• SWAT: small world-based attacker traceback in ad-hoc networks

  • Market models and pricing mechanisms in a multihop wireless hotspot network

  • Extended ZRP: a routing layer based service discovery protocol for mobile ad hoc networks

  • Multi-constraint dynamic access selection in always best connected networks

  • Content-based routing in mobile ad hoc networks

  • An ECA-P policy-based framework for managing ubiquitous computing environments

  • Defend against cache consistency attacks in wireless ad hoc networks

  • Secure reporting of traffic forwarding activity in mobile ad hoc networks

  • A reputation-based mechanism for isolating selfish nodes in ad hoc networks

  • MPA assisted optimized proactive handoff scheme