-
1
-
-
0034541756
-
Mitigating routing misbehavior in mobile ad hoc networks
-
New York, NY, USA: ACM
-
S. Marti, T. J. Giuli, K. Lai, and M. Baker, "Mitigating routing misbehavior in mobile ad hoc networks," in MobiCom '00: Proceedings of the 6th annual international conference on Mobile computing and networking. New York, NY, USA: ACM, 2000, pp. 255-265.
-
(2000)
MobiCom '00: Proceedings of the 6th Annual International Conference on Mobile Computing and Networking
, pp. 255-265
-
-
Marti, S.1
Giuli, T.J.2
Lai, K.3
Baker, M.4
-
2
-
-
29844453185
-
Towards designing a trusted routing solution in mobile ad hoc networks
-
T. Ghosh, N. Pissinou, and K. Makki, "Towards designing a trusted routing solution in mobile ad hoc networks," Mob. Netw. Appl., vol. 10, no. 6, pp. 985-995, 2005.
-
(2005)
Mob. Netw. Appl.
, vol.10
, Issue.6
, pp. 985-995
-
-
Ghosh, T.1
Pissinou, N.2
Makki, K.3
-
4
-
-
0242696192
-
Performance analysis of the confidant protocol
-
NewYork,NY, USA: ACM
-
S. Buchegger and J.-Y. Le Boudec, "Performance analysis of the confidant protocol," in MobiHoc '02: Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing. NewYork,NY, USA: ACM, 2002, pp. 226-236.
-
(2002)
MobiHoc '02: Proceedings of the 3rd ACM International Symposium on Mobile Ad Hoc Networking & Computing
, pp. 226-236
-
-
Buchegger, S.1
Le Boudec, J.-Y.2
-
5
-
-
33745940320
-
A quantitative trust establishment framework for reliable data packet delivery in manets
-
New York, NY, USA: ACM
-
C. Zouridaki, B. L. Mark, M. Hejmo, and R. K. Thomas, "A quantitative trust establishment framework for reliable data packet delivery in manets," in SASN '05: Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks. New York, NY, USA: ACM, 2005, pp. 1-10.
-
(2005)
SASN '05: Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks
, pp. 1-10
-
-
Zouridaki, C.1
Mark, B.L.2
Hejmo, M.3
Thomas, R.K.4
-
6
-
-
14844315770
-
Reputation-based framework for high integrity sensor networks
-
NewYork,NY, USA: ACM
-
S. Ganeriwal and M. B. Srivastava, "Reputation-based framework for high integrity sensor networks," in SASN '04: Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks. NewYork,NY, USA: ACM, 2004, pp. 66-77.
-
(2004)
SASN '04: Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor Networks
, pp. 66-77
-
-
Ganeriwal, S.1
Srivastava, M.B.2
-
7
-
-
44049100993
-
Signatures for network coding
-
D. C. Kamal, D. Charles, K. Jain, and K. Lauter, "Signatures for network coding," in In Proceedings of the fortieth annual Conference on Information Sciences and Systems, 2006.
-
Proceedings of the Fortieth Annual Conference on Information Sciences and Systems, 2006
-
-
Kamal, D.C.1
Charles, D.2
Jain, K.3
Lauter, K.4
-
8
-
-
51349130622
-
An efficient signature-based scheme for securing network coding against pollution attacks
-
IEEE, April
-
Z. Yu, Y. Wei, B. Ramkumar, and Y. Guan, "An efficient signature-based scheme for securing network coding against pollution attacks," INFOCOM 2008. The 27th Conference on Computer Communications. IEEE, pp. 1409-1417, April 2008.
-
(2008)
INFOCOM 2008. the 27th Conference on Computer Communications
, pp. 1409-1417
-
-
Yu, Z.1
Wei, Y.2
Ramkumar, B.3
Guan, Y.4
-
9
-
-
51649125221
-
Signatures for content distribution with network coding
-
F. Zhao, T. Kalker, M. Medard, and K. J. Han, "Signatures for content distribution with network coding," in In Proc. of International Symposium on Information Theory (ISIT, 2007.
