Secure Incentives to Cooperate for Wireless Networks
暂无分享,去创建一个
[1] Levente Buttyán,et al. Nash equilibria of packet forwarding strategies in wireless ad hoc networks , 2006, IEEE Transactions on Mobile Computing.
[2] Marco Conti,et al. Mesh networks: commodity multihop ad hoc networks , 2005, IEEE Communications Magazine.
[3] Leonard Kleinrock,et al. Spatial TDMA: A Collision-Free Multihop Channel Access Protocol , 1985, IEEE Trans. Commun..
[4] Yigal Bejerano. Efficient integration of multihop wireless and wired networks with QoS constraints , 2004, IEEE/ACM Transactions on Networking.
[5] Ian F. Akyildiz,et al. Wireless mesh networks: a survey , 2005, Comput. Networks.
[6] J.-Y. Le Boudec,et al. Toward self-organized mobile ad hoc networks: the terminodes project , 2001, IEEE Commun. Mag..
[7] Paramvir Bahl,et al. Secure wireless Internet access in public places , 2001, ICC 2001. IEEE International Conference on Communications. Conference Record (Cat. No.01CH37240).
[8] Ahmed Helmy,et al. IMPORTANT: a framework to systematically analyze the Impact of Mobility on Performance of Routing Protocols for Adhoc Networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[9] Pradeep K. Khosla,et al. SWATT: softWare-based attestation for embedded devices , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[10] Markus Jakobsson,et al. Node cooperation in hybrid ad hoc networks , 2006 .
[11] Mihir Bellare,et al. The Exact Security of Digital Signatures - HOw to Sign with RSA and Rabin , 1996, EUROCRYPT.
[12] Panagiotis Papadimitratos,et al. Secure Routing for Mobile Ad Hoc Networks , 2002 .
[13] Edward W. Knightly,et al. End-to-end performance and fairness in multihop wireless backhaul networks , 2004, MobiCom '04.
[14] Yih-Chun Hu,et al. A survey of secure wireless ad hoc routing , 2004, IEEE Security & Privacy Magazine.
[15] J. Wooders,et al. Reputation in Auctions: Theory, and Evidence from Ebay , 2006 .
[16] Antonio Pescapè,et al. Experimental evaluation and characterization of the magnets wireless backbone , 2006, WINTECH.
[17] Markus Jakobsson,et al. Fuelling WiFi deployment: A reputation-based solution , 2004 .
[18] David A. Maltz,et al. Dynamic Source Routing in Ad Hoc Wireless Networks , 1994, Mobidata.
[19] Yih-Chun Hu,et al. SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks , 2002, Proceedings Fourth IEEE Workshop on Mobile Computing Systems and Applications.
[20] Paramvir Bahl,et al. PAWNs: Satisfying the need for ubiquitos secure connectivity and location services , 2002, IEEE Wireless Communications.
[21] Markus Jakobsson,et al. Reputation-based Wi-Fi deployment protocols and security analysis , 2004, WMASH '04.
[22] Tracy Camp,et al. A survey of mobility models for ad hoc network research , 2002, Wirel. Commun. Mob. Comput..
[23] Leandros Tassiulas,et al. Maxmin fair scheduling in wireless networks , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.
[24] Dirk Westhoff,et al. Charging support for ad hoc stub networks , 2003, Comput. Commun..
[25] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[26] Murali S. Kodialam,et al. Characterizing the capacity region in multi-radio multi-channel wireless mesh networks , 2005, MobiCom '05.
[27] Seung-Jae Han,et al. Fairness and Load Balancing in Wireless LANs Using Association Control , 2004, IEEE/ACM Transactions on Networking.
[28] Markus Jakobsson,et al. Incentive Mechanisms in Multi-Hop Wireless Networks , 2003 .
[29] Wenyuan Xu,et al. The feasibility of launching and detecting jamming attacks in wireless networks , 2005, MobiHoc '05.
[30] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[31] Refik Molva,et al. Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.
[32] Arjen K. Lenstra,et al. Selecting Cryptographic Key Sizes , 2000, Journal of Cryptology.
[33] Mostafa H. Ammar,et al. A reputation system for peer-to-peer networks , 2003, NOSSDAV '03.
