-
1
-
-
77953146565
-
Path diminution in node-disjoint multipath routing for mobile ad hoc networks is unavoidable with single route discovery
-
A.M. Abbas, and B.N. Jain Path diminution in node-disjoint multipath routing for mobile ad hoc networks is unavoidable with single route discovery Int J Ad Hoc Ubiquitous Comput 5 1 2010 7 21
-
(2010)
Int J Ad Hoc Ubiquitous Comput
, vol.5
, Issue.1
, pp. 7-21
-
-
Abbas, A.M.1
Jain, B.N.2
-
2
-
-
34250344419
-
Optimum power allocation in cooperative networks
-
photonics, communications and networks, and computing science; March-April
-
Adeane, J, Rodrigues, MRD, Wassell, IJ. Optimum power allocation in cooperative networks. In: Proceedings of the postgraduate research conference in electronics, photonics, communications and networks, and computing science; March-April 2005. p. 23-4.
-
(2005)
Proceedings of the Postgraduate Research Conference in Electronics
, pp. 23-24
-
-
Adeane, J.1
Mrd, R.2
Wassell, I.J.3
-
3
-
-
79957862128
-
On security and reliability using cooperative transmissions in sensor networks
-
applications and worksharing
-
Aksu, A, Krishnamurthy, P, Tipper, D, Ercetin, O. On security and reliability using cooperative transmissions in sensor networks. In: Proceedings of the 6th international conference on collaborative computing: networking, applications and worksharing; 2010.
-
(2010)
Proceedings of the 6th International Conference on Collaborative Computing: Networking
-
-
Aksu, A.1
Krishnamurthy, P.2
Tipper, D.3
Ercetin, O.4
-
5
-
-
77956877124
-
The internet of things: A survey
-
L. Atzori, A. Iera, and G. Morabito The internet of things: a survey Comput Netw 54 15 2010 2787 2805
-
(2010)
Comput Netw
, vol.54
, Issue.15
, pp. 2787-2805
-
-
Atzori, L.1
Iera, A.2
Morabito, G.3
-
6
-
-
0027693935
-
Diversity coding for transparent self-healing and fault-tolerant communication networks
-
E. Ayanoglu et al. Diversity coding for transparent self-healing and fault-tolerant communication networks IEEE Trans Commun 41 11 1993 1677 1686
-
(1993)
IEEE Trans Commun
, vol.41
, Issue.11
, pp. 1677-1686
-
-
Ayanoglu, E.1
-
16
-
-
14844324732
-
A robust reputation system for peer-to-peer and mobile ad-hoc networks
-
Cambridge MA, USA: Harvard University; June
-
Buchegger, S, Le Boudec, J-Y. A robust reputation system for peer-to-peer and mobile ad-hoc networks. In: Proceedings of P2PEcon 2004. Cambridge MA, USA: Harvard University; June 2004.
-
(2004)
Proceedings of P2PEcon 2004
-
-
Buchegger, S.1
Le Boudec, J.-Y.2
-
18
-
-
79951599667
-
Trust establishment in cooperative wireless networks
-
November
-
Changiz, R, Halabian, H, Yu, F, Lambadaris, RI, Tang, H, Mason, PC. Trust establishment in cooperative wireless networks. In: Proceedings of IEEE Milcom10; November 2010.
