共 50 条
[21]
Trust Assessment in Wireless Ad-hoc Networks
[J].
2008 1ST IFIP WIRELESS DAYS (WD),
2008,
:425-429
[22]
MAC schemes for ad-hoc wireless networks
[J].
2007 IEEE 66TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-5,
2007,
:36-40
[23]
Security Technologies in Ad-hoc Networks: A Survey
[J].
PROCEEDINGS OF THE 2021 IEEE 7TH INTERNATIONAL CONFERENCE ON NETWORK SOFTWARIZATION (NETSOFT 2021): ACCELERATING NETWORK SOFTWARIZATION IN THE COGNITIVE AGE,
2021,
:423-429
[25]
Reconsidering Attacker Models in Ad-Hoc Networks
[J].
SECURITY PROTOCOLS XXIV,
2017, 10368
:219-227
[26]
Ad-hoc networks and layer 2 tunnels
[J].
VTC2004-FALL: 2004 IEEE 60TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-7: WIRELESS TECHNOLOGIES FOR GLOBAL SECURITY,
2004,
:5040-5043
[27]
A multicast routing protocol for ad-hoc networks
[J].
IEEE INFOCOM '99 - THE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-3, PROCEEDINGS: THE FUTURE IS NOW,
1999,
:784-792
[28]
Simple resource reservation in ad-hoc networks
[J].
13TH IEEE INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS, VOL 1-5, PROCEEDINGS: SAILING THE WAVES OF THE WIRELESS OCEANS,
2002,
:715-719
[29]
An Efficient Routing Protocol for Ad-Hoc Networks
[J].
ADVANCES IN COMPUTING AND COMMUNICATIONS, PT I,
2011, 190
:11-+
[30]
A simulation framework for ad-hoc wireless networks
[J].
CCECE 2003: CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, VOLS 1-3, PROCEEDINGS: TOWARD A CARING AND HUMANE TECHNOLOGY,
2003,
:989-992