[34] Leonard Kleinrock,et al. Virtual Time CSMA: Why Two Clocks Are Better than One , 1985, IEEE Trans. Commun..
[35] Levente Buttyán,et al. Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks , 2003, Mob. Networks Appl..
[36] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[37] David S. Johnson,et al. Computers and Intractability: A Guide to the Theory of NP-Completeness , 1978 .
[38] Antti Toskala,et al. Wcdma for Umts , 2002 .
[39] A. Mawira,et al. Radio aspects of hybrid wireless ad-hoc networks , 2001, IEEE VTS 53rd Vehicular Technology Conference, Spring 2001. Proceedings (Cat. No.01CH37202).
[40] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[41] Chunming Qiao,et al. Integrated cellular and ad hoc relaying systems: iCAR , 2001, IEEE J. Sel. Areas Commun..
[42] Adi Shamir,et al. PayWord and MicroMint: Two Simple Micropayment Schemes , 1996, Security Protocols Workshop.
[43] Jimmi Grönkvist. Assignment methods for spatial reuse TDMA , 2000 .
[44] B. Goode,et al. Voice over Internet protocol (VoIP) , 2002, Proc. IEEE.
[45] Markus Jakobsson. Financial Instruments in Recommendation Mechanisms , 2002, Financial Cryptography.
[46] Markus Jakobsson,et al. A charging and rewarding scheme for packet forwarding in multi-hop cellular networks , 2003, MobiHoc '03.
[47] Markus Jakobsson,et al. Almost Optimal Hash Sequence Traversal , 2002, Financial Cryptography.
[48] Adrian Perrig,et al. Distributed detection of node replication attacks in sensor networks , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[49] Jean-Pierre Hubaux,et al. Securing wireless mesh networks , 2006, IEEE Wireless Communications.
[50] Mihir Bellare,et al. Optimal Asymmetric Encryption-How to Encrypt with RSA , 1995 .
[51] Markus Jakobsson,et al. Reputation-based Wi-Fi deployment , 2005, MOCO.
[52] Paul Resnick,et al. Trust among strangers in internet transactions: Empirical analysis of eBay' s reputation system , 2002, The Economics of the Internet and E-commerce.
[53] Edward W. Knightly,et al. Measurement driven deployment of a two-tier urban mesh access network , 2006, MobiSys '06.
[54] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.
[55] Levente Buttyán,et al. Removing the financial incentive to cheat in micropayment schemes , 2000 .
[56] Bijan Jabbari,et al. Self-organizing packet radio ad hoc networks with overlay (SOPRANO) , 2002, IEEE Commun. Mag..
[57] Jon Crowcroft,et al. Ticket based service access for the mobile user , 1997, MobiCom '97.
[58] Ying-Dar Lin,et al. Multihop cellular: a new architecture for wireless communications , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).
[59] Di Yuan,et al. Resource optimization of spatial TDMA in ad hoc radio networks: a column generation approach , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[60] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[61] Markus G. Kuhn,et al. Tamper resistance: a cautionary note , 1996 .
[62] Antti Toskala,et al. WCDMA for UMTS: Radio Access for Third Generation Mobile Communications , 2000 .
[63] Jun Li,et al. Virtual operator based AAA in wireless LAN hot spots with ad-hoc networking support , 2002, MOCO.
[64] Paul Resnick,et al. The value of reputation on eBay: A controlled experiment , 2002 .
[65] George C. Polyzos,et al. A peer-to-peer approach to wireless LAN roaming , 2003, WMASH '03.
[66] Jean-Pierre Hubaux,et al. A Fair Scheduling for Wireless Mesh Networks , 2005 .
[67] Norishige Chiba,et al. Arboricity and Subgraph Listing Algorithms , 1985, SIAM J. Comput..
[68] Mingyan Liu,et al. Random waypoint considered harmful , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[69] Donald F. Towsley,et al. Passive online rogue access point detection using sequential hypothesis testing with TCP ACK-pairs , 2007, IMC '07.
[70] Azer Bestavros,et al. Self-similarity in World Wide Web traffic: evidence and possible causes , 1997, TNET.
[71] N. Asokan,et al. Securing ad hoc routing protocols , 2002, WiSE '02.