1 |
Tracy Camp, Jegg Boleng and Vanessa Davies, 'A Survey of Mobility Models for Ad Hoc Networks Research,' Wireless Communication and Mobile Computing (WCMC), vol. 2, no. 5, pp. 483-502, 2002
DOI
ScienceOn
|
2 |
Ben Liang and Zygmunt J. Haas, 'Virtual Backbone Generation and Maintenance in Ad Hoc Mobility Management,' IEEE INFOCOM'2000, Tel Aviv, Israel, March, 2000
DOI
|
3 |
Zygmunt J. Haas and Ben Liang, 'Ad Hoc Mobility Management with Randomized Database Groups,' IEEE ICC'99, Vancouver, Canada, June 1999
DOI
|
4 |
J. Li, Z. J. Haas and B. Liang, 'Performance Analysis of Random Database Group for Mobility Management in Ad hoc Network,' IEEE International Conference on Communications (ICC) 2003, Anchorage, May 2003
DOI
|
5 |
Matei C. Morogan and Sead Muftic, 'Certificate Management in Ad Hoc Networks,' IEEE Workshop on Security and Assurance in Ad hoc Networks, in conjunction with the 2003 International Symposium on Applications and the Internet, Orlando, January 2003
|
6 |
Haiyun Luo, Jiejun Kong, Petros Zerfos, Songwu Lu, and Lixia Zhang, 'Self-securing Ad Hoc Wireless Networks,' the Seventh IEEE Symposium on Computers and Communications (ISCC'02), pp 567-574, 2002
|
7 |
Lidong Zhou and Zygmunt J. Haas, 'Securing Ad hoc network,' IEEE Network Magazine, pp. 24 -30, Nov/Dec 1999
DOI
ScienceOn
|
8 |
Zygmunt J. Haas and Ben Liang, 'Ad Hoc Location Management Using Quorum Systems,' ACM/IEEE Transactions on Networking, April 1999
DOI
ScienceOn
|
9 |
Seun Yi and Robin Kravets, 'Practical PKI for Ad Hoc Wireless Networks,' Technical Report UIUCDCS-R-2002-2273/UILU -ENG-2002-1717, University of Illinois at Urbana- Champaign, May 2002
|
10 |
Srdjan Capkun, Levente Buttyan and Jean-Pierre Hubaux, 'Self-Organized Public-Key Management for Mobile Ad Hoc Networks,' IEEE Transactionson Mobile Computing, Vol. 2, No. 1, pp. 52-64. Jan-Mar 2003
DOI
ScienceOn
|