Distributed opportunistic scheduling for ad-hoc communications: an optimal stopping approach. [Citation Graph (, )][DBLP]
On exploiting asymmetric wireless links via one-way estimation. [Citation Graph (, )][DBLP]
A dominating and absorbent set in a wireless ad-hoc network with different transmission ranges. [Citation Graph (, )][DBLP]
Social network analysis for routing in disconnected delay-tolerant MANETs. [Citation Graph (, )][DBLP]
Capacity scaling in delay tolerant networks with heterogeneous mobile nodes. [Citation Graph (, )][DBLP]
Scalable routing in delay tolerant networks. [Citation Graph (, )][DBLP]
Surviving attacks on disruption-tolerant networks without authentication. [Citation Graph (, )][DBLP]
Containing denial-of-service attacks in broadcast authentication in sensor networks. [Citation Graph (, )][DBLP]
A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks. [Citation Graph (, )][DBLP]
A random perturbation-based scheme for pairwise key establishment in sensor networks. [Citation Graph (, )][DBLP]