-
1
-
-
78649326285
-
VWCA: An efficient clustering algorithm in vehicular ad hoc networks
-
Jan.
-
A. Daeinabi, A. G. P. Rahbar, and A. Khademzadeh, "VWCA: An efficient clustering algorithm in vehicular ad hoc networks," J. Netw. Comput. Appl., vol. 34, no. 1, pp. 207-222, Jan. 2011.
-
(2011)
J. Netw. Comput. Appl.
, vol.34
, Issue.1
, pp. 207-222
-
-
Daeinabi, A.1
Rahbar, A.G.P.2
Khademzadeh, A.3
-
2
-
-
33745300148
-
Cluster-based framework in vehicular ad-hoc networks
-
P. Fan, J. G. Haran, J. Dillenburg, and P. C. Nelson, "Cluster-based framework in vehicular ad-hoc networks," in Proc. 4th Int. Conf. ADHOC-NOW, 2005, pp. 32-42.
-
(2005)
Proc. 4th Int. Conf. ADHOC-NOW
, pp. 32-42
-
-
Fan, P.1
Haran, J.G.2
Dillenburg, J.3
Nelson, P.C.4
-
3
-
-
51349159708
-
Anonymity and security in delay tolerant networks
-
Sep.
-
A. Kate, G. M. Zaverucha, and U. Hengartner, "Anonymity and security in delay tolerant networks," in Proc. 3rd Int. Conf. SecureComm, Sep. 2007, pp. 504-513.
-
(2007)
Proc. 3rd Int. Conf. SecureComm
, pp. 504-513
-
-
Kate, A.1
Zaverucha, G.M.2
Hengartner, U.3
-
4
-
-
1242310099
-
A delay-tolerant network architecture for challenged internets
-
Karlsruhe, Germany
-
K. Fall, "A delay-tolerant network architecture for challenged internets," in Proc. Conf. Appl., Technol., Archit., Protocols Comput. Commun. (SIGCOMM), Karlsruhe, Germany, 2003, pp. 27-34.
-
(2003)
Proc. Conf. Appl., Technol., Archit., Protocols Comput. Commun. (SIGCOMM)
, pp. 27-34
-
-
Fall, K.1
-
5
-
-
84878547961
-
Directional routing and scheduling for green vehicular delay tolerant networks
-
Y. Zeng, K. Xiang, D. Li, and A. V. Vasilakos, "Directional routing and scheduling for green vehicular delay tolerant networks," Wireless Netw., vol. 19, no. 2, pp. 161-173, 2013.
-
(2013)
Wireless Netw.
, vol.19
, Issue.2
, pp. 161-173
-
-
Zeng, Y.1
Xiang, K.2
Li, D.3
Vasilakos, A.V.4
-
6
-
-
78049528434
-
Routing for disruption tolerant networks: Taxonomy and design
-
T. Spyropoulos, R. N. B. Rais, T. Turletti, K. Obraczka, and A. V. Vasilakos, "Routing for disruption tolerant networks: Taxonomy and design," Wireless Netw., vol. 16, no. 8, pp. 2349-2370, 2010.
-
(2010)
Wireless Netw.
, vol.16
, Issue.8
, pp. 2349-2370
-
-
Spyropoulos, T.1
Rais, R.N.B.2
Turletti, T.3
Obraczka, K.4
Vasilakos, A.V.5
-
7
-
-
85051306852
-
-
Boca Raton, FL, USA: CRC Press
-
A. V. Vasilakos, Y. Zhang, and T. Spyropoulos, Delay Tolerant Networks: Protocols and Applications. Boca Raton, FL, USA: CRC Press, 2012.
-
(2012)
Delay Tolerant Networks: Protocols and Applications
-
-
Vasilakos, A.V.1
Zhang, Y.2
Spyropoulos, T.3
-
8
-
-
84867314179
-
Towards autonomous vehicular clouds
-
S. Olariu, M. Eltoweissy, and M. Younis, "Towards autonomous vehicular clouds," ICST Trans. Mobile Commun. Appl., vol. 11, no. 7, pp. 1-11, 2011.
-
(2011)
ICST Trans. Mobile Commun. Appl.
, vol.11
, Issue.7
, pp. 1-11
-
-
Olariu, S.1
Eltoweissy, M.2
Younis, M.3
-
9
-
-
70350238158
-
SMART: A secure multilayer credit-based incentive scheme for delay-tolerant networks
-
Oct.
-
H. Zhu, X. Lin, R. Lu, Y. Fan, and X. Shen, "SMART: A secure multilayer credit-based incentive scheme for delay-tolerant networks," IEEE Trans. Veh. Technol., vol. 58, no. 8, pp. 4628-4639, Oct. 2009.
