ubiquitous Computing and Dependable Applications Vol
, vol.1
, Issue.2-3
, pp. 52-70
-
-
Zhiwei Yan, H.Z.1
You, I.2
-
62
-
-
0042933944
-
Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks.
-
Zhong, S., Chen, J., Yang, Y., Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks. INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies. Vol. 3, 2003, 1987–1997.
-
(2003)
INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies. Vol. 3
, pp. 1987-1997
-
-
Zhong, S.1
Chen, J.2
Yang, Y.3
-
63
-
-
70350238158
-
Smart: A secure multilayer credit-based incentive scheme for delay-tolerant networks.
-
Zhu, H., Lin, X., Lu, R., Fan, Y., Shen, X., Smart: A secure multilayer credit-based incentive scheme for delay-tolerant networks. IEEE Transactions on Vehicular Technology 58:8 (2009), 4628–4639.
-
(2009)
IEEE Transactions on Vehicular Technology
, vol.58
, Issue.8
, pp. 4628-4639
-
-
Zhu, H.1
Lin, X.2
Lu, R.3
Fan, Y.4
Shen, X.5
-
64
-
-
84866527311
-
A survey of social-based routing in delay tolerant networks: Positive and negative social effects
-
Zhu, Y., Xu, B., Shi, X., Wang, Y., A survey of social-based routing in delay tolerant networks: Positive and negative social effects. IEEE Communications Surveys & Tutorials PP:99 (2012), 1–15.
-
(2012)
IEEE Communications Surveys & Tutorials
, vol.PP
, Issue.99
, pp. 1-15
-
-
Zhu, Y.1
Xu, B.2
Shi, X.3
Wang, Y.4
|