Author:
Qin Yang,Zhang Tiantian,Li Mengya
Publisher
Springer International Publishing
Reference28 articles.
1. Shikfa, A.: Security issues in opportunistic networks. In: International Workshop on Mobile Opportunistic Networking, pp. 215–216 (2010)
2. Ciobanu, R.I., et al.: Sprint-self: social-based routing and selfish node detection in opportunistic networks. Mob. Inf. Syst. 15(6), 1–12 (2015)
3. Li, L., Qin, Y., Zhong, X., et al.: An incentive aware routing for selfish opportunistic networks: a game theoretic approach. In: International Conference on Wireless Communications & Signal Processing, pp. 1–5 (2016)
4. Nguyen, H.A., Giordano, S., Puiatti, A.: Probabilistic routing protocol for intermittently connected mobile ad hoc network (propicman). In: World of Wireless, Mobile and Multimedia Networks, pp. 1–6 (2007)
5. Daly, E.M., et al.: Social network analysis for information flow in disconnected delay-tolerant manets. IEEE Trans. Mob. Comput. 8(5), 606–621 (2009)