-
(2010)
Proceedings of IEEE Milcom10
-
-
Changiz, R.1
Halabian, H.2
Yu, F.3
Lambadaris, R.I.4
Tang, H.5
Mason, P.C.6
-
19
-
-
84866346403
-
TRM-IoT: A trust management model based on fuzzy reputation for internet of things
-
D. Chen, G. Chang, D. Sun, J. Li, J. Jia, and X. Wang TRM-IoT: a trust management model based on fuzzy reputation for internet of things Comput Sci Inf Syst 8 4 2011 1207 1228
-
(2011)
Comput Sci Inf Syst
, vol.8
, Issue.4
, pp. 1207-1228
-
-
Chen, D.1
Chang, G.2
Sun, D.3
Li, J.4
Jia, J.5
Wang, X.6
-
20
-
-
79953305088
-
Conflicts and incentives in wireless cooperative relaying: A distributed market pricing framework
-
L. Chen, L. Libman, and J. Leneutre Conflicts and incentives in wireless cooperative relaying: a distributed market pricing framework IEEE Trans Parallel Distributed Syst 22 5 2011 758 772
-
(2011)
IEEE Trans Parallel Distributed Syst
, vol.22
, Issue.5
, pp. 758-772
-
-
Chen, L.1
Libman, L.2
Leneutre, J.3
-
26
-
-
34247397030
-
Opportunistic cooperation by dynamic resource allocation
-
D. Gunduz, and E. Erkip Opportunistic cooperation by dynamic resource allocation, IEEE Trans Wirel Commun 6 2007 1446 1454
-
(2007)
IEEE Trans Wirel Commun
, vol.6
, pp. 1446-1454
-
-
Gunduz, D.1
Erkip, E.2
-
28
-
-
23844482975
-
Cooperative multihop transmission in wireless networks
-
P. Herhold, E. Zimmermann, and G. Fettweis Cooperative multihop transmission in wireless networks Comput Netw J 49 2005, pp. 299-324
-
(2005)
Comput Netw J
, vol.49
, pp. 299-324
-
-
Herhold, P.1
Zimmermann, E.2
Fettweis, G.3
-
29
-
-
84957626176
-
Proactive Secret Sharing, or: How to cope with perpetual leakage
-
D. Coppersmith, Springer-Verlag
-
A. Herzberg, S. Jarecki, H. Krawczyk, and M. Yung Proactive Secret Sharing, or: how to cope with perpetual leakage D. Coppersmith, Advances in cryptology - crypto 95 proceedings. Lecture notes in computer science vol. 963 1995 Springer-Verlag 339 352
-
(1995)
Advances in Cryptology - Crypto 95 Proceedings. Lecture Notes in Computer Science
, vol.963
, pp. 339-352
-
-
Herzberg, A.1
Jarecki, S.2
Krawczyk, H.3
Yung, M.4
-
31
-
-
0037443355
-
Improvement of threshold proxy signature scheme
-
C.L. Hsu, T.S. Wu, and T.C. Wu Improvement of threshold proxy signature scheme Appl Math Comput 136 2003 315 321
-
(2003)
Appl Math Comput
, vol.136
, pp. 315-321
-
-
Hsu, C.L.1
Wu, T.S.2
Wu, T.C.3
-
32
-
-
55749099727
-
Cryptanalysis and improvement of a threshold proxy signature scheme
-
J. Hu, and J. Zhang Cryptanalysis and improvement of a threshold proxy signature scheme Comput Standards Interfaces 2008, 619-631
-
(2008)
Comput Standards Interfaces
, pp. 619-631
-
-
Hu, J.1
Zhang, J.2
-
35
-
-
0042209739
-
A micro-payment scheme encouraging collaboration in multi-hop cellular networks
-
Gosier, Guadeloupe; January
-
Jakobsson M, Hubaux J, Buttyan L. A micro-payment scheme encouraging collaboration in multi-hop cellular networks. In: Proceedings of financial crypto. Gosier, Guadeloupe; January 2003.
-
(2003)
Proceedings of Financial Crypto
-
-
Jakobsson, M.1
Hubaux, J.2
Buttyan, L.3
-
36
-
-
0742303647
-
Coded cooperation in wireless communications: Space-time transmission and iterative decoding
-
M. Janani Coded cooperation in wireless communications: space-time transmission and iterative decoding IEEE Trans Signal Process 52 2 2004 362 371
-
(2004)
IEEE Trans Signal Process
, vol.52
, Issue.2
, pp. 362-371
-
-
Janani, M.1
-
37
-
-
34247167001
-
A Scalable and robust approach to collaboration enforcement in mobile ad-hoc networks
-
N. Jiang, K. Hua, and D. Liu A Scalable and robust approach to collaboration enforcement in mobile ad-hoc networks Commun Netw 9 Part 1 2007 56 66
-
(2007)
Commun Netw
, vol.9
, Issue.PART 1
, pp. 56-66
-
-
Jiang, N.1
Hua, K.2
Liu, D.3
-
39
-
-
79959526891
-
Stealthy attacks in wireless ad hoc networks: Detection and countermeasure
-
I. Khalil, and S. Bagchi Stealthy attacks in wireless ad hoc networks: detection and countermeasure IEEE Trans Mob Comput 10 8 2011 1096 1112
-
(2011)
IEEE Trans Mob Comput
, vol.10
, Issue.8
, pp. 1096-1112
-
-
Khalil, I.1
Bagchi, S.2
-
40
-
-
84861942886
-
Security analysis of a threshold proxy signature scheme
-
Kim K, Nyang D. Security analysis of a threshold proxy signature scheme. IACR cryptology eprint archive10; 2010. p. 400.
