Author:
Hui Pan,Chaintreau Augustin,Gass Richard,Scott James,Crowcroft Jon,Diot Christophe
Publisher
Springer Berlin Heidelberg
Reference12 articles.
1. Boneh, D., Franklin, M.: Identity based encryption from the Weil pairing. SIAM Journal of Computing 32(3), 586–615 (2003)
2. Burns, B., Brock, O., Levine, B.N.: MV routing and capacity building in disruption tolerant networks. Technical Report TR-04-68, University of Massachusetts at Amherst (July 2004)
3. Crowcroft, J., Hand, S., Mortier, R., Roscoe, T., Warfield, A.: Plutarch: An argument for network pluralism. In: ACM SIGCOMM (August 2003)
4. Davis, J.A., Fagg, A., Levine, B.N.: Wearable computers as packet transfer mechanisms in ad-hoc networks. In: International Symposium on Wearable Computing (October 2001)
5. Grossglauser, M., Vetterli, M.: Locating nodes with EASE: Mobility diffusion of last encounters in ad hoc networks. In: IEEE INFOCOM (2003)
Cited by
9 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献