-
1
-
-
0035789229
-
The quest for security in mobile ad hoc networks
-
New York, NY, USA: ACM
-
J.-P. Hubaux, L. Buttyán, and S. Capkun, "The quest for security in mobile ad hoc networks," in MobiHoc '01: Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking& computing. New York, NY, USA: ACM, 2001, pp. 146-155.
-
(2001)
MobiHoc '01: Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking& computing
, pp. 146-155
-
-
Hubaux, J.-P.1
Buttyán, L.2
Capkun, S.3
-
2
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
ACM
-
S. Marti, T. J. Giuli, K. Lai, and M. Baker, "Mitigating routing misbehavior in mobile ad hoc networks," in Proceedings of the 6th annual international conference on Mobile computing and networking. ACM, 2000, pp. 255-265.
-
(2000)
Proceedings of the 6th annual international conference on Mobile computing and networking
, pp. 255-265
-
-
Marti, S.1
Giuli, T.J.2
Lai, K.3
Baker, M.4
-
3
-
-
0034229404
-
Network information flow
-
R. Ahlswede, N. Cai, S.-Y. R. Li, and R. W. Yeung, "Network information flow," IEEE Transactions on Information Theory, vol. 46, pp. 1204-1216, 2000.
-
(2000)
IEEE Transactions on Information Theory
, vol.46
, pp. 1204-1216
-
-
Ahlswede, R.1
Cai, N.2
Li, S.-Y.R.3
Yeung, R.W.4
-
5
-
-
41749121006
-
On coding for reliable communication over packet networks
-
D. Lun, M. Médard, R. Koetter, and M. Effros, "On coding for reliable communication over packet networks," Physical Communication, vol. 1, no. 1, pp. 3-20.
-
Physical Communication
, vol.1
, Issue.1
, pp. 3-20
-
-
Lun, D.1
Médard, M.2
Koetter, R.3
Effros, M.4
-
7
-
-
34548349361
-
Resilient network coding in the presence of Byzantine adversaries
-
March
-
S. Jaggi, M. Langberg, S. Katti, T. Ho, D. Katabi, and M. Médard, "Resilient network coding in the presence of Byzantine adversaries," in Proceedings of IEEE INFOCOM, March 2007, pp. 616 - 624.
-
(2007)
Proceedings of IEEE INFOCOM
, pp. 616-624
-
-
Jaggi, S.1
Langberg, M.2
Katti, S.3
Ho, T.4
Katabi, D.5
Médard, M.6
-
8
-
-
48849089497
-
Coding for errors and erasures in random network coding
-
R. Koetter and F. R. Kschischang, "Coding for errors and erasures in random network coding," IEEE Transactions on Information Theory, vol. 54, no. 8, pp. 3579-3591.
-
IEEE Transactions on Information Theory
, vol.54
, Issue.8
, pp. 3579-3591
-
-
Koetter, R.1
Kschischang, F.R.2
-
9
-
-
62349095697
-
Countering Byzantine adversaries with network coding: An overhead analysis
-
M. Kim, M. Médard, and J. Barros, "Countering Byzantine adversaries with network coding: An overhead analysis," in Proceedings of MILCOM, 2008.
-
(2008)
Proceedings of MILCOM
-
-
Kim, M.1
Médard, M.2
Barros, J.3
-
10
-
-
0003828107
-
Network layer protocols with Byzantine robustness,
-
Ph.D. dissertation, Massachusetts Institute of Technology, Cambridge, MA, October
-
R. Perlman, "Network layer protocols with Byzantine robustness," Ph.D. dissertation, Massachusetts Institute of Technology, Cambridge, MA, October 1988.
-
(1988)
-
-
Perlman, R.1
-
12
-
-
84976699318
-
The Byzantine generals problem
-
L. Lamport, R. Shostak, and M. Pease, "The Byzantine generals problem," ACM Transactions on Programming Languages and Systems, vol. 4, pp. 382-401, 1982.
-
(1982)
ACM Transactions on Programming Languages and Systems
, vol.4
, pp. 382-401
-
-
Lamport, L.1
Shostak, R.2
Pease, M.3
-
14
-
-
0034228863
-
Authentication theory and hypothesis testing
-
U. M. Maurer, "Authentication theory and hypothesis testing," IEEE Transaction on Information Theory, vol. 46, pp. 1350-1356, 2000.
-
(2000)
IEEE Transaction on Information Theory
, vol.46
, pp. 1350-1356
-
-
Maurer, U.M.1
-
15
-
-
84860839700
-
Polynomial hash functions are reliable
-
Springer-Verlag
-
M. Dietzfelbinger, J. Gil, Y. Matias, and N. Pippenger, "Polynomial hash functions are reliable," in Proceedings of the 19th International Colloquium on Automata, Languages and Programming, vol. 623. Springer-Verlag, 1992, pp. 235-246.
-
(1992)
Proceedings of the 19th International Colloquium on Automata, Languages and Programming
, vol.623
, pp. 235-246
-
-
Dietzfelbinger, M.1
Gil, J.2
Matias, Y.3
Pippenger, N.4
|