-
2
-
-
0037885580
-
Nodes Bearing Grudges: Towards Routing Security, Fairness, and Robustness in Mobile Ad Hoc Networks
-
Canary Islands, Spain, January. IEEE Computer Society
-
S. Buchegger and J. Le Boudec. Nodes Bearing Grudges: Towards Routing Security, Fairness, and Robustness in Mobile Ad Hoc Networks. In Proceedings of the Tenth Euromicro Workshop on Parallel, Distributed and Network-based Processing, pages 403 - 410, Canary Islands, Spain, January 2002. IEEE Computer Society.
-
(2002)
Proceedings of the Tenth Euromicro Workshop on Parallel, Distributed and Network-based Processing
, pp. 403-410
-
-
Buchegger, S.1
Le Boudec, J.2
-
4
-
-
0042877095
-
Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks
-
EPFL-DI-ICA, August
-
L. Buttyan and J. Hubaux. Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks. Technical Report DSC/2001/046, EPFL-DI-ICA, August 2001.
-
(2001)
Technical Report
, vol.DSC-2001-046
-
-
Buttyan, L.1
Hubaux, J.2
-
5
-
-
0035701586
-
Robust Congestion Signaling
-
CA, November
-
D. Ely, N. Spring, D. Wetherall, S. Savage, and T. Anderson. Robust Congestion Signaling. In Proceedings of the 2001 International Conference on Network Protocols,Riverside, CA, November 2001.
-
(2001)
Proceedings of the 2001 International Conference on Network Protocols,Riverside, CA
-
-
Ely, D.1
Spring, N.2
Wetherall, D.3
Savage, S.4
Anderson, T.5
-
6
-
-
0004194997
-
Ns notes and documentation
-
UC Berkley,LBL,USC/ISI,Xerox PARC
-
K. Pall and K. Varadhan. ns notes and documentation. Technical report, UC Berkley,LBL,USC/ISI,Xerox PARC, 2002.
-
(2002)
Technical Report
-
-
Pall, K.1
Varadhan, K.2
-
7
-
-
84964425047
-
Characterizing Intrusion Tolerant Systems using a State Transition Model
-
K. Goseva-Popstojanova, F. Wang, R. Wang, F. Gong, K. Vaidyanathan, K. Trivedi, and B.Muthusamy. Characterizing Intrusion Tolerant Systems using a State Transition Model. In Proceedings of DARPA Information Survivability Conference and Exposition II (DISCEX'01), 2001.
-
(2001)
Proceedings of DARPA Information Survivability Conference and Exposition II (DISCEX'01)
-
-
Goseva-Popstojanova, K.1
Wang, F.2
Wang, R.3
Gong, F.4
Vaidyanathan, K.5
Trivedi, K.6
Muthusamy, B.7
-
8
-
-
0036957315
-
Ariadne: A secure on-demand routing protocol for ad hoc networks
-
September
-
Y. Hu, A. Perrig, and D. Johnson. Ariadne: A secure on-demand routing protocol for ad hoc networks. In The 8th ACM International Conference on Mobile Computing and Networking, MobiCom 2002, pages 12-23, September 2002.
-
(2002)
The 8th ACM International Conference on Mobile Computing and Networking, MobiCom 2002
, pp. 12-23
-
-
Hu, Y.1
Perrig, A.2
Johnson, D.3
-
9
-
-
0003531689
-
Fairness, call establishment latency and other performance metrics
-
ATM Forum Document, August
-
R. Jain, G. Babic, B. Nagendra, and C. Lam. Fairness, call establishment latency and other performance metrics. Technical Report ATM-Forum/96-1173, ATM Forum Document, August 1996.
-
(1996)
Technical Report
, vol.ATM-FORUM-96-1173
-
-
Jain, R.1
Babic, G.2
Nagendra, B.3
Lam, C.4
-
10
-
-
1542268558
-
Protection of Fairness for Multimedia Traffic Streams in a Non-cooperative Wireless LAN Setting
-
Springer
-
J. Konorski. Protection of Fairness for Multimedia Traffic Streams in a Non-cooperative Wireless LAN Setting. In PROMS, volume 2213 of LNCS. Springer, 2001.
