Performance analysis of the CONFIDANT protocol
暂无分享,去创建一个
[1] Levente Buttyán,et al. Enforcing service availability in mobile ad-hoc WANs , 2000, MobiHoc.
[2] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[3] Joan Feigenbaum,et al. Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[4] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[5] Birgit Pfitzmann,et al. Trusting Mobile User Devices and Security Modules , 1997, Computer.
[6] Paul Resnick,et al. Reputation systems , 2000, CACM.
[7] J. Broach,et al. The dynamic source routing protocol for mobile ad-hoc networks , 1998 .
[8] J. J. Garcia-Luna-Aceves,et al. Securing distance-vector routing protocols , 1997, Proceedings of SNDSS '97: Internet Society 1997 Symposium on Network and Distributed System Security.
[9] Levente Buttyán,et al. Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks , 2003, Mob. Networks Appl..
[10] R. Lewontin. ‘The Selfish Gene’ , 1977, Nature.
[11] Sandra L. Murphy,et al. Digital signature protection of the OSPF routing protocol , 1996, Proceedings of Internet Society Symposium on Network and Distributed Systems Security.
[12] M. Gerla,et al. GloMoSim: a library for parallel simulation of large-scale wireless networks , 1998, Proceedings. Twelfth Workshop on Parallel and Distributed Simulation PADS '98 (Cat. No.98TB100233).
[13] Ray Jain,et al. The art of computer systems performance analysis - techniques for experimental design, measurement, simulation, and modeling , 1991, Wiley professional computing.
[14] Robin Kravets,et al. Security-aware ad hoc routing for wireless networks , 2001, MobiHoc '01.
[15] Jean-Yves Le Boudec,et al. Nodes bearing grudges: towards routing security, fairness, and robustness in mobile ad hoc networks , 2002, Proceedings 10th Euromicro Workshop on Parallel, Distributed and Network-based Processing.
[16] Frank Stajano,et al. The Resurrecting Duckling , 1999 .
[17] Paul Jones,et al. Secrets and Lies: Digital Security in a Networked World , 2002 .