Covert channels in ad-hoc wireless networks
暂无分享,去创建一个
[1] C. Gray Girling,et al. Covert Channels in LAN's , 1987, IEEE Transactions on Software Engineering.
[2] Norman M. Abramson,et al. Packet switching with satellites , 1973, AFIPS National Computer Conference.
[3] Anthony Ephremides,et al. Energy-efficient collision resolution in wireless ad-hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[4] Rachel Greenstadt,et al. Covert Messaging through TCP Timestamps , 2002, Privacy Enhancing Technologies.
[5] Xiaoyan Hong,et al. ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks , 2003, MobiHoc '03.
[6] Arnie Kwong,et al. Fall Joint Computer Conference , 1987, Data Base.
[7] P. Karn,et al. MACA-a New Channel Access Method for Packet Radio , 1990 .
[8] Charles E. Perkins,et al. Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for mobile computers , 1994, SIGCOMM.
[9] Augustus J. E. M. Janssen,et al. Analysis of contention tree algorithms , 2000, IEEE Trans. Inf. Theory.
[10] Yih-Chun Hu,et al. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.
[11] Martin Vetterli,et al. Communication using phantoms: covert channels in the Internet , 2001, Proceedings. 2001 IEEE International Symposium on Information Theory (IEEE Cat. No.01CH37252).
[12] Norman M. Abramson,et al. THE ALOHA SYSTEM: another alternative for computer communications , 1899, AFIPS '70 (Fall).
[13] M. S. Corson,et al. A highly adaptive distributed routing algorithm for mobile wireless networks , 1997, Proceedings of INFOCOM '97.
[14] Dimitri P. Bertsekas,et al. Data Networks , 1986 .
[15] J.-P. Hubaux,et al. Enforcing service availability in mobile ad-hoc WANs , 2000, 2000 First Annual Workshop on Mobile and Ad Hoc Networking and Computing. MobiHOC (Cat. No.00EX444).
[16] Craig H. Rowland,et al. Covert Channels in the TCP/IP Protocol Suite , 1997, First Monday.
[17] Deepa Kundur,et al. Practical Data Hiding in TCP/IP , 2002 .
[18] Manel Guerrero Zapata. Secure Ad hoc On-Demand Distance Vector (SAODV) Routing , 2006 .
[19] Charles E. Perkins,et al. Performance comparison of two on-demand routing protocols for ad hoc networks , 2001, IEEE Wirel. Commun..
[20] L. Kleinrock,et al. Packet Switching in Radio Channels: Part I - Carrier Sense Multiple-Access Modes and Their Throughput-Delay Characteristics , 1975, IEEE Transactions on Communications.
[21] Charles E. Perkins,et al. Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.
[22] Theodore G. Handel,et al. Hiding Data in the OSI Network Model , 1996, Information Hiding.
[23] Anthony Ephremides,et al. Covert Information Transmission through the Use of Standard Collision Resolution Algorithms , 1999, Information Hiding.
[24] David A. Maltz,et al. Dynamic Source Routing in Ad Hoc Wireless Networks , 1994, Mobidata.
[25] Anthony Ephremides,et al. A distributed routing algorithm for mobile wireless networks , 1995, Wirel. Networks.
[26] John Ippocratis Capetanakis. The multiple access broadcast channel : protocol and capacity considerations. , 1977 .
[27] Virgil D. Gligor,et al. A guide to understanding covert channel analysis of trusted systems , 1993 .
[28] Panagiotis Papadimitratos,et al. Secure Routing for Mobile Ad Hoc Networks , 2002 .
[29] Butler W. Lampson,et al. A note on the confinement problem , 1973, CACM.
[30] Anthony Ephremides,et al. A distributed routing algorithm for mobile radio networks , 1989, IEEE Military Communications Conference, 'Bridging the Gap. Interoperability, Survivability, Security'.