-
2
-
-
0036036742
-
Resilient overlay networks
-
D. G. Andersen, H. Balakrishnan, F. Kaashoek, and R. Morris. Resilient overlay networks. In Proc. ACM Symp. Operating Systems Principles, pp. 131-145, 2001.
-
(2001)
Proc. ACM Symp. Operating Systems Principles
, pp. 131-145
-
-
Andersen, D.G.1
Balakrishnan, H.2
Kaashoek, F.3
Morris, R.4
-
3
-
-
0036986441
-
An on-demand secure routing protocol resilient to Byzantine failures
-
Atlanta, GA
-
B. Awerbuch, D. Holmer, C. Nita-Rotaru, and H. Rubens. An on-demand secure routing protocol resilient to Byzantine failures. In Proc. ACM WiSe, pp. 21-30, Atlanta, GA, 2002.
-
(2002)
Proc. ACM WiSe
, pp. 21-30
-
-
Awerbuch, B.1
Holmer, D.2
Nita-Rotaru, C.3
Rubens, H.4
-
4
-
-
0000178416
-
Modeling Internet topology
-
June
-
K. Calvert, M. Doar, and E. W. Zegura. Modeling Internet topology. IEEE Communications Magazine, 35(6): 160-163, June 1997.
-
(1997)
IEEE Communications Magazine
, vol.35
, Issue.6
, pp. 160-163
-
-
Calvert, K.1
Doar, M.2
Zegura, E.W.3
-
5
-
-
84978382732
-
Secure routing for structured peer-to-peer overlay networks
-
Boston, MA
-
M. Castro, P. Druschel, A. Ganesh, A. Rowstron, and D. S. Wallach. Secure routing for structured peer-to-peer overlay networks. In Proc. Symp. Operating Systems Design and Implementation, Boston, MA, 2002.
-
(2002)
Proc. Symp. Operating Systems Design and Implementation
-
-
Castro, M.1
Druschel, P.2
Ganesh, A.3
Rowstron, A.4
Wallach, D.S.5
-
6
-
-
0037987889
-
End-to-end WAN service availability
-
Apr.
-
M. Dahlin, B. B. V. Chandra, L. Gao, and A. Nayate. End-to-end WAN service availability. IEEE/ACM Trans. Networking, 11(2):300-313, Apr. 2003.
-
(2003)
IEEE/ACM Trans. Networking
, vol.11
, Issue.2
, pp. 300-313
-
-
Dahlin, M.1
Chandra, B.B.V.2
Gao, L.3
Nayate, A.4
-
7
-
-
0003780715
-
-
Addison-Wesley, Reading, MA, USA
-
F. Harary. Graph Theory. Addison-Wesley, Reading, MA, USA, 1969.
-
(1969)
Graph Theory
-
-
Harary, F.1
-
8
-
-
0036957315
-
Ariadne: A secure on-demand routing protocol for ad hoc networks
-
Atlanta, GA
-
Y.-C. Hu, A. Perrig, and D. B. Johnson. Ariadne: A secure on-demand routing protocol for ad hoc networks. In Proc. MobiCom, pp. 12-23, Atlanta, GA, 2002.
-
(2002)
Proc. MobiCom
, pp. 12-23
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
9
-
-
33744945767
-
SOS: Secure overlay services. in
-
Pittsburgh, PA
-
A. D. Keromytis, V. Misra, and D. Rubenstein. SOS: Secure overlay services. In Proc. ACM SIGCOMM, pp. 61-72, Pittsburgh, PA, 2002.
-
(2002)
Proc. ACM SIGCOMM
, pp. 61-72
-
-
Keromytis, A.D.1
Misra, V.2
Rubenstein, D.3
-
10
-
-
0003196107
-
HMAC: Keyed-hashing for message authentication
-
H. Krawczyk, M. Bellare, and R. Canetti. HMAC: Keyed-hashing for message authentication. IETF RFC 2104, 1997.
-
(1997)
IETF RFC
, vol.2104
-
-
Krawczyk, H.1
Bellare, M.2
Canetti, R.3
-
11
-
-
0035360862
-
Delayed Internet routing convergence
-
June
-
C. Labovitz, A. Ahuja, A. Bose, and F. Jahanian. Delayed Internet routing convergence. IEEE/ACM Trans. Networking, 9(3):293-306, June 2001.