-
(2009)
IEEE Trans. Veh. Technol.
, vol.58
, Issue.8
, pp. 4628-4639
-
-
Zhu, H.1
Lin, X.2
Lu, R.3
Fan, Y.4
Shen, X.5
-
10
-
-
77951292577
-
Pi: A practical incentive protocol for delay tolerant networks
-
Apr.
-
R. Lu, X. Lin, H. Zhu, X. Shen, and B. Preiss, "Pi: A practical incentive protocol for delay tolerant networks," IEEE Trans. Wireless Commun., vol. 9, no. 4, pp. 1483-1492, Apr. 2010.
-
(2010)
IEEE Trans. Wireless Commun.
, vol.9
, Issue.4
, pp. 1483-1492
-
-
Lu, R.1
Lin, X.2
Zhu, H.3
Shen, X.4
Preiss, B.5
-
11
-
-
84896317870
-
A survey on vehicular cloud computing
-
Apr.
-
M. Whaiduzzaman, M. Sookhak, A. Gani, and R. Buyya, "A survey on vehicular cloud computing," J. Netw. Comput. Appl., vol. 40, pp. 325-344, Apr. 2014.
-
(2014)
J. Netw. Comput. Appl.
, vol.40
, pp. 325-344
-
-
Whaiduzzaman, M.1
Sookhak, M.2
Gani, A.3
Buyya, R.4
-
13
-
-
56349132859
-
Ordered multisignatures and identity-based sequential aggregate signatures, with applications to secure routing
-
A. Boldyreva, C. Gentry, A. O'Neill, and D. H. Yum, "Ordered multisignatures and identity-based sequential aggregate signatures, with applications to secure routing," in Proc. 14th ACM Conf. CCS, 2007, pp. 276-285.
-
(2007)
Proc. 14th ACM Conf. CCS
, pp. 276-285
-
-
Boldyreva, A.1
Gentry, C.2
O'neill, A.3
Yum, D.H.4
-
14
-
-
1542593353
-
Authentication and authenticated key exchanges
-
W. Diffie, P. C. Van Oorschot, and M. J. Wiener, "Authentication and authenticated key exchanges," Designs, Codes, Cryptogr., vol. 2, no. 2, pp. 107-125, 1992.
-
(1992)
Designs, Codes, Cryptogr.
, vol.2
, Issue.2
, pp. 107-125
-
-
Diffie, W.1
Van Oorschot, P.C.2
Wiener, M.J.3
-
16
-
-
79960870810
-
STAP: A social-tier-assisted packet forwarding protocol for achieving receiver-location privacy preservation in VANETs
-
Apr.
-
X. Lin, R. Lu, X. Liang, and X. Shen, "STAP: A social-tier-assisted packet forwarding protocol for achieving receiver-location privacy preservation in VANETs," in Proc. IEEE INFOCOM, Apr. 2011, pp. 2147-2155.
-
(2011)
Proc. IEEE INFOCOM
, pp. 2147-2155
-
-
Lin, X.1
Lu, R.2
Liang, X.3
Shen, X.4
-
17
-
-
36749076982
-
GSIS: A secure and privacypreserving protocol for vehicular communications
-
Nov.
-
X. Lin, X. Sun, P.-H. Ho, and X. Shen, "GSIS: A secure and privacypreserving protocol for vehicular communications," IEEE Trans. Veh. Technol., vol. 56, no. 6, pp. 3442-3456, Nov. 2007.
-
(2007)
IEEE Trans. Veh. Technol.
, vol.56
, Issue.6
, pp. 3442-3456
-
-
Lin, X.1
Sun, X.2
Ho, P.-H.3
Shen, X.4
-
18
-
-
79953785474
-
GRS: The green, reliability, and security of emerging machine to machine communications
-
Apr.
-
R. Lu, X. Li, X. Liang, X. Lin, and X. Shen, "GRS: The green, reliability, and security of emerging machine to machine communications," IEEE Commun. Mag., vol. 49, no. 4, pp. 28-35, Apr. 2011.
-
(2011)
IEEE Commun. Mag.
, vol.49
, Issue.4
, pp. 28-35
-
-
Lu, R.1
Li, X.2
Liang, X.3
Lin, X.4
Shen, X.5
-
19
-
-
77953313061
-
SPRING: A social-based privacypreserving packet forwarding protocol for vehicular delay tolerant networks
-
Mar.
-
R. Lu, X. Lin, and X. Shen, "SPRING: A social-based privacypreserving packet forwarding protocol for vehicular delay tolerant networks," in Proc. IEEE INFOCOM, Mar. 2010, pp. 1-9.
