Using predictable mobility patterns to support scalable and secure MANETs of handheld devices
暂无分享,去创建一个
[1] Injong Rhee,et al. On the levy-walk nature of human mobility , 2011, TNET.
[2] Panganamala Ramana Kumar,et al. Scaling Laws for Ad Hoc Wireless Networks: An Information Theoretic Approach , 2006, Found. Trends Netw..
[3] Kang G. Shin,et al. Internet routing resilience to failures: analysis and implications , 2007, CoNEXT '07.
[4] Brad Karp,et al. GPSR: greedy perimeter stateless routing for wireless networks , 2000, MobiCom '00.
[5] Pierangela Samarati,et al. Location privacy in pervasive computing , 2008 .
[6] Himabindu Pucha,et al. Performance comparison of scalable location services for geographic ad hoc routing , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[7] Corinna Cortes,et al. Signature-Based Methods for Data Streams , 2001, Data Mining and Knowledge Discovery.
[8] Murat Demirbas,et al. An RSSI-based scheme for sybil attack detection in wireless sensor networks , 2006, 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks(WoWMoM'06).
[9] Eryk Dutkiewicz,et al. A review of routing protocols for mobile ad hoc networks , 2004, Ad Hoc Networks.
[10] Albert-László Barabási,et al. Understanding individual human mobility patterns , 2008, Nature.
[11] Robbert van Renesse,et al. Scalable Wireless Ad Hoc Network Simulation , 2005, Handbook on Theoretical and Algorithmic Aspects of Sensor, Ad Hoc Wireless, and Peer-to-Peer Networks.
[12] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[13] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[14] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.