-
1
-
-
33746474097
-
-
Springer: Berlin, Germany
-
Steinmetz, R.; Wehrle, K.; Götz, S.; Schollmeier, R.; Rieche, S.; Eberspächer, J.; Heckmann, O.; Darlagiannis, V.; Mauthe, A.; Koppen, C. Peer-to-Peer Systems and Applications; Springer: Berlin, Germany, 2005.
-
(2005)
Peer-to-Peer Systems and Applications
-
-
Steinmetz, R.1
Wehrle, K.2
Götz, S.3
Schollmeier, R.4
Rieche, S.5
Eberspächer, J.6
Heckmann, O.7
Darlagiannis, V.8
Mauthe, A.9
Koppen, C.10
-
2
-
-
0003025676
-
Freenet: A distributed anonymous information storage and retrieval system
-
Berkeley, CA, USA, 25–26 July
-
Clarke, I.; Sandberg, O.; Wiley, B.; Hong, T. Freenet: A distributed anonymous information storage and retrieval system. In Proceedings of the ICSI Workshop on Design Issues in Anonymity and Unobservability, Berkeley, CA, USA, 25–26 July 2000.
-
(2000)
Proceedings of the ICSI Workshop on Design Issues in Anonymity and Unobservability
-
-
Clarke, I.1
Sandberg, O.2
Wiley, B.3
Hong, T.4
-
3
-
-
77951280603
-
-
(accessed on 29 September 2010)
-
Kirk, P. Gnutella—A Protocol for a Revolution, 2010. Available online: http://rfc-gnutella. sourceforge.net/(accessed on 29 September 2010).
-
(2010)
Gnutella—A Protocol for a Revolution
-
-
Kirk, P.1
-
4
-
-
85109148523
-
-
Kazaa. Download KaZaA, (accessed on 29 September 2010)
-
Kazaa. Download KaZaA, 2010. Available online: www.kazaa.com/ (accessed on 29 September 2010).
-
(2010)
-
-
-
5
-
-
70449514879
-
-
TR 2007-1; Technical Report, Internet Education and Research Laboratory (intERLab), Asian Institute of Technology (AIT): Bangkok, Thailand
-
Kanchanasut, K.; Tunpan, A.; Awal, M.A.; Das, D.K.; Wongsaardsakul, T.; Tsuchimoto, Y. A Multimedia Communication System for Collaborative Emergency Response Operation in Disaster-affected Areas; TR 2007-1; Technical Report, Internet Education and Research Laboratory (intERLab), Asian Institute of Technology (AIT): Bangkok, Thailand, 2007.
-
(2007)
A Multimedia Communication System for Collaborative Emergency Response Operation in Disaster-affected Areas
-
-
Kanchanasut, K.1
Tunpan, A.2
Awal, M.A.3
Das, D.K.4
Wongsaardsakul, T.5
Tsuchimoto, Y.6
-
6
-
-
85109128734
-
-
Industrieanlagen-Betriebsgesellschaft mbH. (accessed on 29 September 2010)
-
Industrieanlagen-Betriebsgesellschaft mbH. IABG–InfoCom–HiMoNN—An efficient and highly mobile Ad-hoc Network Node, 2010. Available online: www.iabg.de/infokom/fachthemen/ himonn en.php (accessed on 29 September 2010).
-
(2010)
IABG–InfoCom–HiMoNN—An efficient and highly mobile Ad-hoc Network Node
-
-
-
8
-
-
85109188019
-
-
CAR 2 CAR Communication Consortium. (accessed on 29 September 2010)
-
CAR 2 CAR Communication Consortium. Mission & Objective, 2010. Available online: www.car-to-car.org/ (accessed on 29 September 2010).