-
(2010)
IACR Cryptology Eprint archive10
, pp. 400
-
-
Kim, K.1
Nyang, D.2
-
41
-
-
0010567510
-
Proxy signatures, revisited
-
LNCS Berlin: Springer-Verlag
-
Kim S, Park S, Won D. Proxy signatures, revisited. In: Proceedings of the information and communications security (ICICS97). LNCS, vol. 1334. Berlin: Springer-Verlag; 1997. p. 223-32.
-
(1997)
Proceedings of the Information and Communications Security (ICICS97)
, vol.1334
, pp. 223-232
-
-
Kim, S.1
Park, S.2
Won, D.3
-
42
-
-
26444619804
-
Cooperative strategies and capacity theorem for relay networks
-
G. Kramer, M. Gastpar, and P. Gupta Cooperative strategies and capacity theorem for relay networks IEEE Trans Inf Theory 51 2005 3037
-
(2005)
IEEE Trans Inf Theory
, vol.51
, pp. 3037
-
-
Kramer, G.1
Gastpar, M.2
Gupta, P.3
-
45
-
-
67650470618
-
Cognitive security management with reputation based cooperation schemes in heterogeneous networks
-
Nashville, TN; March
-
Lee M, Ye X, Johnson S, Marconett D, Vsk C, Vemuri R, Yoo SJB. Cognitive security management with reputation based cooperation schemes in heterogeneous networks. In: IEEE symposium on computational intelligence in cyber security (CICS). Nashville, TN; March 2009.
-
(2009)
IEEE Symposium on Computational Intelligence in Cyber Security (CICS)
-
-
Lee, M.1
Ye, X.2
Johnson, S.3
Marconett, D.4
Vsk, C.5
Vemuri, R.6
Yoo, S.J.B.7
-
46
-
-
10644262979
-
The security of a strong proxy signature scheme with proxy signer privacy protection
-
N. Lee, and M. Lee The security of a strong proxy signature scheme with proxy signer privacy protection Appl Math Comput 16 1 2005 807 812
-
(2005)
Appl Math Comput
, vol.16
, Issue.1
, pp. 807-812
-
-
Lee, N.1
Lee, M.2
-
47
-
-
83755219546
-
Misbehavior detection without channel information in cooperative networks
-
Lo Li-Chung, Huang Wan-Jen. Misbehavior detection without channel information in cooperative networks. VTC Fall; 2011. p. 1-5.
-
(2011)
VTC Fall
, pp. 1-5
-
-
Li-Chung, L.1
Huang, W.-J.2
-
49
-
-
70449488787
-
DSC: Cooperation incentive mechanism for multi-hop cellular networks
-
Dresden, Germany; June 14-18
-
Mahmoud M, Shen X. DSC: cooperation incentive mechanism for multi-hop cellular networks. In: Proceeedings of IEEE ICC. Dresden, Germany; June 14-18, 2009. p. 569-74.