-
(2010)
Proc. IEEE INFOCOM
, pp. 1-9
-
-
Lu, R.1
Lin, X.2
Shen, X.3
-
20
-
-
84928961834
-
PSMPA: Patient self-controllable and multi-level privacy-preserving cooperative authentication in distributed m-healthcare cloud computing system
-
to be published
-
J. Zhou, X. Lin, X. Dong, and Z. Cao, "PSMPA: Patient self-controllable and multi-level privacy-preserving cooperative authentication in distributed m-healthcare cloud computing system," IEEE Trans. Paralell Distrib. Syst., to be published.
-
IEEE Trans. Paralell Distrib. Syst.
-
-
Zhou, J.1
Lin, X.2
Dong, X.3
Cao, Z.4
-
21
-
-
34548211355
-
A fine-grained reputation system for reliable service selection in peer-to-peer networks
-
Aug.
-
Y. Zhang and Y. Fang, "A fine-grained reputation system for reliable service selection in peer-to-peer networks," IEEE Trans. Parallel Distrb. Syst., vol. 18, no. 8, pp. 1134-1145, Aug. 2007.
-
(2007)
IEEE Trans. Parallel Distrb. Syst.
, vol.18
, Issue.8
, pp. 1134-1145
-
-
Zhang, Y.1
Fang, Y.2
-
22
-
-
34547532527
-
A secure incentive protocol for mobile ad hoc networks
-
Oct.
-
Y. Zhang, W. Lou, W. Liu, and Y. Fang, "A secure incentive protocol for mobile ad hoc networks," Wireless Netw., vol. 13, no. 5, pp. 569-582, Oct. 2007.
-
(2007)
Wireless Netw.
, vol.13
, Issue.5
, pp. 569-582
-
-
Zhang, Y.1
Lou, W.2
Liu, W.3
Fang, Y.4
-
23
-
-
34548493227
-
On designing incentivecompatible routing and forwarding protocols in wireless ad-hoc networks: An integrated approach using game theoretic and cryptographic techniques
-
Dec.
-
S. Zhong, L. E. Li, Y. G. Liu, and Y. R. Yang, "On designing incentivecompatible routing and forwarding protocols in wireless ad-hoc networks: An integrated approach using game theoretic and cryptographic techniques," Wireless Netw., vol. 13, no. 6, pp. 799-816, Dec. 2007.
-
(2007)
Wireless Netw.
, vol.13
, Issue.6
, pp. 799-816
-
-
Zhong, S.1
Li, L.E.2
Liu, Y.G.3
Yang, Y.R.4
-
24
-
-
67249083783
-
Incentive-aware routing in DTNs
-
Oct.
-
U. Shevade, H. H. Song, L. Qiu, and Y. Zhang, "Incentive-aware routing in DTNs," in Proc. IEEE ICNP, Orlando, FL, USA, Oct. 2008, pp. 238-247.
-
(2008)
Proc. IEEE ICNP, Orlando, FL, USA
, pp. 238-247
-
-
Shevade, U.1
Song, H.H.2
Qiu, L.3
Zhang, Y.4
-
25
-
-
79960871045
-
C4: A new paradigm for providing incentives in multi-hop wireless networks
-
Apr.
-
C. Zhang, X. Zhu, Y. Song, and Y. Fang, "C4: A new paradigm for providing incentives in multi-hop wireless networks," in Proc. IEEE INFOCOM, Shanghai, China, Apr. 2011, pp. 918-926.
-
(2011)
Proc. IEEE INFOCOM, Shanghai, China
, pp. 918-926
-
-
Zhang, C.1
Zhu, X.2
Song, Y.3
Fang, Y.4
-
26
-
-
84884572913
-
Securing m-healthcare social networks: Challenges, countermeasures and future directions
-
Aug.
-
J. Zhou, Z. Cao, X. Dong, X. Lin, and A. V. Vasilakos, "Securing m-healthcare social networks: Challenges, countermeasures and future directions," IEEE Wireless Commun., vol. 20, no. 4, pp. 12-21, Aug. 2013.
-
(2013)
IEEE Wireless Commun.
, vol.20
, Issue.4
, pp. 12-21
-
-
Zhou, J.1
Cao, Z.2
Dong, X.3
Lin, X.4
Vasilakos, A.V.5
-
27
-
-
38149054118
-
-
[Online]. Available
-
B. Lynn. PBC Library. [Online]. Available: http://crypto. stanford.edu/pbc/
-
PBC Library
-
-
Lynn, B.1
-
28
-
-
84877645780
-
TIS: A threshold incentive scheme for secure and reliable data forwarding in vehicular delay tolerant networks
-
Dec.
