Surviving attacks on disruption-tolerant networks without authentication
- 9 September 2007
- conference paper
- conference paper
- Published by Association for Computing Machinery (ACM) in Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing - MobiHoc '07
Abstract
No abstract availableKeywords
This publication has 24 references indexed in Scilit:
- Study of a bus-based disruption-tolerant network: mobility modeling and impact on routingPublished by Association for Computing Machinery (ACM) ,2007
- A secure ad-hoc routing approach using localized self-healing communitiesPublished by Association for Computing Machinery (ACM) ,2005
- Spray and waitPublished by Association for Computing Machinery (ACM) ,2005
- Pocket switched networks and human mobility in conference environmentsPublished by Association for Computing Machinery (ACM) ,2005
- Sybilproof reputation mechanismsPublished by Association for Computing Machinery (ACM) ,2005
- Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc NetworksPublished by Springer Science and Business Media LLC ,2005
- Probabilistic Routing in Intermittently Connected NetworksLecture Notes in Computer Science, 2004
- Last Encounter Routing under Random Waypoint MobilityLecture Notes in Computer Science, 2004
- Identity-Based Encryption from the Weil PairingSIAM Journal on Computing, 2003
- Energy-efficient computing for wildlife trackingACM SIGPLAN Notices, 2002