메뉴 건너뛰기




Volumn , Issue , 2006, Pages 496-503

A lightweight intrusion-tolerant overlay network

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER SIMULATION; GRAPH THEORY; INTERNET; MATHEMATICAL MODELS; NETWORK PROTOCOLS; ROUTERS;

EID: 33751054998     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ISORC.2006.     Document Type: Conference Paper
Times cited : (5)

References (19)
  • 3
    • 0036986441 scopus 로고    scopus 로고
    • An on-demand secure routing protocol resilient to Byzantine failures
    • Atlanta, GA
    • B. Awerbuch, D. Holmer, C. Nita-Rotaru, and H. Rubens. An on-demand secure routing protocol resilient to Byzantine failures. In Proc. ACM WiSe, pp. 21-30, Atlanta, GA, 2002.
    • (2002) Proc. ACM WiSe , pp. 21-30
    • Awerbuch, B.1    Holmer, D.2    Nita-Rotaru, C.3    Rubens, H.4
  • 7
    • 0003780715 scopus 로고
    • Addison-Wesley, Reading, MA, USA
    • F. Harary. Graph Theory. Addison-Wesley, Reading, MA, USA, 1969.
    • (1969) Graph Theory
    • Harary, F.1
  • 8
    • 0036957315 scopus 로고    scopus 로고
    • Ariadne: A secure on-demand routing protocol for ad hoc networks
    • Atlanta, GA
    • Y.-C. Hu, A. Perrig, and D. B. Johnson. Ariadne: A secure on-demand routing protocol for ad hoc networks. In Proc. MobiCom, pp. 12-23, Atlanta, GA, 2002.
    • (2002) Proc. MobiCom , pp. 12-23
    • Hu, Y.-C.1    Perrig, A.2    Johnson, D.B.3
  • 10
    • 0003196107 scopus 로고    scopus 로고
    • HMAC: Keyed-hashing for message authentication
    • H. Krawczyk, M. Bellare, and R. Canetti. HMAC: Keyed-hashing for message authentication. IETF RFC 2104, 1997.
    • (1997) IETF RFC , vol.2104
    • Krawczyk, H.1    Bellare, M.2    Canetti, R.3
  • 13
    • 84948389421 scopus 로고    scopus 로고
    • Simulating group communication protocols through an object-oriented framework
    • San Diego, CA
    • H. H. Muhammad and M. P. Barcellos. Simulating group communication protocols through an object-oriented framework. In Proc. Annual Simulation Symp., pp. 143-150, San Diego, CA, 2002.
    • (2002) Proc. Annual Simulation Symp. , pp. 143-150
    • Muhammad, H.H.1    Barcellos, M.P.2
  • 14
    • 0036805086 scopus 로고    scopus 로고
    • Securing the Internet routing infrastructure
    • Oct.
    • P. Papadimitratos and Z. J. Haas. Securing the Internet routing infrastructure. IEEE Communications Magazine, 40(10):60-68, Oct. 2002.
    • (2002) IEEE Communications Magazine , vol.40 , Issue.10 , pp. 60-68
    • Papadimitratos, P.1    Haas, Z.J.2
  • 15
    • 0031247411 scopus 로고    scopus 로고
    • End-to-end routing behavior in the Internet
    • Oct.
    • V. Paxson. End-to-end routing behavior in the Internet. IEEE/ACM Trans. Networking, 5(5):601-615, Oct. 1997.
    • (1997) IEEE/ACM Trans. Networking , vol.5 , Issue.5 , pp. 601-615
    • Paxson, V.1
  • 16
    • 0032677326 scopus 로고    scopus 로고
    • End-to-end Internet packet dynamics
    • June
    • V. Paxson. End-to-end Internet packet dynamics. IEEE/ ACM Trans. Networking, 7(3):277-292, June 1999.
    • (1999) IEEE/ ACM Trans. Networking , vol.7 , Issue.3 , pp. 277-292
    • Paxson, V.1
  • 18
    • 57349142855 scopus 로고    scopus 로고
    • Pastry: Scalable, distributed object location and routing for large-scale peer-to-peer systems
    • Heidelberg, Germany
    • A. Rowstron and P. Druschel. Pastry: Scalable, distributed object location and routing for large-scale peer-to-peer systems. In Proc. IFIP/ACM Middleware, pp. 329-350, Heidelberg, Germany, 2001.
    • (2001) Proc. IFIP/ACM Middleware , pp. 329-350
    • Rowstron, A.1    Druschel, P.2
  • 19
    • 9144231402 scopus 로고    scopus 로고
    • Providing fault-tolerant ad hoc routing service in adversarial environments
    • Y. Xue and K. Nahrstedt. Providing fault-tolerant ad hoc routing service in adversarial environments. Wireless Personal Communications, 29:367-388, 2004.
    • (2004) Wireless Personal Communications , vol.29 , pp. 367-388
    • Xue, Y.1    Nahrstedt, K.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.