-
(2010)
Mission & Objective
-
-
-
12
-
-
33750329949
-
Performance Analysis of Stealth DHT with Mobile Nodes
-
Pisa, Italy, 13–17 March
-
MacQuire, A.; Brampton, A.; Rai, I.A.; Mathy, L. Performance Analysis of Stealth DHT with Mobile Nodes. In Proceedings of the 4th Annual IEEE International Conference on Pervasive Computing and Communications Workshops, Pisa, Italy, 13–17 March 2006.
-
(2006)
Proceedings of the 4th Annual IEEE International Conference on Pervasive Computing and Communications Workshops
-
-
MacQuire, A.1
Brampton, A.2
Rai, I.A.3
Mathy, L.4
-
13
-
-
55849101519
-
Performance Evaluation of Structured P2P over Wireless Multi-hop Networks
-
Cap Esterel, France, 25–31 August
-
Castro, M.; Villanueva, E.; Ruiz, I.; Sargento, S.; Kassler, A.J. Performance Evaluation of Structured P2P over Wireless Multi-hop Networks. In Proceedings of the 2nd International Conference on Sensor Technologies and Applications, Cap Esterel, France, 25–31 August 2008.
-
(2008)
Proceedings of the 2nd International Conference on Sensor Technologies and Applications
-
-
Castro, M.1
Villanueva, E.2
Ruiz, I.3
Sargento, S.4
Kassler, A.J.5
-
15
-
-
85109165708
-
A Peer-to-Peer Overlay Approach for Emergency Mobile Ad Hoc Network Based Multimedia Communications
-
London, UK, 7–9 September
-
Millar, G.P.; Ramrekha, T.A.; Politis, C. A Peer-to-Peer Overlay Approach for Emergency Mobile Ad Hoc Network Based Multimedia Communications. In Proceedings of the 5th International ICST Mobile Multimedia Communications Conference, London, UK, 7–9 September 2009.
-
(2009)
Proceedings of the 5th International ICST Mobile Multimedia Communications Conference
-
-
Millar, G.P.1
Ramrekha, T.A.2
Politis, C.3
-
17
-
-
33750334527
-
Virtual ring routing: Network routing inspired by DHTs
-
Caesar, M.; Castro, M.; Nightingale, E.B.; O’Shea, G.; Rowstron, A. Virtual ring routing: Network routing inspired by DHTs. ACM SIGCOMM Comput. Commun. Rev. 2006, 36, 351–362.
-
(2006)
ACM SIGCOMM Comput. Commun. Rev
, vol.36
, pp. 351-362
-
-
Caesar, M.1
Castro, M.2
Nightingale, E.B.3
O’Shea, G.4
Rowstron, A.5
-
18
-
-
21644450056
-
Ekta: An Efficient DHT Substrate for Distributed Applications in Mobile Ad Hoc Networks
-
English Lake District, UK, 2–3 December
-
Pucha, H.; Das, S.M.; Hu, Y. Ekta: An Efficient DHT Substrate for Distributed Applications in Mobile Ad Hoc Networks. In Proceedings of the 6th IEEE Workshop on Mobile Computing Systems and Applications, English Lake District, UK, 2–3 December 2004.
-
(2004)
Proceedings of the 6th IEEE Workshop on Mobile Computing Systems and Applications
-
-
Pucha, H.1
Das, S.M.2
Hu, Y.3
-
19
-
-
78049330406
-
Exploiting the Synergy between Peer-to-Peer and Mobile Ad Hoc Networks
-
Lihue, HI, USA, 18–21 May
-
Hu, Y.C.; Das, S.M.; Pucha, H. Exploiting the Synergy between Peer-to-Peer and Mobile Ad Hoc Networks. In Proceedings of the 9th conference on Hot Topics in Operating Systems, Lihue, HI, USA, 18–21 May 2003.
-
(2003)
Proceedings of the 9th conference on Hot Topics in Operating Systems
-
-
Hu, Y.C.1
Das, S.M.2
Pucha, H.3
-
22
-
-
7444246627
-
Security Considerations for Peer-to-Peer Distributed Hash Tables
-
Cambridge, MA, USA, 7–8 March
-
Sit, E.; Morris, R. Security Considerations for Peer-to-Peer Distributed Hash Tables. In Proceedings of the 1st International Workshop on Peer-to-Peer Systems, Cambridge, MA, USA, 7–8 March 2002.
