Bridging Game Theory and Cryptography: Recent Results and Future Directions, Lecture Notes in Computer Science, vol.4948, p.251, 2008. ,
DOI : 10.1007/978-3-540-78524-8_15
Revocation games in ephemeral networks, Proceedings of the 15th ACM conference on Computer and communications security, CCS '08, pp.199-210, 2008. ,
DOI : 10.1145/1455770.1455797
Localized public-key management for mobile ad hoc networks, IEEE Global Telecommunications Conference, GLOBECOM'04, 2004. ,
Self-securing ad hoc wireless networks, Seventh IEEE Symposium on Computers and Communications (ISCC02), 2002. ,
Trust model for certificate revocation in ad hoc networks, Ad Hoc Networks, pp.441-457, 2008. ,
DOI : 10.1016/j.adhoc.2007.03.005
A localized certificate revocation scheme for mobile ad hoc networks, Ad Hoc Networks, pp.17-31, 2008. ,
DOI : 10.1016/j.adhoc.2006.07.003
Core: A Collaborative Reputation Mechanism to Enforce Node Cooperation in Mobile Ad Hoc Networks, Advanced communications and multimedia security: IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security 107. [11] Wireless Public Key Infrastructure - Main Specification. [Online]. Available: Rev. 2.2, 2002. ,
DOI : 10.1007/978-0-387-35612-9_9
Enhancing location privacy in wireless LAN through disposable interface identifiers, Proceedings of the 1st ACM international workshop on Wireless mobile applications and services on WLAN hotspots , WMASH '03, pp.315-325, 2005. ,
DOI : 10.1145/941326.941334
Security in mobile ad hoc networks: challenges and solutions, IEEE Wireless Communications, vol.11, issue.1, pp.38-47, 2004. ,
DOI : 10.1109/MWC.2004.1269716
SCAN: self-organized network-layer security in mobile ad hoc networks, IEEE Journal on Selected Areas in Communications, vol.24, issue.2, pp.261-273, 2006. ,
DOI : 10.1109/JSAC.2005.861384
A framework for MAC protocol misbehavior detection in wireless networks, Proceedings of the 4th ACM workshop on Wireless security , WiSe '05, pp.33-42, 2005. ,
DOI : 10.1145/1080793.1080801
New Strategies for Revocation in Ad-Hoc Networks, Lecture Notes in Computer Science, vol.4572, p.232, 2007. ,
DOI : 10.1007/978-3-540-73275-4_17
The complexity of computing a nash equilibrium, Commun. ACM, 2009. ,
Selfish Routing and the Price of Anarchy, 2005. ,
DOI : 10.1017/CBO9781316779309.012