메뉴 건너뛰기




Volumn 2928, Issue , 2003, Pages 184-198

Dependable and secure data storage in wireless ad hoc networks: An assessment of DS2

Author keywords

[No Author keywords available]

Indexed keywords

AD HOC NETWORKS; COMPLEX NETWORKS; DATA STORAGE EQUIPMENT; DIGITAL STORAGE; ENCODING (SYMBOLS); MOBILE SECURITY; NUMBERING SYSTEMS; PEER TO PEER NETWORKS; TELECOMMUNICATION NETWORKS;

EID: 35048880121     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: None     Document Type: Article
Times cited : (13)

References (21)
  • 1
    • 0000629443 scopus 로고    scopus 로고
    • Dynamic source routing in ad hoc wireless networks
    • edited by T. Imielinski and H. Korth, chapter 5, Kluwer Academic Publishers
    • D. B. Johnson and D. A. Maltz: Dynamic source routing in ad hoc wireless networks. Mobile Computing, edited by T. Imielinski and H. Korth, chapter 5, pp. 153-181. Kluwer Academic Publishers (1996)
    • (1996) Mobile Computing , pp. 153-181
    • Johnson, D.B.1    Maltz, D.A.2
  • 3
    • 0035015898 scopus 로고    scopus 로고
    • Investigating the Energy Consumption of a Wireless Network Interface in an Ad Hoc Networking Environment
    • Anchorage AK
    • th INFOCOM, Vol. 3, Anchorage AK (2001) 1548-1557
    • (2001) th INFOCOM , vol.3 , pp. 1548-1557
    • Feeney, L.M.1    Nilsson, M.2
  • 7
    • 84864878161 scopus 로고
    • Designing secure and reliable applications using fragmentation-redundancy-scattering: An object-oriented approach
    • Berlin, Germany
    • J. C. Fabre, Y. Deswarte, and B. Randell. "Designing secure and reliable applications using fragmentation-redundancy-scattering: an object-oriented approach. Proc. 1st European Dependable Computing Conference, Berlin, Germany (1994) 21-38
    • (1994) Proc. 1st European Dependable Computing Conference , pp. 21-38
    • Fabre, J.C.1    Deswarte, Y.2    Randell, B.3
  • 10
    • 0024641589 scopus 로고
    • Efficient Dispersal of Information for Security, Load Balancing, and Fault Tolerance
    • M. O. Rabin : Efficient Dispersal of Information for Security, Load Balancing, and Fault Tolerance. Journal of the ACM, Vol.36, (2) (1989) 335-348
    • (1989) Journal of the ACM , vol.36 , Issue.2 , pp. 335-348
    • Rabin, M.O.1
  • 11
    • 0031122982 scopus 로고    scopus 로고
    • Effective Erasure Codes for Reliable Computer Communication Protocols
    • L. Rizzo : Effective Erasure Codes for Reliable Computer Communication Protocols. ACM Computer Communication Review, Vol. 27 (2) (1997) 24-36
    • (1997) ACM Computer Communication Review , vol.27 , Issue.2 , pp. 24-36
    • Rizzo, L.1
  • 13
    • 0015603268 scopus 로고
    • Error Correcting Properties of Redundant Residue Number Systems
    • F. Barsi and P. Maestrini : Error Correcting Properties of Redundant Residue Number Systems. IEEE Transactions on Computers, Vol. C-22 (3) (1973) 307-315
    • (1973) IEEE Transactions on Computers , vol.C-22 , Issue.3 , pp. 307-315
    • Barsi, F.1    Maestrini, P.2
  • 14
    • 0000262556 scopus 로고
    • Error Correction in Residue Arithmetic
    • D. Mandelbaum : Error Correction in Residue Arithmetic. IEEE Transactions on Computers, Vol. C-21 (6) (1972) 538-545
    • (1972) IEEE Transactions on Computers , vol.C-21 , Issue.6 , pp. 538-545
    • Mandelbaum, D.1
  • 16
    • 0016872396 scopus 로고
    • On a Class of Arithmetic Codes and Decoding Algorithm
    • D. Mandelbaum : On a Class of Arithmetic Codes and Decoding Algorithm. IEEE Transactions on Information Theory, Vol. IT-21 (1976) 85-88
    • (1976) IEEE Transactions on Information Theory , vol.IT-21 , pp. 85-88
    • Mandelbaum, D.1
  • 17
    • 0037800872 scopus 로고
    • Improved Decoding Algorithms for Arithmetic Residues Codes
    • F. Barsi and P. Maestrini: Improved Decoding Algorithms for Arithmetic Residues Codes. IEEE Transactions on Information Theory, Vol. IT-24 (1978) 640-643
    • (1978) IEEE Transactions on Information Theory , vol.IT-24 , pp. 640-643
    • Barsi, F.1    Maestrini, P.2
  • 18
    • 0026679190 scopus 로고
    • A coding theory approach to error control in redundant residue number systems. II. Multiple Error detection and correction
    • J. D. Sun and H. Krishna: A coding theory approach to error control in redundant residue number systems. II. Multiple Error detection and correction. IEEE Transactions on Circuits and Systems II: Analog and Digital Signal Processing, 39 (1) (1992) 18-34
    • (1992) IEEE Transactions on Circuits and Systems II: Analog and Digital Signal Processing , vol.39 , Issue.1 , pp. 18-34
    • Sun, J.D.1    Krishna, H.2
  • 20
    • 35048891868 scopus 로고    scopus 로고
    • Keying hash functions for message authentication
    • Advances in Cryptology - Crypto 96 Proceedings, N. Koblitz ed, Springer-Verlag
    • M. Bellare, R. Canetti, and H. Krawczyk: Keying hash functions for message authentication, in Advances in Cryptology - Crypto 96 Proceedings, LNCS Vol. 1109, N. Koblitz ed, Springer-Verlag (1996)
    • (1996) LNCS Vol. 1109 , vol.1109
    • Bellare, M.1    Canetti, R.2    Krawczyk, H.3
  • 21
    • 0034777649 scopus 로고    scopus 로고
    • Intercepting mobile communications: The insecurity of 802.11
    • Rome, Italy
    • Nikita Borisov, Ian Goldberg, David Wagner: Intercepting mobile communications: the insecurity of 802.11. MOBICOM 2001, Rome, Italy (2001) 180-189
    • (2001) MOBICOM 2001 , pp. 180-189
    • Borisov, N.1    Goldberg, I.2    Wagner, D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.