-
1
-
-
4544308674
-
Observation-based cooperation enforcement in ad hoc networks
-
Sorav Bansal and Mary Baker. Observation-based cooperation enforcement in ad hoc networks. Technical Report, 2003.
-
(2003)
Technical Report
-
-
Bansal, S.1
Baker, M.2
-
2
-
-
35248853957
-
IBM research report: The selfish node: Increasing routing security in mobile ad hoc networks
-
Sonja Buchegger and Jean-Yves Le Boudec. IBM Research Report: The selfish node: Increasing routing security in mobile ad hoc networks. RR 3354, 2001.
-
(2001)
RR
, pp. 3354
-
-
Buchegger, S.1
Boudec, J.-Y.L.2
-
3
-
-
0037885580
-
Nodes bearing grudges: Towards routing security, fairness, and robustness in mobile ad hoc networks
-
Canary Islands, Spain. January 2002. Piscataway, NJ: IEEE Computer Society
-
Sonja Buchegger and Jean-Yves Le Boudec. Nodes bearing grudges: Towards routing security, fairness, and robustness in mobile ad hoc networks. In Proceedings of the 10th Euromicro Workshop on Parallel, Distributed, and Network-Based Processing, pp. 403–410, Canary Islands, Spain. January 2002. Piscataway, NJ: IEEE Computer Society, 2002.
-
(2002)
Proceedings of the 10th Euromicro Workshop on Parallel, Distributed, and Network-Based Processing
, pp. 403-410
-
-
Buchegger, S.1
Boudec, J.-Y.L.2
-
4
-
-
0242696192
-
Performance analysis of the confidant protocol: Cooperation of nodes — fairness in dynamic ad hoc networks
-
Lausanne, Switzerland, June 2002. Piscataway, NJ: IEEE Computer Society
-
Sonja Buchegger and Jean-Yves Le Boudec. Performance analysis of the CONFIDANT protocol: Cooperation of nodes — Fairness in dynamic ad hoc networks. In Proceedings of IEEE/ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC), Lausanne, Switzerland, June 2002. Piscataway, NJ: IEEE Computer Society, 2002.
-
(2002)
Proceedings of IEEE/ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC)
-
-
Buchegger, S.1
Boudec, J.-Y.L.2
-
8
-
-
84871044906
-
Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior
-
Chrysanthos Dellarocas. Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior. In Proceedings of the ACM Conference on Electronic Commerce, pp. 150–157, 2000.
-
(2000)
Proceedings of the ACM Conference on Electronic Commerce
, pp. 150-157
-
-
Dellarocas, C.1
-
10
-
-
84961572484
-
Sead: Secure efficient distance vector routing for mobile wireless ad hoc networks
-
Calicoon, NY, June
-
Yih-Chun Hu, David B. Johnson, and Adrian Perrig. SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks. In Proceedings of the 4th IEEE Workshop on Mobile Computing Systems and Applications (WMCSA 2002), Calicoon, NY, June 2002.
-
(2002)
Proceedings of the 4th IEEE Workshop on Mobile Computing Systems and Applications (WMCSA 2002)
-
-
Yih-Chun, H.1
Johnson, D.B.2
Perrig, A.3
-
11
-
-
0004118152
-
-
Technical Report Technical Report TRO1-383, Department of Computer Science, Rice University, December
-
Yih-Chun Hu, Adrian Perrig, and David B. Johnson. Ariadne: A secure on-demand routing protocol for ad hoc networks. Technical Report Technical Report TRO1-383, Department of Computer Science, Rice University, December 2001.
-
(2001)
Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks
-
-
Yih-Chun, H.1
Perrig, A.2
Johnson, D.B.3
-
12
-
-
0003597247
-
-
Internet Draft, Mobile Ad Hoc Network (MANET) Working Group, IETF, Version 9, April
-
Dave B. Johnson and David A. Maltz. The dynamic source routing protocol for mobile ad hoc networks. Internet Draft, Mobile Ad Hoc Network (MANET) Working Group, IETF, Version 9, April 2003.
-
(2003)
The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks
-
-
Johnson, D.B.1
Maltz, D.A.2
-
13
-
-
0023139974
-
The DARPA packet radio network protocols
-
no. 1, January
-
John Jubin and Janet D. Tomow. The DARPA packet radio network protocols. In Proceedings of the IEEE, vol. 75, no. 1, pp. 21–32, January 1987.
