-
1
-
-
35448931599
-
Applicability of identity-based cryptography for disruption-tolerant networking
-
New York, USA Jun
-
N. Asokan, K. Kostiainen, P. Ginzboorg, J. Ott, and C. Luo. Applicability of identity-based cryptography for disruption-tolerant networking. In Proceedings of the 1st International MobiSys Workshop on Mobile Opportunistic Networking, MobiOpp '07, pages 52-56, New York, USA, Jun. 2007.
-
(2007)
Proceedings of the 1st International MobiSys Workshop on Mobile Opportunistic Networking, MobiOpp '07
, pp. 52-56
-
-
Asokan, N.1
Kostiainen, K.2
Ginzboorg, P.3
Ott, J.4
Luo, C.5
-
2
-
-
0242696192
-
Performance analysis of the confidant protocol
-
Lausanne, Switzerland Jun
-
S. Buchegger and J.-Y. Le Boudec. Performance analysis of the confidant protocol. In Proceedings of the 3rd ACM International Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc '02, pages 226-236, Lausanne, Switzerland, Jun. 2002.
-
(2002)
Proceedings of the 3rd ACM International Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc '02
, pp. 226-236
-
-
Buchegger, S.1
Le Boudec, J.-Y.2
-
3
-
-
39049118503
-
Maxprop: Routing for vehicle-based disruption-tolerant networks
-
Barcelona, Spain, Apr
-
J. Burgess, B. Gallagher, D. Jensen, and B. N. Levine. Maxprop: Routing for vehicle-based disruption-tolerant networks. In Proc. IEEE INFOCOM, Barcelona, Spain, Apr. 2006.
-
(2006)
Proc. IEEE INFOCOM
-
-
Burgess, J.1
Gallagher, B.2
Jensen, D.3
Levine, B.N.4
-
4
-
-
77951592282
-
Delay-tolerant networking architecture
-
Informational Apr
-
V. Cerf, S. Burleigh, A. Hooke, L. Torgerson, R. Durst, K. Scott, K. Fall, and H. Weiss. Delay-tolerant networking architecture. In RFC 4838 (Informational), Apr. 2007.
-
(2007)
RFC
, vol.4838
-
-
Cerf, V.1
Burleigh, S.2
Hooke, A.3
Torgerson, L.4
Durst, R.5
Scott, K.6
Fall, K.7
Weiss, H.8
-
5
-
-
70449102528
-
Comparison of two intrusion detection schemes for sparsely connected ad hoc networks
-
Washington DC, Oct.
-
M. Chuah and P. Yang. Comparison of two intrusion detection schemes for sparsely connected ad hoc networks. In Military Communications Conference 2006, pages 1-7, Washington DC, Oct. 2006.
-
(2006)
Military Communications Conference 2006
, pp. 1-7
-
-
Chuah, M.1
Yang, P.2
-
6
-
-
85083090090
-
A misbehavior detection system for vehicular delay tolerant networks
-
Braunschweig, Germany, Sep
-
Y. Guo, S. Schildt, J. Morgenroth, and L. Wolf. A misbehavior detection system for vehicular delay tolerant networks. In Proceedings of the INFORMATIK 2012, Braunschweig, Germany, Sep. 2012.
-
(2012)
Proceedings of the INFORMATIK 2012
-
-
Guo, Y.1
Schildt, S.2
Morgenroth, J.3
Wolf, L.4
-
7
-
-
84922954336
-
The one simulator for dtn protocol evaluation
-
Rome, Italy Mar
-
A. Ker̈anen, J. Ott, and T. K̈arkk̈ainen. The one simulator for dtn protocol evaluation. In Proceedings of the 2nd International Conference on Simulation Tools and Techniques, Simutools '09, pages 55:1-55:10, Rome, Italy, Mar. 2009.
-
(2009)
Proceedings of the 2nd International Conference on Simulation Tools and Techniques, Simutools '09
, pp. 551-5510
-
-
Ker̈anen, A.1
Ott, J.2
K̈arkk̈ainen, T.3
-
8
-
-
70349684505
-
Thwarting blackhole attacks in disruption-tolerant networks using encounter tickets
-
IEEE Rio de Janeiro, Brazil, Apr.
-
F. Li, J. Wu, and A. Srinivasan. Thwarting blackhole attacks in disruption-tolerant networks using encounter tickets. In INFOCOM 2009, IEEE, pages 2428-2436, Rio de Janeiro, Brazil, Apr. 2009.
-
(2009)
INFOCOM 2009
, pp. 2428-2436
-
-
Li, F.1
Wu, J.2
Srinivasan, A.3
-
9
-
-
84863372860
-
Mitigating routing misbehavior in disruption tolerant networks
-
Apr
-
Q. Li and G. Cao. Mitigating routing misbehavior in disruption tolerant networks. Information Forensics and Security, IEEE Transactions on, 7(2):664-675, Apr. 2012.
-
(2012)
Information Forensics and Security, IEEE Transactions on
, vol.7
, Issue.2
, pp. 664-675
-
-
Li, Q.1
Cao, G.2
-
10
-
-
20344383943
-
Probabilistic routing in intermittently connected networks
-
Jul
-
A. Lindgren, A. Doria, and O. Scheĺen. Probabilistic routing in intermittently connected networks. SIGMOBILE Mob. Comput. Commun. Rev. , 7(3):19-20, Jul. 2003.
-
(2003)
SIGMOBILE Mob. Comput. Commun. Rev
, vol.7
, Issue.3
, pp. 19-20
-
-
Lindgren, A.1
Doria, A.2
Scheĺen, O.3
-
11
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
Boston, USA Aug
-
S. Marti, T. J. Giuli, K. Lai, and M. Baker. Mitigating routing misbehavior in mobile ad hoc networks. In Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, pages 255-265, Boston, USA, Aug. 2000.
-
(2000)
Proceedings of the 6th Annual International Conference on Mobile Computing and Networking
, pp. 255-265
-
-
Marti, S.1
Giuli, T.J.2
Lai, K.3
Baker, M.4
-
12
-
-
29244491141
-
Spray and wait: An efficient routing scheme for intermittently connected mobile networks
-
Philadelphia, USA, Aug.
-
T. Spyropoulos, K. Psounis, and C. S. Raghavendra. Spray and wait: an efficient routing scheme for intermittently connected mobile networks. In Proceedings of the 2005 ACM SIGCOMM workshop on Delay-tolerant networking, WDTN '05, pages 252-259, Philadelphia, USA, Aug. 2005.
-
(2005)
Proceedings of the 2005 ACM SIGCOMM Workshop on Delay-tolerant Networking, WDTN '05
, pp. 252-259
-
-
Spyropoulos, T.1
Psounis, K.2
Raghavendra, C.S.3
|