暂无分享,去创建一个
Lang Tong | Oliver Kosut | L. Tong | O. Kosut
[1] Miroslaw Malek,et al. The consensus problem in fault-tolerant computing , 1993, CSUR.
[2] Birgit Pfitzmann,et al. Information-Theoretic Pseudosignatures and Byzantine Agreement for t ≥ n/3 , 2007 .
[3] Leslie Lamport,et al. The Byzantine Generals Problem , 1982, TOPL.
[4] Danny Dolev,et al. The Byzantine Generals Strike Again , 1981, J. Algorithms.
[5] David A. Wagner,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.
[6] Zygmunt J. Haas,et al. Securing ad hoc networks , 1999, IEEE Netw..
[7] Tracey Ho,et al. Byzantine modification detection in multicast networks using randomized network coding , 2004, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings..
[8] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[9] Radia J. Perlman,et al. Network layer protocols with Byzantine robustness , 1988 .
[10] Lang Tong,et al. Cooperative sensor networks with misinformed nodes , 2005, IEEE Transactions on Information Theory.
[11] C. Karlof,et al. Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..
[12] Yunghsiang Sam Han,et al. A witness-based approach for data fusion assurance in wireless sensor networks , 2003, GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489).
[13] Lang Tong,et al. Distributed Inference in the Presence of Byzantine Sensors , 2006, 2006 Fortieth Asilomar Conference on Signals, Systems and Computers.
[14] Adrian Perrig,et al. Security and Privacy in Sensor Networks , 2003, Computer.