-
1
-
-
70349111445
-
Mitigating control-channel jamming attacks in multi-channel ad hoc networks
-
L. Lazos, S. Liu, and M. Krunz, "Mitigating control-channel jamming attacks in multi-channel ad hoc networks," in Proc. of ACM WISEC'09, 2009, pp. 169-180.
-
(2009)
Proc. of ACM WISEC'09
, pp. 169-180
-
-
Lazos, L.1
Liu, S.2
Krunz, M.3
-
2
-
-
70349110082
-
A coding-theoretic approach for efficient message verification over insecure channels
-
ACM
-
D. Slater, P. Tague, R. Poovendran, and B. J. Matt, "A coding-theoretic approach for efficient message verification over insecure channels," in Proc. of ACM WISEC'09. ACM, 2009.
-
(2009)
Proc. of ACM WISEC'09
-
-
Slater, D.1
Tague, P.2
Poovendran, R.3
Matt, B.J.4
-
3
-
-
29844457889
-
The feasibility of launching and detecting jamming attacks in wireless networks
-
W. Xu, W. Trappe, Y. Zhang, and T. Wood, "The feasibility of launching and detecting jamming attacks in wireless networks," in Proc. of ACM MobiHoc'05, 2005, pp. 46-57.
-
(2005)
Proc. of ACM MobiHoc'05
, pp. 46-57
-
-
Xu, W.1
Trappe, W.2
Zhang, Y.3
Wood, T.4
-
6
-
-
50249175122
-
Jamming-resistant key establishment using uncoordinated frequency hopping
-
May
-
M. Strasser, C. Pöpper, S. Capkun, and M. Cagalj, "Jamming-resistant key establishment using uncoordinated frequency hopping," in Proc. Of IEEE Security and Privacy, May 2008.
-
(2008)
Proc. of IEEE Security and Privacy
-
-
Strasser, M.1
Pöpper, C.2
Capkun, S.3
Cagalj, M.4
-
8
-
-
77953998228
-
Zero pre-shared secret key establishment in the presence of jammers
-
T. Jin, G. Noubir, and B. Thapa, "Zero pre-shared secret key establishment in the presence of jammers," in MobiHoc, 2009.
-
(2009)
MobiHoc
-
-
Jin, T.1
Noubir, G.2
Thapa, B.3
-
9
-
-
77953306472
-
Randomized differential dsss: Jamming-resistant wireless broadcast communication
-
Y. Liu, P. Ning, H. Dai, and A. Liu, "Randomized differential dsss: Jamming-resistant wireless broadcast communication," in Proc. of IEEE INFOCOM 2010, 2010.
-
(2010)
Proc. of IEEE INFOCOM 2010
-
-
Liu, Y.1
Ning, P.2
Dai, H.3
Liu, A.4
-
11
-
-
24644463787
-
Efficient algorithms for online decision problems
-
A. T. Kalai and S. Vempala, "Efficient algorithms for online decision problems," Journal of Computer System and Sciences, vol. 71, no. 3, pp. 291-307, 2005.
-
(2005)
Journal of Computer System and Sciences
, vol.71
, Issue.3
, pp. 291-307
-
-
Kalai, A.T.1
Vempala, S.2
-
13
-
-
0029513526
-
Gambling in a rigged casino: The adversarial multi-arm bandit problem
-
P. Auer, N. Cesa-Bianchi, Y. Freund, and R. E. Schapire, "Gambling in a rigged casino: The adversarial multi-arm bandit problem," in Proc. Of IEEE FOCS'95, 1995, pp. 322-331.
-
(1995)
Proc. of IEEE FOCS'95
, pp. 322-331
-
-
Auer, P.1
Cesa-Bianchi, N.2
Freund, Y.3
Schapire, R.E.4
-
14
-
-
0037709910
-
The nonstochastic multiarmed bandit problem
-
-"The nonstochastic multiarmed bandit problem," SIAM J. Comput., vol. 32, no. 1, pp. 48-77, 2002.
-
(2002)
SIAM J. Comput.
, vol.32
, Issue.1
, pp. 48-77
-
-
Auer, P.1
Cesa-Bianchi, N.2
Freund, Y.3
Schapire, R.E.4
-
15
-
-
4544345025
-
Adaptive routing with end-to-end feedback: Distributed learning and geometric approaches
-
B. Awerbuch and R. D. Kleinberg, "Adaptive routing with end-to-end feedback: distributed learning and geometric approaches," in Proc. Of ACM STOC'04, 2004, pp. 45-53.
-
(2004)
Proc. of ACM STOC'04
, pp. 45-53
-
-
Awerbuch, B.1
Kleinberg, R.D.2
-
16
-
-
35948943542
-
The on-line shortest path problem under partial monitoring
-
A. György, T. Linder, G. Lugosi, and G. Ottucsák, "The on-line shortest path problem under partial monitoring," J. Mach. Learn. Res., vol. 8, pp. 2369-2403, 2007.
-
(2007)
J. Mach. Learn. Res.
, vol.8
, pp. 2369-2403
-
-
György, A.1
Linder, T.2
Lugosi, G.3
Ottucsák, G.4
-
17
-
-
9444243189
-
Efficient algorithms for online decision problems
-
A. Kalai and S. Vempala, "Efficient algorithms for online decision problems," in Proc. of COLT'03, 2003, pp. 26-40.
-
(2003)
Proc. of COLT'03
, pp. 26-40
-
-
Kalai, A.1
Vempala, S.2
-
18
-
-
24644470905
-
Online geometric optimization in the bandit setting against an adaptive adversary
-
H. B. McMahan and A. Blum, "Online geometric optimization in the bandit setting against an adaptive adversary," in COLT, 2004.
-
(2004)
COLT
-
-
McMahan, H.B.1
Blum, A.2
-
19
-
-
84946840347
-
Short signatures from the weil pairing
-
Springer-Verlag
-
D. Boneh, B. Lynn, and H. Shacham, "Short signatures from the weil pairing," in Proc. of ASIACRYPT'01. Springer-Verlag, pp. 514-532.
-
Proc. of ASIACRYPT'01
, pp. 514-532
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
20
-
-
79960866560
-
-
Q. Wang, P. Xu, K. Ren, and X.-Y. Li, "Delay-bounded ufh-based anti-jamming wireless communication," Illinois Institute of Technology, http://www.ece.iit.edu/~ubisec/TechReport09c.pdf, 2009.
-
(2009)
Delay-bounded Ufh-based Anti-jamming Wireless Communication
-
-
Wang, Q.1
Xu, P.2
Ren, K.3
Li, X.-Y.4
-
21
-
-
76249105714
-
Multiple round random ball placement: Power of second chance
-
X.-Y. Li, Y.Wang, and W. Feng, "Multiple round random ball placement: Power of second chance," in COCOON '09, 2009, pp. 439-448.
-
(2009)
COCOON ' 09
, pp. 439-448
-
-
Li, X.-Y.1
Wang, Y.2
Feng, W.3
-
23
-
-
0030671783
-
Practical loss-resilient codes
-
M. G. Luby, M. Mitzenmacher, M. A. Shokrollahi, D. A. Spielman, and V. Stemann, "Practical loss-resilient codes," in Proc. of ACM STOC'97, 1997, pp. 150-159.
-
(1997)
Proc. of ACM STOC'97
, pp. 150-159
-
-
Luby, M.G.1
Mitzenmacher, M.2
Shokrollahi, M.A.3
Spielman, D.A.4
Stemann, V.5
|