-
(2009)
Proceeedings of IEEE ICC
, pp. 569-574
-
-
Mahmoud, M.1
Shen, X.2
-
50
-
-
0030231965
-
Proxy signatures: Delegation of the power to sign messages
-
M. Mambo, K. Usuda, and E. Okamoto Proxy signatures: delegation of the power to sign messages IEICE Trans Fundam E79-A 9 1996 1338 1353
-
(1996)
IEICE Trans Fundam
, vol.79 A
, Issue.9
, pp. 1338-1353
-
-
Mambo, M.1
Usuda, K.2
Okamoto, E.3
-
51
-
-
34249313010
-
Tracing malicious relays in cooperative wireless communications
-
Y. Mao, and M. Wu Tracing malicious relays in cooperative wireless communications IEEE Trans Inf Forensics Secur 2 2 2007 198 212
-
(2007)
IEEE Trans Inf Forensics Secur
, vol.2
, Issue.2
, pp. 198-212
-
-
Mao, Y.1
Wu, M.2
-
52
-
-
4344599235
-
Cooperative multihop broadcast for wireless networks
-
I. Maric, and R.D. Yates Cooperative multihop broadcast for wireless networks IEEE J Sel Areas Commun 22 6 2004 1080 1088
-
(2004)
IEEE J Sel Areas Commun
, vol.22
, Issue.6
, pp. 1080-1088
-
-
Maric, I.1
Yates, R.D.2
-
55
-
-
0033351734
-
Bounds and techniques for efficient redistribution of secret shares to new access structures
-
K.M. Martin, R. Safavi-Naini, and H. Wang Bounds and techniques for efficient redistribution of secret shares to new access structures Comput J 42 8 1999 638 649
-
(1999)
Comput J
, vol.42
, Issue.8
, pp. 638-649
-
-
Martin, K.M.1
Safavi-Naini, R.2
Wang, H.3
-
57
-
-
44049089396
-
Optimal backpressure routing for wireless networks with multi-receiver diversity
-
M.J. Neely, and R. Urgaonkar Optimal backpressure routing for wireless networks with multi-receiver diversity Proc Conf Inf Sci Syst 2006 18 25
-
(2006)
Proc Conf Inf Sci Syst
, pp. 18-25
-
-
Neely, M.J.1
Urgaonkar, R.2
-
58
-
-
33847728756
-
Grouping and partner selection in cooperative wireless networks
-
A. Nosratinia, and T.E. Hunter Grouping and partner selection in cooperative wireless networks IEEE J Sel Areas Commun 25 2007 369
-
(2007)
IEEE J Sel Areas Commun
, vol.25
, pp. 369
-
-
Nosratinia, A.1
Hunter, T.E.2
-
60
-
-
33751255669
-
Identity-based secure collaboration in wireless ad hoc networks
-
J. Pan, L. Cai, X. Shen, and J. Mark Identity-based secure collaboration in wireless ad hoc networks Comput Netw 51 3 2007 853 865
-
(2007)
Comput Netw
, vol.51
, Issue.3
, pp. 853-865
-
-
Pan, J.1
Cai, L.2
Shen, X.3
Mark, J.4
-
63
-
-
80054085942
-
SeReRoM: Secured reliable routing scheme for multicasting
-
Rajavelu Srinivasan, V. Vaidehi, K.N. Srivathsan, L. Ramesh Babu, and C. Karunagaran SeReRoM: secured reliable routing scheme for multicasting Int J Netw Secur 5 1 2007 82 88
-
(2007)
Int J Netw Secur
, vol.5
, Issue.1
, pp. 82-88
-
-
Srinivasan, R.1
Vaidehi, V.2
Srivathsan, K.N.3
Ramesh Babu, L.4
Karunagaran, C.5
-
64
-
-
0032621035
-
A review of current routing protocols for ad hoc wireless networks
-
E. Royer, and C.-K. Tob A review of current routing protocols for ad hoc wireless networks IEEE Pers Commun 6(2), 1999 46 55
-
(1999)
IEEE Pers Commun 6(2)
, pp. 46-55
-
-
Royer, E.1
Tob, C.-K.2
-
66
-
-
0018545449
-
How to share a secret
-
A. Shamir How to share a secret Commun ACM 22 11 1979 612 613
-
(1979)
Commun ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
68
-
-
57849130938
-
An elliptic threshold signature framework for k-security in wireless sensor networks
-
Malta; August 31-September 3
-
Sliti M, Hamdi M, Boudriga N. An elliptic threshold signature framework for k-security in wireless sensor networks. In: Proceedings of the 15th IEEE international conference on electronics, circuits, and systems (ICECS08). Malta; August 31-September 3, 2008.
-
(2008)
Proceedings of the 15th IEEE International Conference on Electronics, Circuits, and Systems (ICECS08)
-
-
Sliti, M.1
Hamdi, M.2
Boudriga, N.3
-
70
-
-
33845960920
-
Lattice-based threshold changeability for standard shamir secret-sharing schemes
-
Steinfeld R, Pieprzyk J, Wang H. Lattice-based threshold changeability for standard shamir secret-sharing schemes. In: Advances in Cryptology - ASIACRYPT04, lecture notes in computer science, vol. 3329; 2004. p. 170-86.
-
(2004)
Advances in Cryptology - ASIACRYPT04, Lecture Notes in Computer Science
, vol.3329
, pp. 170-186
-
-
Steinfeld, R.1
Pieprzyk, J.2
Wang, H.3
-
71
-
-
84944048103
-
Unconditionally secure proactive secret sharing scheme with combinatorial structures, SAC99
-
Stinson D, Wei R. Unconditionally secure proactive secret sharing scheme with combinatorial structures, SAC99. In: Lecture notes in computer science, vol. 1758; 1999. p. 200-14.
