On the Hardness of Minimum Cost Blocking Attacks on Multi-Path Wireless Routing Protocols
暂无分享,去创建一个
[1] Ivan Damgård,et al. A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System , 2001, Public Key Cryptography.
[2] David S. Johnson,et al. Approximation algorithms for combinatorial problems , 1973, STOC.
[3] Steven M. Bellovin,et al. Using Link Cuts to Attack Internet Routing , 2003 .
[4] Yu-Chee Tseng,et al. A Multi-Path QoS Routing Protocol in a Wireless Mobile Ad Hoc Network , 2000, Telecommun. Syst..
[5] Ronald L. Rivest,et al. The MD5 Message-Digest Algorithm , 1992, RFC.
[6] Rajiv Gandhi,et al. Approximation algorithms for partial covering problems , 2004, J. Algorithms.
[7] László Lovász,et al. On the ratio of optimal integral and fractional covers , 1975, Discret. Math..
[8] Ivan Damgård,et al. A Length-Flexible Threshold Cryptosystem with Applications , 2003, ACISP.
[9] Sasikanth Avancha,et al. Security for Sensor Networks , 2004 .
[10] Stephen A. Cook,et al. The complexity of theorem-proving procedures , 1971, STOC.
[11] Jörg Widmer,et al. Network coding: an instant primer , 2006, CCRV.
[12] J. Ghosh,et al. Sociological orbit based mobility profiling and routing for wireless networks , 2006 .
[13] Brian Wellington,et al. OSPF with Digital Signatures , 1997, RFC.
[14] Michael Kearns,et al. Computational complexity of machine learning , 1990, ACM distinguished dissertations.
[15] Christos H. Papadimitriou,et al. Computational complexity , 1993 .
[16] John Moy,et al. OSPF Version 2 , 1998, RFC.
[17] Vasek Chvátal,et al. A Greedy Heuristic for the Set-Covering Problem , 1979, Math. Oper. Res..
[18] Rudolf Ahlswede,et al. Network information flow , 2000, IEEE Trans. Inf. Theory.
[19] Sushil Jajodia,et al. An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[20] Shuo-Yen Robert Li,et al. Linear network coding , 2003, IEEE Trans. Inf. Theory.
[21] Ian F. Akyildiz,et al. Wireless mesh networks: a survey , 2005, Comput. Networks.
[22] Erez Petrank. The hardness of approximation: Gap location , 2005, computational complexity.
[23] Nitin H. Vaidya,et al. Load balancing routing in multi-channel hybrid wireless networks with single network interface , 2005, Second International Conference on Quality of Service in Heterogeneous Wired/Wireless Networks (QSHINE'05).
[24] Edsger W. Dijkstra,et al. A note on two problems in connexion with graphs , 1959, Numerische Mathematik.
[25] Ying-Hong Wang,et al. Interfering-aware QoS multipath routing for ad hoc wireless network , 2004, 18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004..