-
(2001)
IEEE/ACM Trans. Networking
, vol.9
, Issue.3
, pp. 293-306
-
-
Labovitz, C.1
Ahuja, A.2
Bose, A.3
Jahanian, F.4
-
12
-
-
84976699318
-
The Byzantine generals problem
-
July
-
L. Lamport, R. Shostak, and M. Pease. The Byzantine generals problem. ACM Trans. Programming Languages and Systems, 4(3):382-401, July 1982.
-
(1982)
ACM Trans. Programming Languages and Systems
, vol.4
, Issue.3
, pp. 382-401
-
-
Lamport, L.1
Shostak, R.2
Pease, M.3
-
13
-
-
84948389421
-
Simulating group communication protocols through an object-oriented framework
-
San Diego, CA
-
H. H. Muhammad and M. P. Barcellos. Simulating group communication protocols through an object-oriented framework. In Proc. Annual Simulation Symp., pp. 143-150, San Diego, CA, 2002.
-
(2002)
Proc. Annual Simulation Symp.
, pp. 143-150
-
-
Muhammad, H.H.1
Barcellos, M.P.2
-
14
-
-
0036805086
-
Securing the Internet routing infrastructure
-
Oct.
-
P. Papadimitratos and Z. J. Haas. Securing the Internet routing infrastructure. IEEE Communications Magazine, 40(10):60-68, Oct. 2002.
-
(2002)
IEEE Communications Magazine
, vol.40
, Issue.10
, pp. 60-68
-
-
Papadimitratos, P.1
Haas, Z.J.2
-
15
-
-
0031247411
-
End-to-end routing behavior in the Internet
-
Oct.
-
V. Paxson. End-to-end routing behavior in the Internet. IEEE/ACM Trans. Networking, 5(5):601-615, Oct. 1997.
-
(1997)
IEEE/ACM Trans. Networking
, vol.5
, Issue.5
, pp. 601-615
-
-
Paxson, V.1
-
16
-
-
0032677326
-
End-to-end Internet packet dynamics
-
June
-
V. Paxson. End-to-end Internet packet dynamics. IEEE/ ACM Trans. Networking, 7(3):277-292, June 1999.
-
(1999)
IEEE/ ACM Trans. Networking
, vol.7
, Issue.3
, pp. 277-292
-
-
Paxson, V.1
-
17
-
-
0003828107
-
-
PhD thesis, Massachusetts Institute of Technology, Cambridge, MA, USA, Jan.
-
R. J. Perlman. Network Layer Protocols with Byzantine Robustness. PhD thesis, Massachusetts Institute of Technology, Cambridge, MA, USA, Jan. 1988.
-
(1988)
Network Layer Protocols with Byzantine Robustness
-
-
Perlman, R.J.1
-
18
-
-
57349142855
-
Pastry: Scalable, distributed object location and routing for large-scale peer-to-peer systems
-
Heidelberg, Germany
-
A. Rowstron and P. Druschel. Pastry: Scalable, distributed object location and routing for large-scale peer-to-peer systems. In Proc. IFIP/ACM Middleware, pp. 329-350, Heidelberg, Germany, 2001.
-
(2001)
Proc. IFIP/ACM Middleware
, pp. 329-350
-
-
Rowstron, A.1
Druschel, P.2
-
19
-
-
9144231402
-
Providing fault-tolerant ad hoc routing service in adversarial environments
-
Y. Xue and K. Nahrstedt. Providing fault-tolerant ad hoc routing service in adversarial environments. Wireless Personal Communications, 29:367-388, 2004.
-
(2004)
Wireless Personal Communications
, vol.29
, pp. 367-388
-
-
Xue, Y.1
Nahrstedt, K.2
|