-
1
-
-
80052124479
-
Bubble rap: Social-based forwarding in delay tolerant networks
-
Nov
-
P. Hui, J. Crowcroft, and E. Yoneki, "BUBBLE rap: Social-based forwarding in delay tolerant networks, " IEEE Trans. Mobile Comput., vol. 10, no. 11, pp. 1576-1589, Nov. 2011.
-
(2011)
IEEE Trans. Mobile Comput
, vol.10
, Issue.11
, pp. 1576-1589
-
-
Hui, P.1
Crowcroft, J.2
Yoneki, E.3
-
2
-
-
84860520346
-
Collaborative calibration and sensor placement for mobile sensor networks
-
Apr
-
Y. Xiang, L. S. Bai, R. Piedrahita, R. P. Dick, Q. Lv, M. P. Hannigan, and L. Shang, "Collaborative calibration and sensor placement for mobile sensor networks, " in Proc. Int. Conf. Inform. Process. Sensor Netw., Apr. 2012, pp. 73-84.
-
(2012)
Proc. Int. Conf. Inform. Process. Sensor Netw
, pp. 73-84
-
-
Xiang, Y.1
Bai, L.S.2
Piedrahita, R.3
Dick, R.P.4
Lv, Q.5
Hannigan, M.P.6
Shang, L.7
-
3
-
-
84936753093
-
Sustaining telecommunications capability and capacity during acute phase of disasters and disaster responses
-
May
-
P. Gardner-Stephen, "Sustaining telecommunications capability and capacity during acute phase of disasters and disaster responses, " Prehospital and Disaster Medicine, vol. 26, pp. s94-s95, May 2011.
-
(2011)
Prehospital and Disaster Medicine
, vol.26
, pp. s94-s95
-
-
Gardner-Stephen, P.1
-
5
-
-
3042785862
-
The sybil attack in sensor networks: Analysis & defenses
-
Apr
-
J. Newsome, E. Shi, D. Song, and A. Perrig, "The Sybil attack in sensor networks: Analysis & defenses, " in Proc. Int. Conf. Inform. Process. Sensor Netw., Apr. 2004, pp. 259-268.
-
(2004)
Proc. Int. Conf. Inform. Process. Sensor Netw
, pp. 259-268
-
-
Newsome, J.1
Shi, E.2
Song, D.3
Perrig, A.4
-
6
-
-
44649144215
-
A survey of solutions to the sybil attack
-
Univ. Massachusetts Amherst, Amherst, MA, USA, Tech. Rep. 2006-052, Oct
-
B. N. Levine, C. Shields, and N. B. Margolin, "A survey of solutions to the Sybil attack, " Dept. Comput. Sci., Univ. Massachusetts Amherst, Amherst, MA, USA, Tech. Rep. 2006-052, Oct. 2006.
-
(2006)
Dept. Comput. Sci
-
-
Levine, B.N.1
Shields, C.2
Margolin, N.B.3
-
7
-
-
33846626862
-
Multiple-key cryptography based distributed certificate authority in mobile ad-hoc networks
-
Nov
-
H. Zhou, M. Mutka, and L. Ni, "Multiple-key cryptographybased distributed certificate authority in mobile ad-hoc networks, " in Proc. Global Telecommun. Conf., vol. 3, Nov. 2005, pp. 1681-1685.
-
(2005)
Proc. Global Telecommun. Conf
, vol.3
, pp. 1681-1685
-
-
Zhou, H.1
Mutka, M.2
Ni, L.3
-
8
-
-
15244360279
-
An efficient key predistribution scheme for ad hoc network security
-
Mar
-
M. Ramkumar, and N. Memon, "An efficient key predistribution scheme for ad hoc network security, " IEEE J. Select. Areas Commun., vol. 23, no. 3, pp. 611-621, Mar. 2005.
-
(2005)
IEEE J. Select. Areas Commun
, vol.23
, Issue.3
, pp. 611-621
-
-
Ramkumar, M.1
Memon, N.2
-
9
-
-
85027289714
-
Computational puzzles as sybil defenses
-
Sep
-
N. Borisov, "Computational puzzles as Sybil defenses, " in Proc. Int. Conf. Peer-to-Peer Comput., Sep. 2006, pp. 171-176.