-
(1987)
Proceedings of the IEEE
, Issue.75
, pp. 21-32
-
-
Jubin, J.1
Tomow, J.D.2
-
14
-
-
84900044615
-
The production of trust in online markets
-
E.J. Lawler, M. Macy, S. Thyne, and H.A. Walker, Greenwich, CT
-
Peter Kollock. The production of trust in online markets. In Advances in Group Processes, E.J. Lawler, M. Macy, S. Thyne, and H.A. Walker, Eds., Greenwich, CT, 1999.
-
(1999)
Advances in Group Processes
-
-
Kollock, P.1
-
15
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
Sergio Marti, T.J. Giuli, Kevin Lai, and Mary Baker. Mitigating routing misbehavior in mobile ad hoc networks. In Proceedings of MobiCom 2000, pp. 255–265, 2000.
-
(2000)
Proceedings of MobiCom 2000
, pp. 255-265
-
-
Marti, S.1
Giuli, T.J.2
Lai, K.3
Baker, M.4
-
18
-
-
1642324009
-
Statistically unique and cryptographically verifiable (sucv) identifiers and addresses
-
February
-
G. Montenegro and C. Castelluccia. Statistically unique and cryptographically verifiable (sucv) identifiers and addresses. In Proceeding of NDSS’02, February 2002.
-
(2002)
Proceeding of NDSS’02
-
-
Montenegro, G.1
Castelluccia, C.2
-
19
-
-
84903836776
-
How to misuse AODV: A case study of insider attacks against mobile ad-hoc routing protocols
-
West Point, June
-
Peng Ning and Kun Sun. How to misuse AODV: A case study of insider attacks against mobile ad-hoc routing protocols. In Proceedings of the 4th Annual IEEE Information Assurance Workshop, West Point, June 2003.
-
(2003)
Proceedings of the 4th Annual IEEE Information Assurance Workshop
-
-
Ning, P.1
Sun, K.2
-
20
-
-
21644475636
-
Context aware inferencing to rate a selfish node in dsr based ad-hoc networks
-
Taipeh, Taiwan
-
Krishna Paul and Dirk Westhoff. Context aware inferencing to rate a selfish node in DSR based ad-hoc networks. In Proceedings of the IEEE Globecom Conference, Taipeh, Taiwan, 2002.
-
(2002)
Proceedings of the IEEE Globecom Conference
-
-
Paul, K.1
Westhoff, D.2
-
21
-
-
4544384608
-
Ad hoc on demand distance vector (AODV) routing
-
July
-
Charles E. Perkins, Elizabeth M. Royer, and Santanu Das. Ad hoc on demand distance vector (AODV) routing. RFC 3561, IETF, July 2003.
-
(2003)
RFC 3561, IETF
-
-
Perkins, C.E.1
Royer, E.M.2
Das, S.3
-
23
-
-
0031078841
-
Trusting mobile user devices and security modules
-
February
-
Andreas Pfitzmann, Birgit Pfitzmann, Matthias Schunter, and Michael Waidner. Trusting mobile user devices and security modules. IEEE Computer, pp. 61–68, February 1997.
-
(1997)
IEEE Computer
, pp. 61-68
-
-
Pfitzmann, A.1
Pfitzmann, B.2
Schunter, M.3
Waidner, M.4
-
26
-
-
0002101577
-
Reputation systems
-
Paul Resnick, Richard Zeckhauser, Eric Friedman, and Ko Kuwabara. Reputation systems. Communications of the ACM, vol. 43, no. 12, pp. 45–48, 2000.
-
(2000)
Communications of the ACM
, vol.43
, Issue.12
, pp. 45-48
-
-
Resnick, P.1
Zeckhauser, R.2
Friedman, E.3
Ko, K.4
-
30
-
-
0034546898
-
Intrusion detection in wireless ad-hoc networks
-
Yongguang Zhang and Wenke Lee. Intrusion detection in wireless ad-hoc networks. In Proceedings of MobiCom 2000, pp. 275–283, 2000.
-
(2000)
Proceedings of Mobicom 2000
, pp. 275-283
-
-
Zhang, Y.1
Lee, W.2
-
31
-
-
0042933944
-
Sprite: A simple, cheat-proof, credit-based system for mobile ad hoc networks
-
S. Zhong, Y. Yang, and J. Chen. Sprite: A simple, cheat-proof, credit-based system for mobile ad hoc networks. In Proceedings of Infocom, 2003.
-
(2003)
Proceedings of Infocom
-
-
Zhong, S.1
Yang, Y.2
Chen, J.3
|