-
(2001)
PROMS, Volume 2213 of LNCS
, vol.2213
-
-
Konorski, J.1
-
11
-
-
84948142128
-
Multiple Access in Ad-Hoc Wireless LANs with Noncooperative Stations
-
Springer
-
J. Konorski. Multiple Access in Ad-Hoc Wireless LANs with Noncooperative Stations. In NETWORKING, volume 2345 of LNCS. Springer, 2002.
-
(2002)
NETWORKING, Volume 2345 of LNCS
, vol.2345
-
-
Konorski, J.1
-
12
-
-
1542298520
-
Detection and Handling of MAC Layer Misbehavior in Wireless Networks
-
Coordinated Science Laboratory, University of Illinois at Urbana-Champaign, August
-
P. Kyasanur and N. H. Vaidya. Detection and Handling of MAC Layer Misbehavior in Wireless Networks. Technical report, Coordinated Science Laboratory, University of Illinois at Urbana-Champaign, August 2002.
-
(2002)
Technical Report
-
-
Kyasanur, P.1
Vaidya, N.H.2
-
13
-
-
0034541756
-
Mitigating Routing Misbehavior in Mobile Ad hoc Networks
-
S. Marti, T. J. Giuli, K. Lai, and M. Baker. Mitigating Routing Misbehavior in Mobile Ad hoc Networks. In Mobile Computing and Networking, pages 255-265, 2000.
-
(2000)
Mobile Computing and Networking
, pp. 255-265
-
-
Marti, S.1
Giuli, T.J.2
Lai, K.3
Baker, M.4
-
14
-
-
1542358393
-
Game theoretic analysis of security in mobile ad hoc networks
-
Institut Eurecom, April
-
P. Michiardi and R. Molva. Game theoretic analysis of security in mobile ad hoc networks. Technical Report RR-02-070, Institut Eurecom, April 2002.
-
(2002)
Technical Report
, vol.RR-02-070
-
-
Michiardi, P.1
Molva, R.2
-
16
-
-
4243931532
-
Probabilistic Validation of Intrusion Tolerance
-
June
-
W. H. Sanders, M. Cukier, F. Webber, P. Pal, and R. Watro. Probabilistic Validation of Intrusion Tolerance. In Digest of Fast Abstracts: The International Conference on Dependable Systems and Networks, Bethesda, Maryland, June 2002.
-
(2002)
Digest of Fast Abstracts: The International Conference on Dependable Systems and Networks, Bethesda, Maryland
-
-
Sanders, W.H.1
Cukier, M.2
Webber, F.3
Pal, P.4
Watro, R.5
-
17
-
-
0002098559
-
TCP Congestion Control with a Misbehaving Receiver
-
October
-
S. Savage, N. Cardwell, D. Wetherall, and T. Anderson. TCP Congestion Control with a Misbehaving Receiver. In ACM Computer Communications Review, pages 71-78, October 1999.
-
(1999)
ACM Computer Communications Review
, pp. 71-78
-
-
Savage, S.1
Cardwell, N.2
Wetherall, D.3
Anderson, T.4
-
19
-
-
0034546898
-
Intrusion detection in wireless ad-hoc networks
-
Y. Zhang and W. Lee. Intrusion detection in wireless ad-hoc networks. In Mobile Computing and Networking, pages 275-283, 2000.
-
(2000)
Mobile Computing and Networking
, pp. 275-283
-
-
Zhang, Y.1
Lee, W.2
-
20
-
-
0033357103
-
Securing Ad Hoc Networks
-
L. Zhou and Z. J. Haas. Securing Ad Hoc Networks. IEEE Network, 13(6):24-30, 1999.
-
(1999)
IEEE Network
, vol.13
, Issue.6
, pp. 24-30
-
-
Zhou, L.1
Haas, Z.J.2
|