S. Buchegger and J. Boudec, Performance analysis of the CONFIDANT protocol, Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing , MobiHoc '02, pp.226-236, 2002.
DOI : 10.1145/513800.513828

L. Buttyán and J. Hubaux, Nuglets: a virtual currency to stimulate cooperation in self-organized mobile ad hoc networks Swiss Federal Institute of Technology, 2001.

J. Crowcroft, R. Gibbens, F. Kelly, and S. Ostring, Modelling incentives for collaboration in mobile ad hoc networks, Papers from the First Workshop on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, pp.427-439, 2003.
DOI : 10.1016/j.peva.2004.03.003

URL : https://hal.archives-ouvertes.fr/inria-00466747

P. Dewan, P. Dasgupta, and A. Bhattacharya, On using reputations in ad hoc networks to counter malicious nodes, Proceedings. Tenth International Conference on Parallel and Distributed Systems, 2004. ICPADS 2004., pp.665-672, 2004.
DOI : 10.1109/ICPADS.2004.1316153

M. Felegyhazi, M. Félegyházi, L. Buttyan, and J. Hubaux, Equilibrium Analysis of Packet Forwarding Strategies in Wireless Ad Hoc Networks ??? The Static Case, PWC 2003 Personal Wireless Communications, pp.23-25, 2003.
DOI : 10.1007/978-3-540-39867-7_70

J. Liu and V. Issarny, Enhanced Reputation Mechanism for Mobile Ad Hoc Networks, 2nd International conference on Trust Management, pp.48-62, 2004.
DOI : 10.1007/978-3-540-24747-0_5

URL : https://hal.archives-ouvertes.fr/inria-00414803

P. Michiardi and R. Molva, Core: A Collaborative Reputation Mechanism to Enforce Node Cooperation in Mobile Ad Hoc Networks, 6th Joint Working Conference on Communications and Multimedia Security, pp.107-121, 2001.
DOI : 10.1007/978-0-387-35612-9_9

V. S. Pavan, V. Srinivasan, P. Nuggehalli, C. F. Chiasserini, and R. R. Rao, Cooperation in wireless ad hoc networks, IEEE Infocom, pp.808-817, 2003.

A. Urpi, M. Bonuccelli, and S. Giodano, Modelling cooperation in mobile ad hoc networks: A formal description of selfishness, Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, pp.3-5, 2003.
URL : https://hal.archives-ouvertes.fr/inria-00466742

I. M. Golle, K. Leyton-brown, and M. Lillibridge, Incentives for sharing in peer-topeer networks, 2nd International Workshop on Electronic Commerce, 2001.

K. Lai, M. Feldman, I. Stoica, and J. Chuang, Incentives for cooperation in peer-to-peer networks Workshop on Economics of Peer-to-Peer Systems, 2003.

. Netfilter, org packet filtering project. http://www.netfilter.org/. [13] Galveston island convention center at the san luis resert - floorplans and specifications

S. Zhong, J. Chen, and R. Yang, Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428), pp.1987-1997, 2002.
DOI : 10.1109/INFCOM.2003.1209220

S. Buchegger, J. Yves, and L. Boudec, Performance analysis of the CONFIDANT protocol, Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing , MobiHoc '02, pp.226-236, 2002.
DOI : 10.1145/513800.513828

F. Juraschek, H. Will, M. G. , and J. Schiller, Friendly clustering the winning strategy of the maniac challenge, Fourth ACM International Workshop on Wireless Network Testbeds, Experimental Evaluation and Characterization (WiNTECH) -Demosession, 2009.

A. Abdelrahman, M. El-nasr, and O. Ismail, A novel forwarding/dropping decision engine for wireless multi-hop ad-hoc networks, Proceedings of the 5th International ICST Conference on Collaborative Computing: Networking, Applications, Worksharing, pp.1-5, 2009.
DOI : 10.4108/ICST.COLLABORATECOM2009.8379