Computer networks (3rd ed.)
GloMoSim: a library for parallel simulation of large-scale wireless networks
PADS '98 Proceedings of the twelfth workshop on Parallel and distributed simulation
Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Key Agreement in Dynamic Peer Groups
IEEE Transactions on Parallel and Distributed Systems
Geography-informed energy conservation for Ad Hoc routing
Proceedings of the 7th annual international conference on Mobile computing and networking
The quest for security in mobile ad hoc networks
MobiHoc '01 Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing
Performance analysis of the CONFIDANT protocol
Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing
Enforcing service availability in mobile ad-hoc WANs
MobiHoc '00 Proceedings of the 1st ACM international symposium on Mobile ad hoc networking & computing
Self-organized network-layer security in mobile ad hoc networks
WiSE '02 Proceedings of the 1st ACM workshop on Wireless security
An on-demand secure routing protocol resilient to byzantine failures
WiSE '02 Proceedings of the 1st ACM workshop on Wireless security
Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks
Proceedings of the IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security: Advanced Communications and Multimedia Security
A charging and rewarding scheme for packet forwarding in multi-hop cellular networks
Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing
A Formal Analysis of Syverson's Rational Exchange Protocol
CSFW '02 Proceedings of the 15th IEEE workshop on Computer Security Foundations
SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks
WMCSA '02 Proceedings of the Fourth IEEE Workshop on Mobile Computing Systems and Applications
Proceedings of the 9th annual international conference on Mobile computing and networking
Trust evaluation in ad-hoc networks
Proceedings of the 3rd ACM workshop on Wireless security
Truthful multicast routing in selfish wireless networks
Proceedings of the 10th annual international conference on Mobile computing and networking
A secure ad-hoc routing approach using localized self-healing communities
Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing
Nodes bearing grudges: towards routing security, fairness, and robustness in mobile ad hoc networks
EUROMICRO-PDP'02 Proceedings of the 10th Euromicro conference on Parallel, distributed and network-based processing
Design challenges for energy-constrained ad hoc wireless networks
IEEE Wireless Communications
Energy concerns in wireless networks
IEEE Wireless Communications
IEEE Network: The Magazine of Global Internetworking
Multi-state reliability and message time delay in wireless sensor networks
International Journal of Wireless and Mobile Computing
A novel cooperative relay scheme employing fountain codes and rotated constellations
International Journal of Wireless and Mobile Computing
Hi-index | 0.00 |
Security of various group-oriented applications for mobile ad-hoc groups requires a group secret shared between all participants. Contributory Group Key Agreement (CGKA) protocols can be used in mobile ad-hoc scenarios due to the ...