메뉴 건너뛰기




Volumn 22, Issue 1, 2004, Pages 189-202

Resilient self-organizing overlay networks for security update delivery

Author keywords

Network security; Overlay network; Overloading based measurement; Resiliency; Security update

Indexed keywords

CONGESTION CONTROL (COMMUNICATION); INTERNET; NETWORK PROTOCOLS; PACKET SWITCHING; PUBLIC KEY CRYPTOGRAPHY; RESOURCE ALLOCATION; TELECOMMUNICATION TRAFFIC;

EID: 0742269305     PISSN: 07338716     EISSN: None     Source Type: Journal    
DOI: 10.1109/JSAC.2003.818808     Document Type: Article
Times cited : (33)

References (26)
  • 5
    • 0742293515 scopus 로고    scopus 로고
    • McAfee ASaP's rumor technology
    • [Online]
    • McAfee ASaP's Rumor technology. [Online]. Available: http://www.mcafeeasap.com/content/virusscan_asap/rumor.asp
  • 6
    • 0003799352 scopus 로고    scopus 로고
    • Scattercast: An architecture for internet broadcast distribution as an infrastructure service
    • Ph.D. dissertation, Elec. Eng. Comput. Sci. Dept., Univ. California, Berkeley, CA, Dec.
    • Y. Chawathe, "Scattercast: An architecture for Internet broadcast distribution as an infrastructure service," Ph.D. dissertation, Elec. Eng. Comput. Sci. Dept., Univ. California, Berkeley, CA, Dec. 2000.
    • (2000)
    • Chawathe, Y.1
  • 8
    • 0003656053 scopus 로고    scopus 로고
    • Yoid: Your own internet distribution
    • [Online]
    • P. Francis, (2000) Yoid: Your Own Internet Distribution. [Online]. Available: http://www.aciri.org/yoid
    • (2000)
    • Francis, P.1
  • 12
    • 0031175641 scopus 로고    scopus 로고
    • MASH: The multicasting archie server hierarchy
    • July
    • A. Rosenstein, J. Li, and S. Tong, "MASH: The multicasting archie server hierarchy," Computer Communication Review, vol. 27, no. 3, pp. 5-13, July 1997.
    • (1997) Computer Communication Review , vol.27 , Issue.3 , pp. 5-13
    • Rosenstein, A.1    Li, J.2    Tong, S.3
  • 16
    • 34147120474 scopus 로고
    • A note on two problems in connexion with graphs
    • E. Dijkstra, "A note on two problems in connexion with graphs," Numerische Mathematik, vol. 1, pp. 269-271, 1959.
    • (1959) Numerische Mathematik , vol.1 , pp. 269-271
    • Dijkstra, E.1
  • 17
    • 0000178416 scopus 로고    scopus 로고
    • Modeling internet topology
    • June
    • K. Calvert, M. Doar, and E. Zegura, "Modeling Internet topology," IEEE Comm. Magazine, vol. 35, pp. 160-163, June 1997.
    • (1997) IEEE Comm. Magazine , vol.35 , pp. 160-163
    • Calvert, K.1    Doar, M.2    Zegura, E.3
  • 18
    • 0742276077 scopus 로고    scopus 로고
    • Tapestry: Fault-resilient wide-area location and routing
    • [Online]
    • Tapestry: Fault-resilient wide-area location and routing. [Online]. Available: http://www.cs.berkeley.edu~ravenben/tapestry
  • 25
    • 0742276100 scopus 로고    scopus 로고
    • Security tool leaves holes
    • April
    • D. Fisher, "Security tool leaves holes," Eweek-the Enterprise Newsweekly, vol. 19, no. 16, April 2002.
    • (2002) Eweek-the Enterprise Newsweekly , vol.19 , Issue.16
    • Fisher, D.1
  • 26
    • 0029333611 scopus 로고
    • A global reliability evaluation: Cutset approach
    • July-Aug.
    • B. Singh, "A global reliability evaluation: Cutset approach," IETE Tech. Rev., vol. 12, no. 4, pp. 275-278, July-Aug. 1995.
    • (1995) IETE Tech. Rev. , vol.12 , Issue.4 , pp. 275-278
    • Singh, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.