暂无分享,去创建一个
[1] Hans-Joachim Hof,et al. A cluster-based security architecture for ad hoc networks , 2004, IEEE INFOCOM 2004.
[2] Tim Roughgarden,et al. Algorithmic game theory , 2010, Commun. ACM.
[3] Stanley Reiter,et al. Designing Economic Mechanisms , 2006 .
[4] Prabir Bhattacharya,et al. This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. IEEE TRANSACTIONS ON DEPEDABLE AND SECURE COMPUTING 1 Mechanism Design-Based Secure Leader Elec , 2022 .
[5] Farooq Anjum,et al. Security for Wireless Ad Hoc Networks , 2007 .
[6] Refik Molva,et al. Analysis of coalition formation and cooperation strategies in mobile ad hoc networks , 2005, Ad Hoc Networks.
[7] Prabir Bhattacharya,et al. A Mechanism Design-Based Multi-Leader Election Scheme for Intrusion Detection in MANET , 2008, 2008 IEEE Wireless Communications and Networking Conference.
[8] David C. Parkes,et al. Specification faithfulness in networks with rational nodes , 2004, PODC '04.
[9] Jie Wu,et al. A Survey on Intrusion Detection in Mobile Ad Hoc Networks , 2007 .
[10] Klara Nahrstedt,et al. iPass: an incentive compatible auction scheme to enable packet forwarding service in MANET , 2004, 24th International Conference on Distributed Computing Systems, 2004. Proceedings..
[11] Peng Ning,et al. Secure Distributed Cluster Formation in Wireless Sensor Networks , 2006, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06).