13.07.2015 Views

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

162 M. Just, E. Kranakis, and T. Wan4. K.A. Bradley, S. Cheung, N. Puketza, B. Mukherjee, and R.A. Olsson. Detect<strong>in</strong>g DisruptiveRouters: A Distributed Network Monitor<strong>in</strong>g Approach. In Proceed<strong>in</strong>gs of the IEEE Symposiumon Research <strong>in</strong> Security and Privacy, pages 115-124, May 1998.5. S. Buchegger and J.Y. Le Boudec. Performance Analysis of the CONFIDANT Protocol (CooperationOf Nodes - Fairness In Dynamic Ad-hoc NeTworks) In Proceed<strong>in</strong>gs of the ThirdACM International Symposium on Mobile Ad Hoc Network<strong>in</strong>g and Comput<strong>in</strong>g, (MobiHoc2002), June 2002.6. H. Burch and H. Cheswich. Trac<strong>in</strong>g anonymous packets to their approximate source. InProceed<strong>in</strong>gs of USENIX LISA. pages 319-327, New Orleans, LA, December 2002.7. S. Cheung. An Efficient Message Authentication Scheme for L<strong>in</strong>k State Rout<strong>in</strong>g. In Proceed<strong>in</strong>gsof the 13th Annual <strong>Computer</strong> Security Applications Conference, San Diego, California,USA, December 1997.8. S. Cheung and K. Levitt. Protect<strong>in</strong>g rout<strong>in</strong>g <strong>in</strong>frastructure from denial of service us<strong>in</strong>g cooperative<strong>in</strong>trusion detection. In Proceed<strong>in</strong>gs of New Security Paradigms Workshop, GreatLangdale, Cumbria, UK, September 1997.9. B.P. Crow, I.K. Widjaja, G. Jeong, and P.T. Sakai. IEEE 802.11 Wireless Local Area Networks.IEEE Communications Magaz<strong>in</strong>e, vol. 35, No. 9: pages 116-126, September 1997.10. A. Habib, M. Hefeeda, and B. Bhargava. Detect<strong>in</strong>g Service Violations and DoS Attacks.In Proceed<strong>in</strong>gs of 2003 Internet Society Symposium on Network and Distributed SystemSecurity (NDSS’03), San Diego, California, USA. February 2003.11. Y.C. Hu and D.B. Johnson. Cach<strong>in</strong>g Strategies <strong>in</strong> On-Demand Rout<strong>in</strong>g Protocols for WirelessAd Hoc Networks. In Proceed<strong>in</strong>gs of the Sixth Annual IEEE/ACM International Conferenceon Mobile Comput<strong>in</strong>g and Network<strong>in</strong>g (MobiCom 2000), pages 231-242, August 2000.12. Y.C. Hu, A. Perrig, and D.B. Johnson. Ariadne: A Secure On-Demand Rout<strong>in</strong>g Protocol forAd Hoc Networks. In Proceed<strong>in</strong>gs of the Eighth ACM International Conference on MobileComput<strong>in</strong>g and Network<strong>in</strong>g (MobiCom 2002), September 23-28, 2002.13. Y.C. Hu, D.B. Johnson, and A. Perrig. Secure Efficient Distance Vector Rout<strong>in</strong>g Protocol <strong>in</strong>Mobile wireless Ad Hoc Networks. In Proceed<strong>in</strong>gs of the Fourth IEEE Workshop on MobileComput<strong>in</strong>g Systems and Applications (WMCSA 2002), June 2002.14. Y.C. Hu, A. Perrig, and D.B. Johnson. Efficient Security Mechanisms for Rout<strong>in</strong>g Protocols.In Proceed<strong>in</strong>gs of 2003 Internet Society Symposium on Network and Distributed SystemSecurity (NDSS’03), San Diego, California, USA. February 2003.15. D. Johnson and D.A. Maltz. Dynamic Source Rout<strong>in</strong>g <strong>in</strong> Ad Hoc Wireless Networks. InMobile Comput<strong>in</strong>g, chapter 5, pages 153-181. Kluwer Academic Publishers, 1996.16. D. Johnson, D.A. Maltz, Y.C. Hu, and J.G. Jetcheva. The Dynamic Source Rout<strong>in</strong>g Protocolfor Mobile Ad Hoc Networks (Internet-Draft). Mobile Ad-hoc Network (MANET) Work<strong>in</strong>gGroup, IETF, February 2002.17. G.M. Jones. The Case for Network Infrastructure Security. ;logon: The Magaz<strong>in</strong>e ofUSENIX and SAGE. pages 25-29, Volume 27, Number 6, December 2002.18. K. Fall and K. Varadhan, editors. The ns Manual (formerly ns <strong>Notes</strong> and Documentation).April 14, 2002. http://www.isi.edu/nsnam/ns/doc/<strong>in</strong>dex.html19. S. Marti, T.J. Giuli, K. Lai, and M. Baker. Mitigat<strong>in</strong>g Rout<strong>in</strong>g Misbehavior <strong>in</strong> Mobile AdHoc Networks. In Proceed<strong>in</strong>gs of the Sixth Annual ACM/IEEE International Conference onMobile Comput<strong>in</strong>g and Network<strong>in</strong>g (MOBICOM 2000), August 2000.20. V.N. Padmanabhan and D. R. Simon. Secure Traceroute to Detect Faulty or Malicious Rout<strong>in</strong>g.In ACM SIGCOMM Workshop on Hot Topic <strong>in</strong> Networks (HotNets-I), October 2002.21. C.E. Perk<strong>in</strong>s, E. M. Royer, and S.R. Das. Ad Hoc On Demand Distance Vector (AODV)Rout<strong>in</strong>g (Internet-Draft). June 2002.22. R. Perlman. Network Layer Protocols with Byzant<strong>in</strong>e Robustness. PhD thesis, MassachusettsInstitute of Technology, August 1988.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!