Inner-Circle Consistency for Wireless Ad Hoc Networks
暂无分享,去创建一个
Ravishankar K. Iyer | Zbigniew T. Kalbarczyk | Claudio Basile | R. Iyer | Z. Kalbarczyk | C. Basile | R. Iyer
[1] L. Kleinrock,et al. Optimum transmission radii for packet radio networks or why six is a magic number , 1978 .
[2] Leslie Lamport,et al. The Byzantine Generals Problem , 1982, TOPL.
[3] P. M. Melliar-Smith,et al. Synchronizing clocks in the presence of faults , 1985, JACM.
[4] Nancy A. Lynch,et al. Reaching approximate agreement in the presence of faults , 1986, JACM.
[5] Hugo Krawczyk,et al. Proactive Secret Sharing Or: How to Cope With Perpetual Leakage , 1995, CRYPTO.
[6] Mukesh Singhal,et al. Low-Cost Checkpointing and Failure Recovery in Mobile Computing Systems , 1996, IEEE Trans. Parallel Distributed Syst..
[7] Roger M. Kieckhafer,et al. New Hybrid Fault Models for Asynchronous Approximate Agreement , 1996, IEEE Trans. Computers.
[8] Flaviu Cristian,et al. The Timed Asynchronous Distributed System Model , 1998, IEEE Trans. Parallel Distributed Syst..
[9] Levente Buttyán,et al. Enforcing service availability in mobile ad-hoc WANs , 2000, MobiHoc.
[10] Deborah Estrin,et al. Directed diffusion: a scalable and robust communication paradigm for sensor networks , 2000, MobiCom '00.
[11] Boaz Barak,et al. Clock Synchronization with Faults and Recoveries ( Extended , 2000 .
[12] N. Asokan,et al. Key agreement in ad hoc networks , 2000, Comput. Commun..
[13] Shai Halevi,et al. Clock synchronization with faults and recoveries (extended abstract) , 2000, PODC '00.
[14] Mary Baker,et al. Mitigating routing misbehavior in mobile ad hoc networks , 2000, MobiCom '00.
[15] Victor Shoup,et al. Practical Threshold Signatures , 2000, EUROCRYPT.
[16] Takahiro Hara,et al. Effective replica allocation in ad hoc networks for improving data accessibility , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).
[17] Christine Julien,et al. Relying on Safe Distance to Ensure Consistent Group Membership in Ad Hoc Networks , 2001 .
[18] Anish Arora,et al. Reliable MAC layer multicast in IEEE 802.11 wireless networks , 2002, Proceedings International Conference on Parallel Processing.
[19] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[20] Evren Sirin,et al. Security-aware adaptive dynamic source routing protocol , 2002, 27th Annual IEEE Conference on Local Computer Networks, 2002. Proceedings. LCN 2002..
[21] Songwu Lu,et al. Self-organized network-layer security in mobile ad hoc networks , 2002, WiSE '02.
[22] Fred B. Schneider,et al. COCA: a secure distributed online certification authority , 2002 .
[23] Takahiro Hara,et al. Replica allocation in ad hoc networks with periodic data update , 2002, Proceedings Third International Conference on Mobile Data Management MDM 2002.
[24] Jan M. Rabaey,et al. Robust Positioning Algorithms for Distributed Ad-Hoc Wireless Sensor Networks , 2002, USENIX Annual Technical Conference, General Track.
[25] Haiyun Luo,et al. Self-securing ad hoc wireless networks , 2002, Proceedings ISCC 2002 Seventh International Symposium on Computers and Communications.
[26] Dharma P. Agrawal,et al. Routing security in wireless ad hoc networks , 2002, IEEE Commun. Mag..
[27] Vinny Cahill,et al. Time bounded medium access control for ad hoc networks , 2002, POMC '02.
[28] Patrick Th. Eugster,et al. PAN: providing reliable storage in mobile ad hoc networks with probabilistic quorum systems , 2003, MobiHoc '03.
[29] Robbert van Renesse,et al. COCA: a secure distributed online certification authority , 2002, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].
[30] Charles E. Perkins,et al. Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.
[31] David Powell,et al. A Survey of Dependability Issues in Mobile Wireless Networks , 2003 .
[32] Bharat Bhargava,et al. On vulnerability and protection of ad hoc on-demand distance vector protocol , 2003, 10th International Conference on Telecommunications, 2003. ICT 2003..
[33] Huirong Fu,et al. Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks , 2003, International Conference on Wireless Networks.
[34] Parameswaran Ramanathan,et al. Fault tolerance in collaborative sensor networks for target detection , 2004, IEEE Transactions on Computers.
[35] David E. Culler,et al. Lessons from a Sensor Network Expedition , 2004, EWSN.
[36] Yunghsiang Sam Han,et al. A key management scheme for wireless sensor networks using deployment knowledge , 2004, IEEE INFOCOM 2004.
[37] Ravishankar K. Iyer,et al. Hardware support for high performance, intrusion- and fault-tolerant systems , 2004, Proceedings of the 23rd IEEE International Symposium on Reliable Distributed Systems, 2004..
[38] Ravishankar K. Iyer,et al. Neutralization of errors and attacks in wireless ad hoc networks , 2005, 2005 International Conference on Dependable Systems and Networks (DSN'05).
[39] Manel Guerrero Zapata. Secure Ad hoc On-Demand Distance Vector (SAODV) Routing , 2006 .