-
1
-
-
0015672289
-
A note on the confinement problem
-
B. W. Lampson. "A note on the confinement problem." Comm. ACM 16 (1973) 613-615
-
(1973)
Comm. ACM
, vol.16
, pp. 613-615
-
-
Lampson, B.W.1
-
2
-
-
0010512569
-
A guide to understanding covert channel analysis of trusted systems
-
National Computer Security Center, Ft. George G. Meade, MD, U.S.A., Nov
-
V. Gligor, "A guide to understanding covert channel analysis of trusted systems," Tech. Rep. NCSC-TG-030, National Computer Security Center, Ft. George G. Meade, MD, U.S.A., Nov 1993.
-
(1993)
Tech. Rep.
, vol.NCSC-TG-030
-
-
Gligor, V.1
-
5
-
-
2642558406
-
Covert channels in the TCP/IP protocol suite
-
July
-
C. H. Rowland, "Covert Channels in the TCP/IP Protocol Suite," Peer Reviewed Journal on the Internet, July 1997. http://www.firstmonday.dk/ issues/issue2_5/rowland/
-
(1997)
Peer Reviewed Journal on the Internet
-
-
Rowland, C.H.1
-
8
-
-
32444445843
-
Covert messaging through TCP timestamps
-
San Francisco CA, April
-
J. Giffen, R. Greenstadt, P. Litwack, and R. Tibbetts, "Covert Messaging through TCP Timestamps," PET 2002 Workshop on Privacy Enhancing Technologies, San Francisco CA, April 2002.
-
(2002)
PET 2002 Workshop on Privacy Enhancing Technologies
-
-
Giffen, J.1
Greenstadt, R.2
Litwack, P.3
Tibbetts, R.4
-
10
-
-
20344397889
-
Covert information transmission through the use of standard collision resolution algorithms
-
Dresden, Germany, Sept./Oct.
-
T. M. Dogu and A. Ephremides, "Covert Information Transmission through the Use of Standard Collision Resolution Algorithms," IH'99, Dresden, Germany, Sept./Oct. 1999.
-
(1999)
IH'99
-
-
Dogu, T.M.1
Ephremides, A.2
-
12
-
-
85031307530
-
Highly dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for mobile computers
-
Oct.
-
C. E. Perkins and P. Bhagwat, "Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for Mobile Computers," SIGCOMM'94, Vol. 24, No. 4, Oct. 1994.
-
(1994)
SIGCOMM'94
, vol.24
, Issue.4
-
-
Perkins, C.E.1
Bhagwat, P.2
-
14
-
-
0002159357
-
A distributed routing algorithm for mobile wireless networks
-
Feb.
-
M. S. Corson and A. Ephremides, "A distributed routing algorithm for mobile wireless networks," ACM/Baltzer J. Wireless Networks, Feb. 1995, Vol. 1, No. 1, pages 61-81.
-
(1995)
ACM/Baltzer J. Wireless Networks
, vol.1
, Issue.1
, pp. 61-81
-
-
Corson, M.S.1
Ephremides, A.2
-
15
-
-
0013145148
-
Ad hoc On-Demand Distance Vector (AODV) routing
-
Nov.
-
C.E. Perkins, E. M. Royer, S. R. Das, "Ad hoc On-Demand Distance Vector (AODV) Routing," IETF Internet Draft, draft-ietf-manet-aodv-12.txt, Nov. 2002.
-
(2002)
IETF Internet Draft, Draft-ietf-manet-aodv-12.txt
-
-
Perkins, C.E.1
Royer, E.M.2
Das, S.R.3
-
16
-
-
0000629443
-
Dynamic source routing in ad hoc wireless networks
-
(Imielinski and Korth, eds.), Kluwer Academic Publishers
-
D. B. Johnson and D. A. Maltz, "Dynamic Source Routing in Ad Hoc Wireless Networks," In Mobile Computing (Imielinski and Korth, eds.), pages 153-181. Kluwer Academic Publishers, 1996.
-
(1996)
Mobile Computing
, pp. 153-181
-
-
Johnson, D.B.1
Maltz, D.A.2
-
17
-
-
0031353437
-
A highly adaptive distributed routing algorithm for mobile wireless networks
-
Japan, Apr.
-
V.D. Park and M.S. Corson, "A Highly Adaptive Distributed Routing Algorithm for Mobile Wireless Networks," IEEE INFOCOM, Japan, Apr. 1997.
-
(1997)
IEEE INFOCOM
-
-
Park, V.D.1
Corson, M.S.2
-
19
-
-
0033892676
-
Performance comparison of two on-demand routing protocols for ad hoc networks
-
Israel, Mar.
-
S. R. Das, C. E. Perkins, and E. M. Royer, "Performance comparison of Two On-demand Routing Protocols for Ad hoc Networks," IEEE INFOCOM, Israel, Mar. 2000.
-
(2000)
IEEE INFOCOM
-
-
Das, S.R.1
Perkins, C.E.2
Royer, E.M.3
-
21
-
-
0036957315
-
Ariadne: A secure on-demand routing protocol for ad hoc networks
-
Atlanta, GA, Sept.
-
Y-C. Hu, A. Perrig, and D. B. Johnson, "Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks," MobiCom'02, Atlanta, GA, Sept. 2002.
-
(2002)
MobiCom'02
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
23
-
-
6344273537
-
Secure message transmission in mobile ad hoc networks
-
Jan/Feb/March
-
P. Papadimitratos and Z.J. Haas, "Secure Message Transmission in Mobile Ad Hoc Networks," Elsevier Ad Hoc Networks Journal, vol. 1, no. 1, Jan/Feb/March 2003.
-
(2003)
Elsevier Ad Hoc Networks Journal
, vol.1
, Issue.1
-
-
Papadimitratos, P.1
Haas, Z.J.2
-
24
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
Boston, MA, Aug.
-
S. Marti, T.J. Guili, K. Lai, and M. Baker, "Mitigating Routing Misbehavior in Mobile Ad Hoc Networks," Mobicom'00, Boston, MA, Aug. 2000.
-
(2000)
Mobicom'00
-
-
Marti, S.1
Guili, T.J.2
Lai, K.3
Baker, M.4
-
25
-
-
84954161437
-
Enforcing service availability in mobile ad hoc WANs
-
Boston, MA, Aug.
-
L. Buttyan and J.P. Hubaux, "Enforcing Service Availability in Mobile Ad Hoc WANs," Mobicom'00, Boston, MA, Aug. 2000.
-
(2000)
Mobicom'00
-
-
Buttyan, L.1
Hubaux, J.P.2
-
26
-
-
0242696170
-
ANODR: ANonymous on demand routing with untraceable routes for mobile ad-hoc networks
-
Annapolis, MD, Jun.
-
J. Kong and X. Hong, "ANODR: ANonymous On Demand Routing with Untraceable Routes for Mobile Ad-hoc Networks," Mobihoc'03, Annapolis, MD, Jun., 2003.
-
(2003)
Mobihoc'03
-
-
Kong, J.1
Hong, X.2
|