-
Proc. of International Symposium on Information Theory ISIT, 2007
-
-
Zhao, F.1
Kalker, T.2
Medard, M.3
Han, K.J.4
-
10
-
-
46149123879
-
On the practical and security issues of batch content distribution via network coding
-
Nov.
-
Q. Li, D.-M. Chiu, and J. Lui, "On the practical and security issues of batch content distribution via network coding," Network Protocols, 2006. ICNP '06. Proceedings of the 2006 14th IEEE International Conference on, pp. 158-167, Nov. 2006.
-
(2006)
Network Protocols, 2006. ICNP '06. Proceedings of the 2006 14th IEEE International Conference on
, pp. 158-167
-
-
Li, Q.1
Chiu, D.-M.2
Lui, J.3
-
11
-
-
3543050732
-
On-the-fly verification of rateless erasure codes for efficient content distribution
-
M. N. Krohn, "On-the-fly verification of rateless erasure codes for efficient content distribution," in In Proceedings of the IEEE Symposium on Security and Privacy, 2004, pp. 226-240.
-
(2004)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 226-240
-
-
Krohn, M.N.1
-
13
-
-
70449514496
-
-
T. Ho, B. Leong, R. Koetter, M. Medard, M. Effros, and D. Karger, "Byzantine modification detection in multicast networks using randomized network coding," 2004.
-
(2004)
Byzantine Modification Detection in Multicast Networks Using Randomized Network Coding
-
-
Ho, T.1
Leong, B.2
Koetter, R.3
Medard, M.4
Effros, M.5
Karger, D.6
-
14
-
-
34548349361
-
Resilient network coding in the presence of byzantine adversaries
-
IEEE, May
-
S. Jaggi, M. Langberg, S. Katti, T. Ho, D. Katabi, and M. Medard, "Resilient network coding in the presence of byzantine adversaries," INFOCOM 2007. 26th IEEE International Conference on Computer Communications. IEEE, pp. 616-624, May 2007.
-
(2007)
INFOCOM 2007. 26th IEEE International Conference on Computer Communications
, pp. 616-624
-
-
Jaggi, S.1
Langberg, M.2
Katti, S.3
Ho, T.4
Katabi, D.5
Medard, M.6
-
15
-
-
62349095697
-
Counteracting byzantine adversaries with network coding: An overhead analysis
-
IEEE, Nov.
-
M. Kim, M. Medard, and J. Barros, "Counteracting byzantine adversaries with network coding: An overhead analysis," in Military Communications Conference, 2008. MILCOM 2008. IEEE, Nov. 2008, pp. 1-7.
-
(2008)
Military Communications Conference, 2008. MILCOM 2008
, pp. 1-7
-
-
Kim, M.1
Medard, M.2
Barros, J.3
-
16
-
-
70349146976
-
Practical defenses against pollution attacks in intra-flow network coding for wireless mesh networks
-
New York, NY, USA: ACM
-
J. Dong, R. Curtmola, and C. Nita-Rotaru, "Practical defenses against pollution attacks in intra-flow network coding for wireless mesh networks," in WiSec '09: Proceedings of the second ACM conference on Wireless network security. New York, NY, USA: ACM, 2009, pp. 111-122.
-
(2009)
WiSec '09: Proceedings of the Second ACM Conference on Wireless Network Security
, pp. 111-122
-
-
Dong, J.1
Curtmola, R.2
Nita-Rotaru, C.3
-
17
-
-
70449514921
-
An algebraic watchdog for wireless network coding
-
M. Kim, R. Kotter, M. Medard, and J. Barros, "An algebraic watchdog for wireless network coding," in Information Theory, 2009. ISIT 2009. IEEE International Symposium on, 28 2009-July 3 2009, pp. 1159-1163.
-
Information Theory, 2009. ISIT 2009. IEEE International Symposium On, 28 2009-July 3 2009
, pp. 1159-1163
-
-
Kim, M.1
Kotter, R.2
Medard, M.3
Barros, J.4
-
18
-
-
77949578432
-
-
Technical Report, CSL, UIUC, May
-
G. Liang and N. Vaidya, "When watchdog meets coding," Technical Report, CSL, UIUC, May 2009.
-
(2009)
When Watchdog Meets Coding
-
-
Liang, G.1
Vaidya, N.2
|