-
4
-
-
0034848036
-
Early detection of message forwarding faults
-
A. Herzberg and S. Kutten, "Early detection of message forwarding faults," SIAM J. Comput., vol. 30, no. 4, pp. 1169-1196, 2000.
-
(2000)
SIAM J. Comput.
, vol.30
, Issue.4
, pp. 1169-1196
-
-
Herzberg, A.1
Kutten, S.2
-
5
-
-
0031703272
-
Detecting disruptive routers: A distributed network monitoring approach
-
Sept./Oct.
-
K. Bradley et al, "Detecting disruptive routers: A distributed network monitoring approach," IEEE Network Magazine. Sept./Oct. 1998.
-
(1998)
IEEE Network Magazine
-
-
Bradley, K.1
-
6
-
-
0036986441
-
An on-demand secure routing protocol resilient to byzantine failures
-
Atlanta, GA, Sept.
-
B. Awerbuch, D. Holmer, C. Nita-Rotaru, and H. Rubens, "An on-demand secure routing protocol resilient to byzantine failures," in Proc. 2002 ACM Workshop on Wireless Security, Atlanta, GA, Sept. 2002.
-
(2002)
Proc. 2002 ACM Workshop on Wireless Security
-
-
Awerbuch, B.1
Holmer, D.2
Nita-Rotaru, C.3
Rubens, H.4
-
7
-
-
0033296081
-
Lowering security overhead in link state routing
-
Apr.
-
R. Hauser, T. Przygienda, and G. Tsudik, "Lowering security overhead in link state routing," Computer Networks, vol. 31, no. 8. pp. 885-894, Apr. 1999.
-
(1999)
Computer Networks
, vol.31
, Issue.8
, pp. 885-894
-
-
Hauser, R.1
Przygienda, T.2
Tsudik, G.3
-
9
-
-
85034495108
-
Digital signature protection of the ospf routing protocol
-
San Diego, CA
-
S. Murphy and M. Badger, "Digital signature protection of the ospf routing protocol," in Proc. Symposium on Network and Distributed System Security, NDSS '96, San Diego, CA, 1996.
-
(1996)
Proc. Symposium on Network and Distributed System Security, NDSS '96
-
-
Murphy, S.1
Badger, M.2
-
10
-
-
0036957315
-
Ariadne: A secure on-demand routing protocol for ad hoc networks
-
Atlanta, GA, Sept.
-
Y. Hu, A. Perrig, and D. Johnson, "Ariadne: A secure on-demand routing protocol for ad hoc networks," in Proc. 8th Annual International Conference on Mobile Computing and Networking, Atlanta, GA, Sept. 2002.
-
(2002)
Proc. 8th Annual International Conference on Mobile Computing and Networking
-
-
Hu, Y.1
Perrig, A.2
Johnson, D.3
-
11
-
-
0030695529
-
Securing distance-vector routing protocols
-
San Diego, CA
-
B. Smith, S. Murthy, and J. Garcia-Luna-Aceves, "Securing distance-vector routing protocols," in Proc. Symposium on Network and Distributed System Security, NDSS '97, San Diego, CA, 1997.
-
(1997)
Proc. Symposium on Network and Distributed System Security, NDSS '97
-
-
Smith, B.1
Murthy, S.2
Garcia-Luna-Aceves, J.3
-
13
-
-
0032661699
-
Multicast security: A taxonomy and some efficient constructions
-
New York, NY, Mar.
-
R. Canetti et al., "Multicast security: A taxonomy and some efficient constructions," in Proc. IEEE Infocom 1999, New York, NY, Mar. 1999.
-
(1999)
Proc. IEEE Infocom 1999
-
-
Canetti, R.1
-
14
-
-
15744368857
-
Efficient and secure source authentication for multicast
-
San Diego, CA
-
A. Perrig, R. Canetti, D. Song, and D. Tygar, "Efficient and secure source authentication for multicast," in Proc. Network and Distributed System Security Symposium. NDSS '01, San Diego, CA, 2001.
-
(2001)
Proc. Network and Distributed System Security Symposium. NDSS '01
-
-
Perrig, A.1
Canetti, R.2
Song, D.3
Tygar, D.4
-
15
-
-
84862465628
-
-
http://www.cs.ucdavis.edu/~rogaway/umac/.
-
-
-
-
17
-
-
0036806325
-
Computing shortest paths for any number of hops
-
Oct.
-
R. Guerin and A. Orda, "Computing shortest paths for any number of hops," IEEE/ACM Transactions on Networking, vol. 10, no. 5, Oct. 2002.
-
(2002)
IEEE/ACM Transactions on Networking
, vol.10
, Issue.5
-
-
Guerin, R.1
Orda, A.2
-
18
-
-
0016994386
-
On two problems in the generation of program test paths
-
Sept.
-
H. Gabow, S. Maheshwari, and L. Osterweil, "On two problems in the generation of program test paths," IEEE Trans. Software Engineering, vol. 2, no. 3, Sept. 1976.
-
(1976)
IEEE Trans. Software Engineering
, vol.2
, Issue.3
-
-
Gabow, H.1
Maheshwari, S.2
Osterweil, L.3
-
20
-
-
0006807792
-
Polynomially bounded minimization problems that are hard to approximate
-
V. Kann, "Polynomially bounded minimization problems that are hard to approximate," Nordic J. Comp., vol. 1, pp. 317-331, 1994.
-
(1994)
Nordic J. Comp.
, vol.1
, pp. 317-331
-
-
Kann, V.1
-
21
-
-
0026624588
-
On the complexity of approximating the independent set problem
-
P. Berman and G. Schitger, "On the complexity of approximating the independent set problem," Inform. and Comput. 96, pp. 77-94, 1992.
-
(1992)
Inform. and Comput.
, vol.96
, pp. 77-94
-
-
Berman, P.1
Schitger, G.2
-
22
-
-
0027541184
-
A protocol for route establishment and packet forwarding across multidomain internets
-
Feb.
-
D. Estrin, M. Steenstrup, and G. Tsudik, "A protocol for route establishment and packet forwarding across multidomain internets," IEEE/ACM Trans. Networking, vol. 1, no. 1, pp. 56-70, Feb. 1993.
-
(1993)
IEEE/ACM Trans. Networking
, vol.1
, Issue.1
, pp. 56-70
-
-
Estrin, D.1
Steenstrup, M.2
Tsudik, G.3
-
23
-
-
0342270864
-
Scalable inter-domain routing architecture
-
Baltimore, MD, Aug.
-
D. Estrin, Y. Rekhter, and S. Hotz, "Scalable inter-domain routing architecture," in Proc. ACM SIGCOMM, Baltimore, MD, Aug. 1992.
-
(1992)
Proc. ACM SIGCOMM
-
-
Estrin, D.1
Rekhter, Y.2
Hotz, S.3
|