-
(2002)
Proceedings of the 1st International Workshop on Peer-to-Peer Systems
-
-
Sit, E.1
Morris, R.2
-
23
-
-
84978382732
-
Secure routing for structured peer-to-peer overlay networks
-
Boston, MA, USA, 9–11 December
-
Castro, M.; Druschel, P.; Ganesh, A.; Rowstron, A.; Wallach, D. Secure routing for structured peer-to-peer overlay networks. In Proceedings of the 5th Symposium on Operating Systems Design and Implementation, Boston, MA, USA, 9–11 December 2002.
-
(2002)
Proceedings of the 5th Symposium on Operating Systems Design and Implementation
-
-
Castro, M.1
Druschel, P.2
Ganesh, A.3
Rowstron, A.4
Wallach, D.5
-
24
-
-
21644471550
-
Vulnerabilities and Security Threats in Structured Overlay Networks: A Quantitative Analysis
-
Tucson, AZ, USA, 6–10 December
-
Srivatsa, M.; Liu, L. Vulnerabilities and Security Threats in Structured Overlay Networks: A Quantitative Analysis. In Proceedings of the 20th Annual Computer Security Applications Conference, Tucson, AZ, USA, 6–10 December 2004.
-
(2004)
Proceedings of the 20th Annual Computer Security Applications Conference
-
-
Srivatsa, M.1
Liu, L.2
-
30
-
-
35548992569
-
SybilGuard: Defending Against Sybil Attacks via Social Networks
-
Pisa, Italy, 11–15 September
-
Yu, H.; Kaminsky, M.; Gibbons, P.B.; Flaxman, A. SybilGuard: Defending Against Sybil Attacks via Social Networks. In Proceedings of the conference on Applications, technologies, architectures, and protocols for computer communications, Pisa, Italy, 11–15 September 2006.
-
(2006)
Proceedings of the conference on Applications, technologies, architectures, and protocols for computer communications
-
-
Yu, H.1
Kaminsky, M.2
Gibbons, P.B.3
Flaxman, A.4
-
31
-
-
33749992316
-
Sybil-Resistant DHT Routing
-
Milan, Italy, 12–14 September
-
Danezis, G.; Lesniewski-Laas, C.; Kaashoek, M.F.; Anderson, R.J. Sybil-Resistant DHT Routing. In Proceedings on the 10th European Symposium on Research in Computer Security, Milan, Italy, 12–14 September 2005.
-
(2005)
Proceedings on the 10th European Symposium on Research in Computer Security
-
-
Danezis, G.1
Lesniewski-Laas, C.2
Kaashoek, M.F.3
Anderson, R.J.4
-
32
-
-
29244445484
-
Sybilproof Reputation Mechanisms
-
Philadelphia, PA, USA, 22 August
-
Cheng, A.; Friedman, E. Sybilproof Reputation Mechanisms. In Proceedings of the ACM SIGCOMM workshop on Economics of peer-to-peer systems, Philadelphia, PA, USA, 22 August 2005.
-
(2005)
Proceedings of the ACM SIGCOMM workshop on Economics of peer-to-peer systems
-
-
Cheng, A.1
Friedman, E.2
-
33
-
-
79951484850
-
A Group-based Trust Metric for P2P Networks: Protection against Sybil Attack and Collusion
-
Wuhan, China, 12–14 December
-
Ji, W.; Yang, S.; Chen, B. A Group-based Trust Metric for P2P Networks: Protection against Sybil Attack and Collusion. In Proceedings of the International Conference on Computer Science and Software Engineering, Wuhan, China, 12–14 December 2008.
