Secure Neighbour Discovery: Secure k-Nearest ROUTING AD-HOC Networking Using Diffie-Helman and HIGHEST Connectivity Algorithm
暂无分享,去创建一个
[1] Eylem Ekici,et al. Secure probabilistic location verification in randomly deployed wireless sensor networks , 2008, Ad Hoc Networks.
[2] Eytan Modiano,et al. Capacity and delay tradeoffs for ad hoc mobile networks , 2005, IEEE Trans. Inf. Theory.
[3] Panagiotis Papadimitratos,et al. Towards provable secure neighbor discovery in wireless networks , 2008, FMSE '08.
[4] R. Srikant,et al. Coding Improves the Optimal Delay-Throughput Trade-offs in Mobile Ad-Hoc Networks: Two-Dimensional I.I.D. Mobility Models , 2006, ArXiv.
[5] Srdjan Capkun,et al. Secure positioning in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.
[6] Mani B. Srivastava,et al. Dynamic fine-grained localization in Ad-Hoc networks of sensors , 2001, MobiCom '01.
[7] Xiaoyan Hong,et al. A group mobility model for ad hoc wireless networks , 1999, MSWiM '99.
[8] Srdjan Capkun,et al. GPS-free Positioning in Mobile Ad Hoc Networks , 2001, Proceedings of the 34th Annual Hawaii International Conference on System Sciences.
[9] Santanu Kumar Rath,et al. TACA: Topology Adaptive Clustering Algorithm for Mobile Ad Hoc Network , 2009, ICWN.
[10] Srdjan Capkun,et al. SECTOR: secure tracking of node encounters in multi-hop wireless networks , 2003, SASN '03.
[11] Michele Garetto,et al. Impact of Correlated Mobility on Delay–Throughput Performance in Mobile Ad Hoc Networks , 2011, IEEE/ACM Transactions on Networking.
[12] M. Kumaresan,et al. Enabling high performance computing in cloud computing environments , 2017, 2017 IEEE International Conference on Electrical, Instrumentation and Communication Engineering (ICEICE).
[13] Ness B. Shroff,et al. The Fundamental Capacity-Delay Tradeoff in Large Mobile Ad Hoc Networks , 2004 .
[14] Ness B. Shroff,et al. Delay and Capacity Trade-Offs in Mobile Ad Hoc Networks: A Global Perspective , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[15] David Tse,et al. Mobility increases the capacity of ad-hoc wireless networks , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).
[16] Panagiotis Papadimitratos,et al. A practical secure neighbor verification protocol for wireless sensor networks , 2009, WiSec '09.
[17] Michele Garetto,et al. Restricted Mobility Improves Delay-Throughput Tradeoffs in Mobile Ad Hoc Networks , 2008, IEEE Transactions on Information Theory.
[18] Victor C. M. Leung,et al. Secure Routing for Mobile Ad Hoc Networks , 2006 .
[19] Srdjan Capkun,et al. Secure neighborhood discovery: a fundamental element for mobile ad hoc networking , 2008, IEEE Communications Magazine.
[20] K. Sampath Kumar,et al. Certain Investigation in DNS Stub Network Performance by using Accelerator System , 2017 .
[21] Radha Poovendran,et al. HiRLoc: high-resolution robust localization for wireless sensor networks , 2006, IEEE Journal on Selected Areas in Communications.