-
(1999)
Lecture Notes in Computer Science
, vol.1758
, pp. 200-214
-
-
Stinson, D.1
Wei, R.2
-
72
-
-
84906821848
-
Network connectivity in wireless sensor networks: A survey
-
Sultan A, et al. Network connectivity in wireless sensor networks: a survey. In: Proceedings of PGNet; 2009.
-
(2009)
Proceedings of PGNet
-
-
Sultan, A.1
-
73
-
-
0032670844
-
An efficient nonrepudiable threshold proxy signature scheme with known signers
-
H.M. Sun An efficient nonrepudiable threshold proxy signature scheme with known signers Comput Commun 22 8 1999 717 722
-
(1999)
Comput Commun
, vol.22
, Issue.8
, pp. 717-722
-
-
Sun, H.M.1
-
74
-
-
24644491882
-
On the security of some nonrepudiable threshold proxy signature schemes
-
Springer-Verlag
-
Tan Z-W, Liu Z-J, Wang M-S. On the security of some nonrepudiable threshold proxy signature schemes. ISPEC 2005. Lecture notes in computer science, vol. 3439. Springer-Verlag; 2005. p. 374-85.
-
(2005)
ISPEC 2005. Lecture Notes in Computer Science
, vol.3439
, pp. 374-385
-
-
Tan, Z.-W.1
Liu, Z.-J.2
Wang, M.-S.3
-
75
-
-
33845927130
-
Dynamic threshold and cheater resistance for shamir secret sharing scheme
-
Springer-Verlag
-
Tartary C, Wang H. Dynamic threshold and cheater resistance for shamir secret sharing scheme. In: Proceedings of Inscrypt06, LNCS, vol. 4318. Springer-Verlag; 2006. p. 103-17.
-
(2006)
Proceedings of Inscrypt06, LNCS
, vol.4318
, pp. 103-117
-
-
Tartary, C.1
Wang, H.2
-
76
-
-
79959891340
-
Node disjoint multipath routing considering link and node stability protocol: A characteristic evaluation
-
S. Upadhayaya, and C. Gandhi Node disjoint multipath routing considering link and node stability protocol: a characteristic evaluation IJCSI Int J Comput Sci Issues 7 1 2010 18 25
-
(2010)
IJCSI Int J Comput Sci Issues
, vol.7
, Issue.1
, pp. 18-25
-
-
Upadhayaya, S.1
Gandhi, C.2
-
77
-
-
34548364231
-
Distributed relay selection and power control for multiuser cooperative communication networks using buyer/seller game
-
Wang B, Han Z, Liu K. Distributed relay selection and power control for multiuser cooperative communication networks using buyer/seller game. In: IEEE INFOCOM proceedings; 2007. p. 544-52.
-
(2007)
IEEE INFOCOM Proceedings
, pp. 544-552
-
-
Wang, B.1
Han, Z.2
Liu, K.3
-
78
-
-
33645655242
-
Low-cost routing in selfish and rational wireless ad hoc networks
-
W. Wang, and X.Y. Li Low-cost routing in selfish and rational wireless ad hoc networks IEEE Trans Mob Comput 5 2006 596 607
-
(2006)
IEEE Trans Mob Comput
, vol.5
, pp. 596-607
-
-
Wang, W.1
Li, X.Y.2
-
82
-
-
6344258648
-
2HARP: A secure routing protocol to detect failed and selfish nodes in mobile ad hoc networks
-
San Francisco, CA, USA
-
Yau PW., Mitchell CJ. 2HARP: a secure routing protocol to detect failed and selfish nodes in mobile ad hoc networks. In: Proceedings of the 5th world wireless congress. San Francisco, CA, USA; 2004. p. 1-6.
-
(2004)
Proceedings of the 5th World Wireless Congress
, pp. 1-6
-
-
Yau, P.W.1
Mitchell, C.J.2
-
83
-
-
55749099677
-
An efficient anonymous proxy signature scheme with provable security
-
Yong Yu, Chunxiang Xu, Xinyi Huang, and Mu Yi An efficient anonymous proxy signature scheme with provable security Comput Standards Interfaces 31 2 2009 348 353
-
(2009)
Comput Standards Interfaces
, vol.31
, Issue.2
, pp. 348-353
-
-
Yu, Y.1
Xu, C.2
Huang, X.3
Yi, M.4
-
84
-
-
0842289309
-
Diversity in relaying protocols with amplify and forward
-
December
-
Yuksel M., Erkip E. Diversity in relaying protocols with amplify and forward. In: Proceedings of IEEE GLOBECOM, vol. 4; December 2003. p. 2025-9.
