13.07.2015 Views

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

162 M. Just, E. Kranakis, and T. Wan4. K.A. Bradley, S. Cheung, N. Puketza, B. Mukherjee, and R.A. Olsson. Detect<strong>in</strong>g DisruptiveRouters: A Distributed Network Monitor<strong>in</strong>g Approach. In Proceed<strong>in</strong>gs of the IEEE Symposiumon Research <strong>in</strong> Security and Privacy, pages 115-124, May 1998.5. S. Buchegger and J.Y. Le Boudec. Performance Analysis of the CONFIDANT Protocol (CooperationOf Nodes - Fairness In Dynamic Ad-hoc NeTworks) In Proceed<strong>in</strong>gs of the ThirdACM International Symposium on Mobile Ad Hoc Network<strong>in</strong>g and Comput<strong>in</strong>g, (MobiHoc2002), June 2002.6. H. Burch and H. Cheswich. Trac<strong>in</strong>g anonymous packets to their approximate source. InProceed<strong>in</strong>gs of USENIX LISA. pages 319-327, New Orleans, LA, December 2002.7. S. Cheung. An Efficient Message Authentication Scheme for L<strong>in</strong>k State Rout<strong>in</strong>g. In Proceed<strong>in</strong>gsof the 13th Annual <strong>Computer</strong> Security Applications Conference, San Diego, California,USA, December 1997.8. S. Cheung and K. Levitt. Protect<strong>in</strong>g rout<strong>in</strong>g <strong>in</strong>frastructure from denial of service us<strong>in</strong>g cooperative<strong>in</strong>trusion detection. In Proceed<strong>in</strong>gs of New Security Paradigms Workshop, GreatLangdale, Cumbria, UK, September 1997.9. B.P. Crow, I.K. Widjaja, G. Jeong, and P.T. Sakai. IEEE 802.11 Wireless Local Area Networks.IEEE Communications Magaz<strong>in</strong>e, vol. 35, No. 9: pages 116-126, September 1997.10. A. Habib, M. Hefeeda, and B. Bhargava. Detect<strong>in</strong>g Service Violations and DoS Attacks.In Proceed<strong>in</strong>gs of 2003 Internet Society Symposium on Network and Distributed SystemSecurity (NDSS’03), San Diego, California, USA. February 2003.11. Y.C. Hu and D.B. Johnson. Cach<strong>in</strong>g Strategies <strong>in</strong> On-Demand Rout<strong>in</strong>g Protocols for WirelessAd Hoc Networks. In Proceed<strong>in</strong>gs of the Sixth Annual IEEE/ACM International Conferenceon Mobile Comput<strong>in</strong>g and Network<strong>in</strong>g (MobiCom 2000), pages 231-242, August 2000.12. Y.C. Hu, A. Perrig, and D.B. Johnson. Ariadne: A Secure On-Demand Rout<strong>in</strong>g Protocol forAd Hoc Networks. In Proceed<strong>in</strong>gs of the Eighth ACM International Conference on MobileComput<strong>in</strong>g and Network<strong>in</strong>g (MobiCom 2002), September 23-28, 2002.13. Y.C. Hu, D.B. Johnson, and A. Perrig. Secure Efficient Distance Vector Rout<strong>in</strong>g Protocol <strong>in</strong>Mobile wireless Ad Hoc Networks. In Proceed<strong>in</strong>gs of the Fourth IEEE Workshop on MobileComput<strong>in</strong>g Systems and Applications (WMCSA 2002), June 2002.14. Y.C. Hu, A. Perrig, and D.B. Johnson. Efficient Security Mechanisms for Rout<strong>in</strong>g Protocols.In Proceed<strong>in</strong>gs of 2003 Internet Society Symposium on Network and Distributed SystemSecurity (NDSS’03), San Diego, California, USA. February 2003.15. D. Johnson and D.A. Maltz. Dynamic Source Rout<strong>in</strong>g <strong>in</strong> Ad Hoc Wireless Networks. InMobile Comput<strong>in</strong>g, chapter 5, pages 153-181. Kluwer Academic Publishers, 1996.16. D. Johnson, D.A. Maltz, Y.C. Hu, and J.G. Jetcheva. The Dynamic Source Rout<strong>in</strong>g Protocolfor Mobile Ad Hoc Networks (Internet-Draft). Mobile Ad-hoc Network (MANET) Work<strong>in</strong>gGroup, IETF, February 2002.17. G.M. Jones. The Case for Network Infrastructure Security. ;logon: The Magaz<strong>in</strong>e ofUSENIX and SAGE. pages 25-29, Volume 27, Number 6, December 2002.18. K. Fall and K. Varadhan, editors. The ns Manual (formerly ns <strong>Notes</strong> and Documentation).April 14, 2002. http://www.isi.edu/nsnam/ns/doc/<strong>in</strong>dex.html19. S. Marti, T.J. Giuli, K. Lai, and M. Baker. Mitigat<strong>in</strong>g Rout<strong>in</strong>g Misbehavior <strong>in</strong> Mobile AdHoc Networks. In Proceed<strong>in</strong>gs of the Sixth Annual ACM/IEEE International Conference onMobile Comput<strong>in</strong>g and Network<strong>in</strong>g (MOBICOM 2000), August 2000.20. V.N. Padmanabhan and D. R. Simon. Secure Traceroute to Detect Faulty or Malicious Rout<strong>in</strong>g.In ACM SIGCOMM Workshop on Hot Topic <strong>in</strong> Networks (HotNets-I), October 2002.21. C.E. Perk<strong>in</strong>s, E. M. Royer, and S.R. Das. Ad Hoc On Demand Distance Vector (AODV)Rout<strong>in</strong>g (Internet-Draft). June 2002.22. R. Perlman. Network Layer Protocols with Byzant<strong>in</strong>e Robustness. PhD thesis, MassachusettsInstitute of Technology, August 1988.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!