-
(2008)
Proceedings of the International Conference on Computer Science and Software Engineering
-
-
Ji, W.1
Yang, S.2
Chen, B.3
-
34
-
-
24144437206
-
How to misuse AODV: A case study of insider attacks against mobile ad-hoc routing protocols
-
Ning, P.; Sun, K. How to misuse AODV: A case study of insider attacks against mobile ad-hoc routing protocols. Ad Hoc Netw. 2005, 3, 795–819.
-
(2005)
Ad Hoc Netw
, vol.3
, pp. 795-819
-
-
Ning, P.1
Sun, K.2
-
35
-
-
0842283101
-
A Secure Routing Protocol for Ad Hoc Networks
-
Paris, France, 12–15 November
-
Sanzgiri, K.; Levine, B.N.; Shields, C.; Dahill, B.; Belding-Royer, E.M. A Secure Routing Protocol for Ad Hoc Networks. In Proceedings of the 10th IEEE International Conference on Network Protocols, Paris, France, 12–15 November 2002.
-
(2002)
Proceedings of the 10th IEEE International Conference on Network Protocols
-
-
Sanzgiri, K.1
Levine, B.N.2
Shields, C.3
Dahill, B.4
Belding-Royer, E.M.5
-
36
-
-
84961572484
-
SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks
-
Callicoon, NY, USA, 20–21 June
-
Hu, Y.C.; Johnson, D.B.; Perrig, A. SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks. In Proceedings of the 4th IEEE Workshop on Mobile Computing Systems and Applications, Callicoon, NY, USA, 20–21 June 2002.
-
(2002)
Proceedings of the 4th IEEE Workshop on Mobile Computing Systems and Applications
-
-
Hu, Y.C.1
Johnson, D.B.2
Perrig, A.3
-
37
-
-
0013138682
-
Secure Routing for Mobile Ad hoc Networks
-
San Antonio, TX, USA, 27–31 January
-
Papadimitratos, P.; Haas, Z.J. Secure Routing for Mobile Ad hoc Networks. In Proceedings of the SCS Communication Networks and Distributed Systems Modeling and Simulation Conference, San Antonio, TX, USA, 27–31 January 2002.
-
(2002)
Proceedings of the SCS Communication Networks and Distributed Systems Modeling and Simulation Conference
-
-
Papadimitratos, P.1
Haas, Z.J.2
-
38
-
-
0036980294
-
Securing Ad Hoc Routing Protocols
-
Atlanta, GA, USA, 28 September
-
Zapata, M.G.; Asokan, N. Securing Ad Hoc Routing Protocols. In Proceedings of the 1st ACM workshop on Wireless Security, Atlanta, GA, USA, 28 September 2002.
-
(2002)
Proceedings of the 1st ACM workshop on Wireless Security
-
-
Zapata, M.G.1
Asokan, N.2
-
39
-
-
0035789243
-
Security-Aware Ad hoc Routing for Wireless Networks
-
Long Beach, CA, USA, 4–5 October
-
Yi, S.; Naldurg, P.; Kravets, R. Security-Aware Ad hoc Routing for Wireless Networks. In Proceedings of the 2nd ACM International Symposium on Mobile Ad Hoc Networking & Computing, Long Beach, CA, USA, 4–5 October 2001.
-
(2001)
Proceedings of the 2nd ACM International Symposium on Mobile Ad Hoc Networking & Computing
-
-
Yi, S.1
Naldurg, P.2
Kravets, R.3
-
40
-
-
0034541756
-
Mitigating Routing Misbehavior in Mobile Ad Hoc Networks
-
Boston, MA, USA, 6–11 August
-
Marti, S.; Giuli, T.J.; Lai, K.; Baker, M. Mitigating Routing Misbehavior in Mobile Ad Hoc Networks. In Proceedings of the 6th Annual International Conference on Mobile Computing and Networking, Boston, MA, USA, 6–11 August 2000.
