WiFace: a secure geosocial networking system using WiFi-based multi-hop MANET
暂无分享,去创建一个
Xiang-Yang Li | Ming Gu | Zhiguo Wan | Lan Zhang | Xuan Ding | Xiangyang Li | Xuan Ding | M. Gu | Lan Zhang | Z. Wan
[1] Charles E. Perkins,et al. Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.
[2] Manpreet Singh,et al. Overview of the ORBIT radio grid testbed for evaluation of next-generation wireless network protocols , 2005, IEEE Wireless Communications and Networking Conference, 2005.
[3] Thomas C. Schelling,et al. Dynamic models of segregation , 1971 .
[4] Vincenzo Mancuso,et al. Measurement and Modeling of the Origins of Starvation in Congestion Controlled Mesh Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[5] Adi Shamir,et al. How to expose an eavesdropper , 1984, CACM.
[6] David A. Maltz,et al. Dynamic Source Routing in Ad Hoc Wireless Networks , 1994, Mobidata.
[7] Arjen K. Lenstra,et al. Selecting Cryptographic Key Sizes , 2000, Journal of Cryptology.
[8] Roger Dingledine,et al. The Free Haven Project: Distributed Anonymous Storage Service , 2000, Workshop on Design Issues in Anonymity and Unobservability.
[9] Robert Tappan Morris,et al. Capacity of Ad Hoc wireless networks , 2001, MobiCom '01.
[10] N. Beijar,et al. Understanding Attitudes Towards Mobile Peer-to-Peer Content Sharing Services , 2007, 2007 IEEE International Conference on Portable Information Devices.
[11] Mario Gerla,et al. BlueTorrent: Cooperative Content Sharing for Bluetooth Users , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom'07).
[12] Jitendra Padhye,et al. Comparison of routing metrics for static multi-hop wireless networks , 2004, SIGCOMM '04.
[13] Robert Tappan Morris,et al. Architecture and evaluation of an unplanned 802.11b mesh network , 2005, MobiCom '05.
[14] Jitendra Padhye,et al. Routing in multi-radio, multi-hop wireless mesh networks , 2004, MobiCom '04.
[15] Robert Tappan Morris,et al. a high-throughput path metric for multi-hop wireless routing , 2003, MobiCom '03.
[16] Mario Gerla,et al. BlueTorrent: Cooperative Content Sharing for Bluetooth Users , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom'07).
[17] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[18] Robert Ricci,et al. Mobile Emulab: A Robotic Wireless and Sensor Network Testbed , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[19] David R. Karger,et al. Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM '01.
[20] N. Koblitz. Elliptic curve cryptosystems , 1987 .
[21] Thierry Turletti,et al. BitHoc: A content sharing application for wireless ad hoc networks , 2009, 2009 IEEE International Conference on Pervasive Computing and Communications.
[22] Panganamala Ramana Kumar,et al. RHEINISCH-WESTFÄLISCHE TECHNISCHE HOCHSCHULE AACHEN , 2001 .
[23] Xiang-Yang Li. Multicast Capacity of Wireless Ad Hoc Networks , 2009, IEEE/ACM Transactions on Networking.
[24] T. Schelling. Models of Segregation , 1969 .