-
(2006)
Proc. Int. Conf. Peer-to-Peer Comput
, pp. 171-176
-
-
Borisov, N.1
-
10
-
-
84869457691
-
Sybil control: Practical sybil defense with computational puzzles
-
Oct
-
F. Li, P. Mittal, M. Caesar, and N. Borisov, "Sybil Control: Practical Sybil defense with computational puzzles, " in Proc. Workshop Scalable Trusted Comput., Oct. 2012, pp. 67-78.
-
(2012)
Proc. Workshop Scalable Trusted Comput
, pp. 67-78
-
-
Li, F.1
Mittal, P.2
Caesar, M.3
Borisov, N.4
-
11
-
-
33750285481
-
Sybil guard: Defending against sybil attacks via social networks
-
Sep
-
H. Yu, M. Kaminsky, P. B. Gibbons, and A. Flaxman, "SybilGuard: Defending against Sybil attacks via social networks, " in Proc. SIGCOMM Comput. Commun. Review, Sep. 2006, pp. 267-278.
-
(2006)
Proc. SIGCOMM Comput. Commun. Review
, pp. 267-278
-
-
Yu, H.1
Kaminsky, M.2
Gibbons, P.B.3
Flaxman, A.4
-
12
-
-
45749116664
-
Sybillimit: A nearoptimal social network defense against sybil attacks
-
May
-
H. Yu, P. Gibbons, M. Kaminsky, and F. Xiao, "SybilLimit: A nearoptimal social network defense against Sybil attacks, " in Proc. Symp. Security Privacy, May 2008, pp. 3-17.
-
(2008)
Proc. Symp. Security Privacy
, pp. 3-17
-
-
Yu, H.1
Gibbons, P.2
Kaminsky, M.3
Xiao, F.4
-
14
-
-
11244249378
-
Practical robust localization over large-scale 802.11 wireless networks
-
Sep
-
A. Haeberlen, E. Flannery, A. M. Ladd, A. Rudys, D. S. Wallach, and L. E. Kavraki, "Practical robust localization over large-scale 802.11 wireless networks, " in Proc. Int. Conf. Mobile Comput. Netw., Sep. 2004, pp. 70-84.
-
(2004)
Proc. Int. Conf. Mobile Comput. Netw
, pp. 70-84
-
-
Haeberlen, A.1
Flannery, E.2
Ladd, A.M.3
Rudys, A.4
Wallach, D.S.5
Kavraki, L.E.6
-
15
-
-
69749083720
-
Channel-based detection of sybil attacks in wireless networks
-
Sep
-
L. Xiao, L. J. Greenstein, N. B. Mandayam, and W. Trappe, "Channel-based detection of Sybil attacks in wireless networks, " IEEE Trans. Inform. Forensics Security, vol. 4, no. 3, pp. 492-503, Sep. 2009.
-
(2009)
IEEE Trans. Inform. Forensics Security
, vol.4
, Issue.3
, pp. 492-503
-
-
Xiao, L.1
Greenstein, L.J.2
Mandayam, N.B.3
Trappe, W.4
-
16
-
-
34247324807
-
Detecting identity-based attacks in wireless networks using signalprints
-
Sep
-
D. B. Faria and D. R. Cheriton, "Detecting identity-based attacks in wireless networks using signalprints, " in Proc. Workshop Wireless Security, Sep. 2006, pp. 43-52.
-
(2006)
Proc. Workshop Wireless Security
, pp. 43-52
-
-
Faria, D.B.1
Cheriton, D.R.2
-
17
-
-
33845926634
-
An rssi-based scheme for sybil attack detection in wireless sensor networks
-
Jun
-
M. Demirbas and Y. Song, "An RSSI-based scheme for Sybil attack detection in wireless sensor networks, " in Proc. Int. Symp. World Wireless, Mobile, Multimedia, Jun. 2006, pp. 564-570.
-
(2006)
Proc. Int. Symp. World Wireless, Mobile, Multimedia
, pp. 564-570
-
-
Demirbas, M.1
Song, Y.2
-
18
-
-
77953789262
-
Detecting and localizing identity-based attacks in wireless and sensor networks
-
Jun
-
Y. Chen, J. Yang, W. Trappe, and R. P. Martin, "Detecting and localizing identity-based attacks in wireless and sensor networks, " IEEE Trans. Veh. Technol., vol. 5, no. 5, pp. 2418-2434, Jun. 2010.
