共 17 条
[1]
Michiardi P., Molva R., Simulation-based analysis of security exposures in mobile ad hoc networks, Proceedings of European Wireless 2002 Conference, (2002)
[2]
Hu Y., Johnson D.B., Perrig A., Ariadne, a secure on-demand routing protocol for ad hoc networks, Proceedings of MobiCom '02, (2002)
[3]
Buttyan L., Hubaux J., Stimulating cooperation in self-organizing mobile ad hoc networks, ACMKluwer Mobile Networks and Applications (MONET), 8, 5
[4]
Zhong S., Chen J., Yang Y., Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks, Proceedings of IEEE Infocom '03, (2003)
[5]
Buchegger S., Boudec J.Y.L., Performance analysis of the CONFIDANT protocol, Proceedings of ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), (2002)
[6]
Michiardi P., Molva R., CORE, A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks, Proceedings of Communication and Multimedia Security 2002 Conference, (2002)
[7]
Papadimitratos P., Haas Z., Secure routing for mobile ad hoc networks, Proceedings of Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002), (2002)
[8]
Papadimitratos P., Haas Z.J., Secure message transmission in mobile ad hoc networks, Ad Hoc Networks, 1, pp. 193-209, (2003)
[9]
Chlamtac I., Conti M., Liu J.J.N., Mobile ad hoc networking: Imperatives and challenges, Ad Hoc Networks, 1, pp. 13-64, (2003)
[10]
Conti M., Giordano S., Maselli G., Turi G., MobileMAN: Mobile metropolitan ad hoc networks, Proceedings of the 8th International Conference on Personal Wireless Communications (PWC 2003), (2003)