4.5 Article

On the Price of Security in Large-Scale Wireless Ad Hoc Networks

Related references

Note: Only part of the references are listed.
Article Computer Science, Hardware & Architecture

Modeling pairwise key establishment for random key predistribution in large-scale sensor networks

Dijiang Huang et al.

IEEE-ACM TRANSACTIONS ON NETWORKING (2007)

Article Computer Science, Information Systems

Closing the gap in the capacity of wireless networks via percolation theory

Massimo Franceschetti et al.

IEEE TRANSACTIONS ON INFORMATION THEORY (2007)

Article Computer Science, Information Systems

Optimal throughput-delay scaling in wireless networks - Part II: Constant-size packets

Abbas El Gamal et al.

IEEE TRANSACTIONS ON INFORMATION THEORY (2006)

Article Computer Science, Hardware & Architecture

Securing mobile ad hoc networks with certificateless public keys

Yanchao Zhang et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2006)

Article Computer Science, Information Systems

Optimal throughput-delay scaling in wireless networks - Part I: The fluid model

Abbas El Gamal et al.

IEEE TRANSACTIONS ON INFORMATION THEORY (2006)

Article Computer Science, Information Systems

Capacity and delay tradeoffs for Ad hoc mobile networks

MJ Neely et al.

IEEE TRANSACTIONS ON INFORMATION THEORY (2005)

Article Computer Science, Information Systems

A deterministic approach to throughput scaling in wireless networks

SR Kulkarni et al.

IEEE TRANSACTIONS ON INFORMATION THEORY (2004)

Article Computer Science, Information Systems

Self-organized public-key management for mobile ad hoc networks

S Capkun et al.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2003)

Article Computer Science, Information Systems

The capacity of wireless networks

P Gupta et al.

IEEE TRANSACTIONS ON INFORMATION THEORY (2000)