-
J. Zhou and Z. Cao, "TIS: A threshold incentive scheme for secure and reliable data forwarding in vehicular delay tolerant networks," in Proc. IEEE GLOBECOM, Dec. 2012, pp. 985-990.
-
(2012)
Proc. IEEE GLOBECOM
, pp. 985-990
-
-
Zhou, J.1
Cao, Z.2
-
30
-
-
84925258369
-
BDK: Secure and efficient biometric based deterministic key agreement in wireless body area networks
-
Boston, MA, USA, Sep./Oct.
-
J. Zhou, Z. Cao, and X. Dong, "BDK: Secure and efficient biometric based deterministic key agreement in wireless body area networks," in Proc. 8th Int. Conf. Body Area Netw. (BodyNets), Boston, MA, USA, Sep./Oct. 2013, pp. 488-494.
-
(2013)
Proc. 8th Int. Conf. Body Area Netw. (BodyNets)
, pp. 488-494
-
-
Zhou, J.1
Cao, Z.2
Dong, X.3
-
31
-
-
84857752323
-
Delegatable homomorphic encryption with applications to secure outsourcing of computation
-
M. Barbosa and P. Farshim, "Delegatable homomorphic encryption with applications to secure outsourcing of computation," in Proc. 12th Conf. CT-RSA, 2012, pp. 296-312.
-
(2012)
Proc. 12th Conf. CT-RSA
, pp. 296-312
-
-
Barbosa, M.1
Farshim, P.2
-
32
-
-
84869379879
-
Publicly verifiable delegation of large polynomials and matrix computations, with applications
-
D. Fiore and R. Gennaro, "Publicly verifiable delegation of large polynomials and matrix computations, with applications," in Proc. ACM Conf. Comput. Commun. Secur., 2012, pp. 501-512.
-
(2012)
Proc. ACM Conf. Comput. Commun. Secur.
, pp. 501-512
-
-
Fiore, D.1
Gennaro, R.2
-
33
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
P. Paillier, "Public-key cryptosystems based on composite degree residuosity classes," in Proc. 17th EUROCRYPT, 1999, pp. 223-238.
-
(1999)
Proc. 17th EUROCRYPT
, pp. 223-238
-
-
Paillier, P.1
-
34
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
Boston, MA, USA, Aug.
-
S. Marti, T. J. Giuli, K. Lai, and M. Baker, "Mitigating routing misbehavior in mobile ad hoc networks," in Proc. 6th Annu. Int. Conf. MobiCom, Boston, MA, USA, Aug. 2000, pp. 255-265.
-
(2000)
Proc. 6th Annu. Int. Conf. MobiCom
, pp. 255-265
-
-
Marti, S.1
Giuli, T.J.2
Lai, K.3
Baker, M.4
-
35
-
-
40749113163
-
Efficient routing in intermittently connected mobile networks: The multiple-copy case
-
Feb.
-
T. Spyropoulos, K. Psounis, and C. S. Raghavendra, "Efficient routing in intermittently connected mobile networks: The multiple-copy case," IEEE/ACM Trans. Netw., vol. 16, no. 1, pp. 77-90, Feb. 2008.
-
(2008)
IEEE/ACM Trans. Netw.
, vol.16
, Issue.1
, pp. 77-90
-
-
Spyropoulos, T.1
Psounis, K.2
Raghavendra, C.S.3
-
36
-
-
84900653663
-
A probabilistic misbehavior detection scheme towards efficient trust establishment in delay-tolerant networks
-
Jan.
-
H. Zhu, S. Du, Z. Gao, M. Dong, and Z. Cao, "A probabilistic misbehavior detection scheme towards efficient trust establishment in delay-tolerant networks," IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 1, pp. 22-32, Jan. 2014.
-
(2014)
IEEE Trans. Parallel Distrib. Syst.
, vol.25
, Issue.1
, pp. 22-32
-
-
Zhu, H.1
Du, S.2
Gao, Z.3
Dong, M.4
Cao, Z.5
-
37
-
-
84902197946
-
LSR: Mitigating zero-day sybil vulnerability in privacypreserving vehicular peer-to-peer networks
-
Sep.
-
X. Lin, "LSR: Mitigating zero-day sybil vulnerability in privacypreserving vehicular peer-to-peer networks," IEEE J. Sel. Areas Commun., vol. 31, no. 9, pp. 237-246, Sep. 2013.
-
(2013)
IEEE J. Sel. Areas Commun.
, vol.31
, Issue.9
, pp. 237-246
-
-
Lin, X.1
|