-
(2003)
Proceedings of IEEE GLOBECOM
, vol.4
, pp. 2025-2029
-
-
Yuksel, M.1
Erkip, E.2
-
86
-
-
61349084238
-
Competitive resource sharing based on game theory in cooperative relay networks
-
G. Zhang, L. Cong, and K. Yang et al. Competitive resource sharing based on game theory in cooperative relay networks ETRI J 31 1 2009 89 91
-
(2009)
ETRI J
, vol.31
, Issue.1
, pp. 89-91
-
-
Zhang, G.1
Cong, L.2
Yang, K.3
-
87
-
-
80051478463
-
Another efficient proxy signature scheme in the standard model
-
J. Zhang, and J Mao Another efficient proxy signature scheme in the standard model J Inf Sci Eng 27 4 2011 1249 1264
-
(2011)
J Inf Sci Eng
, vol.27
, Issue.4
, pp. 1249-1264
-
-
Zhang, J.1
Mao, J.2
-
89
-
-
61349084238
-
Competitive resource sharing based on game theory in cooperative relay networks
-
L. Zhang, L. Cong, K. Zhao, Yang, and H. Zhang Competitive resource sharing based on game theory in cooperative relay networks ETRI J 31 2009 89 91
-
(2009)
ETRI J
, vol.31
, pp. 89-91
-
-
Zhang, L.1
Cong, L.2
Zhao, K.3
Yang4
Zhang, H.5
-
90
-
-
77954323664
-
Collusion attack resistance and practice-oriented threshold changeable secret sharing schemes
-
Zhang X, He M. Collusion attack resistance and practice-oriented threshold changeable secret sharing schemes. In: Proceedings of AINA10. 2010. p. 745-2.
-
(2010)
Proceedings of AINA10
, pp. 745-752
-
-
Zhang, X.1
He, M.2
-
91
-
-
34547532527
-
A secure incentive protocol for mobile ad hoc networks
-
Y. Zhang, W. Lou, W. Liu, and Y. Fang A secure incentive protocol for mobile ad hoc networks Wirel Netw 13 5 2007 569 582
-
(2007)
Wirel Netw
, vol.13
, Issue.5
, pp. 569-582
-
-
Zhang, Y.1
Lou, W.2
Liu, W.3
Fang, Y.4
-
92
-
-
80051888902
-
Secure monitoring scheme for wireless sensor networks based on identity signcryption
-
C. Zhe, and L. Yuanning Secure monitoring scheme for wireless sensor networks based on identity signcryption Comput Sci Autom Eng 4 2008 309 312
-
(2008)
Comput Sci Autom Eng
, vol.4
, pp. 309-312
-
-
Zhe, C.1
Yuanning, L.2
-
93
-
-
0042933944
-
Sprite: A simple, cheat-proof, credit-based system for mobile ad hoc networks
-
March-April
-
Zhong S, Yang YR, Chen J. Sprite: a simple, cheat-proof, credit-based system for mobile ad hoc networks. In: Proceedings of IEEE Conference INFOCOM03; March-April 2003.
-
(2003)
Proceedings of IEEE Conference INFOCOM03
-
-
Zhong, S.1
Yang, Y.R.2
Chen, J.3
-
94
-
-
32144433522
-
On designing incentive compatible routing and forwarding protocols in wireless ad-hoc networks
-
August
-
Zhong S, Li L, Liu YG, Yang YR. On designing incentive compatible routing and forwarding protocols in wireless ad-hoc networks. In: Proceedings of ACM MobiCom05; August 2005.
-
(2005)
Proceedings of ACM MobiCom05
-
-
Zhong, S.1
Li, L.2
Liu, Y.G.3
Yang, Y.R.4
-
95
-
-
0033357103
-
Securing ad hoc networks
-
L. Zhou, and Z.J. Haas Securing ad hoc networks IEEE Netw Mag 13 6 1999 24 30
-
(1999)
IEEE Netw Mag
, vol.13
, Issue.6
, pp. 24-30
-
-
Zhou, L.1
Haas, Z.J.2
|