dc.identifier.citation |
[1] A Delay-Tolerant Network Architecture for Challenged Internets, K. Fall, SIGCOMM, August 2003 [2] Artemios G. Voyiatzis, “A survey of delay – disruption tolerant networking applications”, Journal of Internet [3]. Evan P.C. Jones, Paul A.S. Ward, “Routing Strategies for Delay – Tolerant Networks”, University of Waterloo, Canada. [4] RFC 4838, V. Cerf, S. Burleigh, A.Hooke, L.Torgerson, NASA Jet Propulsion Laboratory (NASA/JPL), R. Durst, K. Scott, The MITRE Corporation, K. Fall, Intel Corporation. , H. Weiss, SPARTA, Inc. “Delay – Tolerant Networking Architecture”, April 2007 [5] Joshua B. Schoolcraft, Scott C. Burleigh, Ross M. Jones, E. Jay Wyatt, J. Leigh Torgerson, “The Deep Impact Network Experiments – Concept, Motivation and Results”, Jet Propulsion Laboratory, California Institute of Technology, 2010. [6] http://www.nasa.gov/mission_pages/station/research/experiments/1002.html , this content was provided by Kim Nergaard, and is maintained in a database by the ISS Program Science Office, 05.23.13. [7] Ian F. Akyildiz , Dario Pompili, Tommaso Melodia, “Underwater acoustic sensor networks: research challenges”, Published by ©Elsevier B.V., Ad Hoc Networks 3 (2005) pp: 257–279, 2005. [8] John Heidemann, Milica Stojanovic and Michele Zorzi, “Underwater sensor networks: applications, advances and challenges”, Phil. Trans. R. Soc. A (2012) 370, pp: 158–175, 2012. [9] Hervé Ntareme, Marco Zennaro, Björn Pehrson, “Delay Tolerant Network on smartphones: Applications for communication challenged areas”, published in Extremecom 2011, Brazil, September 2011. [10] Chai Keong Toh, Ad Hoc Mobile Wireless Networks, Prentice Hall Publishers , 2002 [11] P. Gupta and P.R. Kumar. Capacity of wireless networks. IEEE Transactions on Information Theory, Volume 46, Issue 2, March 2000, doi:10.1109/18.825799 [12] Jump up^ Jinyang Li, Charles Blake, Douglas S. J. De Couto, Hu Imm Lee, and Robert Morris, Capacity of Ad Hoc Wireless Networks, in the proceedings of the 7th ACM International Conference on Mobile Computing and Networking, Rome, Italy, July 2000 [13] Prasant Mohapatra, Srikanth V. Krishnamurthy, “Ad Hoc Networks Technologies and Protocols” [14] Tomas Krag and Sebastian Büettrich (2004-01-24). "Wireless Mesh Networking". O'Reilly Wireless Dev Center. Retrieved 2009-01-20 [15] Yi Qian, and Nader Moayeri,“Design Secure And Application-Oriented Vanet” [16] P. Papadimitratos, V. Gligor, J-P. Hubaux, “Securing Vehicular Communications – Assumptions, Requirements, and Principles”, Proceedings of the Workshop on Embeded Security on Cars (ESCAR) 2006, November 2006. [17] Maxim Raya, Panos Papadimitratos, and Jean-Pierre Hubaux, “Securing Vehicular Communications”, IEEE Wireless Communications, October 2006. [18] Tim Leinmuller, Elmar Schoch, and Frank Kargl, “Position Verfication Approaches for Vehicular Ah Hoc Networks”, IEEE Wireless Communications, October 2006. [19] P. Papadimitratos, L. Buttyan, J-P. Hubaux, F. Kargl, A. Kung, M. Raya, “Architecture for Secure and Priviate Vehicular Communications”, Proceedings of the 7th International Conference on ITS Telecommunications, June 2007. [20] Maxim Raya, and Jean-Pierre Hubaux, “Securing vehicular ad hoc networks”, Journal of Computer Security, Vol.15, No.1, pp.39-68, 2007. [21] Tim Leinmuller, Elmar Schoch, and Christian Maihofer, “Security Requirements and Solution Concepts in Vehicular Ad Hoc Networks”, Proceedings of Forth Annual Conference on Wireless on Demand Network Systems and Services, 2007. |
en_US |