4.7 Article

ESIP: Secure Incentive Protocol with Limited Use of Public-Key Cryptography for Multihop Wireless Networks

Related references

Note: Only part of the references are listed.
Article Computer Science, Information Systems

Multi-Hop Relay for Next-Generation Wireless Access Networks

Gang Shen et al.

BELL LABS TECHNICAL JOURNAL (2009)

Article Engineering, Electrical & Electronic

Statistical QoS Routing for IEEE 802.11 Multihop Ad Hoc Networks

Atef Abdrabou et al.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2009)

Article Engineering, Electrical & Electronic

BAT: A Robust Signature Scheme for Vehicular Networks Using Binary Authentication Tree

Yixin Jiang et al.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2009)

Article Computer Science, Hardware & Architecture

Multihop cellular networks: Technology and economics

Xue Jun Li et al.

COMPUTER NETWORKS (2008)

Article Computer Science, Information Systems

A scalable and robust approach to collaboration enforcement in mobile ad-hoc networks

Ning Jiang et al.

JOURNAL OF COMMUNICATIONS AND NETWORKS (2007)

Article Computer Science, Hardware & Architecture

Identity-based secure collaboration in wireless ad hoc networks

Jianping Pan et al.

COMPUTER NETWORKS (2007)

Article Computer Science, Information Systems

A secure incentive protocol for mobile ad hoc networks

Yanchao Zhang et al.

WIRELESS NETWORKS (2007)

Article Computer Science, Information Systems

A general framework to construct stationary mobility models for the simulation of mobile networks

Jungkeun Yoon et al.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2006)

Article Computer Science, Information Systems

Cooperation enforcement schemes for MANETs: a survey

G. F. Marias et al.

WIRELESS COMMUNICATIONS & MOBILE COMPUTING (2006)

Article Computer Science, Information Systems

A secure incentive architecture for ad hoc networks

Qi He et al.

WIRELESS COMMUNICATIONS & MOBILE COMPUTING (2006)

Article Computer Science, Information Systems

Node cooperation in hybrid ad hoc networks

N Ben Salem et al.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2006)

Article Engineering, Electrical & Electronic

Location-based compromise-tolerant security mechanisms for wireless sensor networks

YC Zhang et al.

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2006)

Article Computer Science, Information Systems

A study of the energy consumption characteristics of cryptographic algorithms and security protocols

NR Potlapally et al.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2006)

Article Computer Science, Hardware & Architecture

Stimulating cooperation in self-organizing mobile ad hoc networks

L Buttyán et al.

MOBILE NETWORKS & APPLICATIONS (2003)

Article Computer Science, Information Systems

Charging support for ad hoc stub networks

B Lamparter et al.

COMPUTER COMMUNICATIONS (2003)

Article Computer Science, Information Systems

The capacity of wireless networks

P Gupta et al.

IEEE TRANSACTIONS ON INFORMATION THEORY (2000)