-
(2000)
Proceedings of the 6th Annual International Conference on Mobile Computing and Networking
-
-
Marti, S.1
Giuli, T.J.2
Lai, K.3
Baker, M.4
-
41
-
-
34548048170
-
Detecting Blackhole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning Method
-
Kurosawa, S.; Nakayama, H.; Kato, N.; Jamalipour, A.; Nemoto, Y. Detecting Blackhole Attack on AODV-based Mobile Ad Hoc Networks by Dynamic Learning Method. Int. J. Netw. Secur. 2007, 5, 338–346.
-
(2007)
Int. J. Netw. Secur
, vol.5
, pp. 338-346
-
-
Kurosawa, S.1
Nakayama, H.2
Kato, N.3
Jamalipour, A.4
Nemoto, Y.5
-
43
-
-
78651538701
-
Reliable Routing against Selective Packet Drop Attack in DSR based MANET
-
Bhalaji, N.; Shanmugam, A. Reliable Routing against Selective Packet Drop Attack in DSR based MANET. J. Softw. 2009, 4, 536–543.
-
(2009)
J. Softw
, vol.4
, pp. 536-543
-
-
Bhalaji, N.1
Shanmugam, A.2
-
44
-
-
3042785862
-
The Sybil Attack in Sensor Networks: Analysis & Defenses
-
Berkeley, CA, USA, 26–27 April
-
Newsome, J.; Shi, E.; Song, D.; Perrig, A. The Sybil Attack in Sensor Networks: Analysis & Defenses. In Proceedings of the 3rd International Symposium on Information Processing in Sensor Networks, Berkeley, CA, USA, 26–27 April 2004.
-
(2004)
Proceedings of the 3rd International Symposium on Information Processing in Sensor Networks
-
-
Newsome, J.1
Shi, E.2
Song, D.3
Perrig, A.4
-
45
-
-
37849019002
-
Detecting the Sybil Attack in Mobile Ad hoc Networks
-
Baltimore, MD, USA, 28 August–1 September
-
Piro, C.; Shields, C.; Levine, B.N. Detecting the Sybil Attack in Mobile Ad hoc Networks. In Proceedings of the 2nd International Conference on Security and Privacy in Communication Networks, Baltimore, MD, USA, 28 August–1 September 2006.
-
(2006)
Proceedings of the 2nd International Conference on Security and Privacy in Communication Networks
-
-
Piro, C.1
Shields, C.2
Levine, B.N.3
-
46
-
-
70449107634
-
Robust Sybil Detection for MANETs
-
San Francisco, CA, USA, 2–6 August
-
Tangpong, A.; Kesidis, G.; Hsu, H.Y.; Hurson, A. Robust Sybil Detection for MANETs. In Proceedings of the Proceedings of 18th International Conference on Computer Communications and Networks, San Francisco, CA, USA, 2–6 August 2009.
-
(2009)
Proceedings of the Proceedings of 18th International Conference on Computer Communications and Networks
-
-
Tangpong, A.1
Kesidis, G.2
Hsu, H.Y.3
Hurson, A.4
-
47
-
-
32844466166
-
Mobility Helps Peer-to-Peer Security
-
Čapkun, S.; Hubaux, J.P.; Buttyan, L. Mobility Helps Peer-to-Peer Security. IEEE Trans. Mob. Comput. 2006, 5, 43–51.
-
(2006)
IEEE Trans. Mob. Comput
, vol.5
, pp. 43-51
-
-
Čapkun, S.1
Hubaux, J.P.2
Buttyan, L.3
-
48
-
-
83355173159
-
Securing the Scalable Source Routing Protocol
-
Budapest, Hungary, 1–3 May
-
Kutzner, K.; Wallenta, C.; Fuhrmann, T. Securing the Scalable Source Routing Protocol. In Proceedings of the World Telecommunications Congress, Budapest, Hungary, 1–3 May 2006.
-
(2006)
Proceedings of the World Telecommunications Congress
-
-
Kutzner, K.1
Wallenta, C.2
Fuhrmann, T.3
|