-
(2010)
IEEE Trans. Veh. Technol
, vol.5
, Issue.5
, pp. 2418-2434
-
-
Chen, Y.1
Yang, J.2
Trappe, W.3
Martin, R.P.4
-
19
-
-
33750343693
-
Peer identification in wireless and sensor networks using signal properties
-
Nov
-
T. Suen and A. Yasinsac, "Peer identification in wireless and sensor networks using signal properties, " in Proc. Int. Conf. Mobile Ad Hoc Sensor Syst., Nov. 2005, pp. 826-833.
-
(2005)
Proc. Int. Conf. Mobile Ad Hoc Sensor Syst
, pp. 826-833
-
-
Suen, T.1
Yasinsac, A.2
-
20
-
-
60349099898
-
Detecting the sybil attack cooperatively in wireless sensor networks
-
Dec
-
S. Lv, X. Wang, X. Zhao, and X. Zhou, "Detecting the Sybil attack cooperatively in wireless sensor networks, " in Proc. Int. Conf. Comput. Intell. Security, Dec. 2008, pp. 442-446.
-
(2008)
Proc. Int. Conf. Comput. Intell. Security
, pp. 442-446
-
-
Lv, S.1
Wang, X.2
Zhao, X.3
Zhou, X.4
-
21
-
-
70349947496
-
Sybil nodes detection based on received strength variations within vanet
-
Jul
-
M. S. Bouassida, G. Guette, M. Shawky, and B. Ducourthial, "Sybil nodes detection based on received strength variations within VANET, " Int. J. Netw. Security, vol. 9, no. 1, pp. 22-33, Jul. 2009.
-
(2009)
Int. J. Netw. Security
, vol.9
, Issue.1
, pp. 22-33
-
-
Bouassida, M.S.1
Guette, G.2
Shawky, M.3
Ducourthial, B.4
-
22
-
-
34247339387
-
Securing wireless systems via lower layer enforcements
-
Sep
-
Z. Li, W. Xu, R. Miller, and W. Trappe, "Securing wireless systems via lower layer enforcements, " in Proc. Workshop Wireless Security, Sep. 2006, pp. 33-42.
-
(2006)
Proc. Workshop Wireless Security
, pp. 33-42
-
-
Li, Z.1
Xu, W.2
Miller, R.3
Trappe, W.4
-
23
-
-
0038343420
-
From theory to practice: An overview of MIMO space-time coded wireless systems
-
Apr
-
D. Gesbert, M. Shafi, D. Shiu, P. J. Smith, and A. Naguib., "From theory to practice: An overview of MIMO space-time coded wireless systems, " IEEE J. Select. Areas Commun., vol. 21, no. 3, pp. 281-302, Apr. 2003.
-
(2003)
IEEE J. Select. Areas Commun
, vol.21
, Issue.3
, pp. 281-302
-
-
Gesbert, D.1
Shafi, M.2
Shiu, D.3
Smith, P.J.4
Naguib, A.5
-
24
-
-
84952352870
-
Extending channel comparison based sybil detection to MIMO systems
-
Univ. of Michigan, Ann Arbor, MI, USA Tech. Rep. CSETR-, Nov
-
Y. Liu, D. R. Bild, and R. P. Dick, "Extending channel comparison based Sybil detection to MIMO systems, " Dept. Elect. Eng. Comput. Sci., Univ. of Michigan, Ann Arbor, MI, USA Tech. Rep. CSETR- 584-13, Nov. 2013.
-
(2013)
Dept. Elect. Eng. Comput. Sci
, pp. 584-613
-
-
Liu, Y.1
Bild, D.R.2
Dick, R.P.3
-
25
-
-
85033516322
-
Statistical modeling of the indoor radio propagation channel-part II
-
May
-
H. Hashemi, D. Lee, and D. Ehman, "Statistical modeling of the indoor radio propagation channel-Part II, " in Proc. Veh. Technol. Conf., May 1992, pp. 839-843.
-
(1992)
Proc. Veh. Technol. Conf.
, pp. 839-843
-
-
Hashemi, H.1
Lee, D.2
Ehman, D.3
-
26
-
-
0026154174
-
Statistical channel impulse response models for factory and open plan building radio communication system design
-
May
-
T. S. Rappaport, S. Y. Seidel, and K. Takamizawa, "Statistical channel impulse response models for factory and open plan building radio communication system design, " IEEE Trans. Commun., vol. 39, no. 5, pp. 794-806, May 1991.
-
(1991)
IEEE Trans. Commun
, vol.39
, Issue.5
, pp. 794-806
-
-
Rappaport, T.S.1
Seidel, S.Y.2
Takamizawa, K.3
|