The adaptation of security mechanisms for Ad hoc Networks
暂无分享,去创建一个
[1] Olivier Flauzac,et al. Self-Stabilizing Clustering Algorithm for Ad Hoc Networks , 2009, 2009 Fifth International Conference on Wireless and Mobile Communications.
[2] Alessandro Panconesi,et al. Localized protocols for ad hoc clustering and backbone formation: a performance comparison , 2006, IEEE Transactions on Parallel and Distributed Systems.
[3] Peng Wei,et al. A Cluster-Based Multipath Routing for MANET , 2004 .
[4] Lenka Carr-Motyckova,et al. On clustering in ad hoc networks , 2003 .
[5] Tsung-Chuan Huang,et al. A double-manager k-hop clustering algorithm in mobile ad hoc networks , 2004, The Fourth International Conference onComputer and Information Technology, 2004. CIT '04..
[6] Anthony Ephremides,et al. The Architectural Organization of a Mobile Radio Network via a Distributed Algorithm , 1981, IEEE Trans. Commun..
[7] Yueh-Min Huang,et al. A limited flooding scheme for mobile ad hoc networks , 2005, WiMob'2005), IEEE International Conference on Wireless And Mobile Computing, Networking And Communications, 2005..
[8] Mario Gerla,et al. EFFICIENT FLOODING IN AD HOC NETWORKS USING ON-DEMAND (PASSIVE) CLUSTER FORMATION , 2003 .
[9] Diana K. Smetters,et al. Talking to Strangers: Authentication in Ad-Hoc Wireless Networks , 2002, NDSS.
[10] Sajal K. Das,et al. WCA: A Weighted Clustering Algorithm for Mobile Ad Hoc Networks , 2002, Cluster Computing.
[11] Winston Khoon Guan Seah,et al. Mobility-based d-hop clustering algorithm for mobile ad hoc networks , 2004, 2004 IEEE Wireless Communications and Networking Conference (IEEE Cat. No.04TH8733).
[12] Béatrice Paillassa,et al. A Cluster Procedure for the Dynamic Source Routing Protocol in Ad hoc Networks , 2004 .
[13] Mario Gerla,et al. Multicluster, mobile, multimedia radio network , 1995, Wirel. Networks.