13.07.2015 Views

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

Page 2 Lecture Notes in Computer Science 2865 Edited by G. Goos ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Resist<strong>in</strong>g Malicious Packet Dropp<strong>in</strong>g <strong>in</strong> Wireless Ad Hoc Networks 16323. T. Roughgarden. Selfish Rout<strong>in</strong>g. PhD thesis, Cornell University, May 2002.24. B.R. Smith and J.J. Garcia-Luna-Aceves. Secur<strong>in</strong>g the Border Gateway Rout<strong>in</strong>g Protocol. InProceed<strong>in</strong>gs of Global Internet 1996. London, UK. November 1996.25. B.R. Smith, S. Murthy, and J.J. Garcia-Luna-Aceves. Secur<strong>in</strong>g Distance-Vector Rout<strong>in</strong>g Protocols.In Proceed<strong>in</strong>gs of 1997 Internet Society Symposium on Network and Distributed SystemSecurity (NDSS’97), San Diego, California, USA. February 1997.26. M.G. Zapata and N. Asokan. Secur<strong>in</strong>g Ad Hoc Rout<strong>in</strong>g Protocols. In Proceed<strong>in</strong>gs of theACM Workshop on Wireless Security (WiSe 2002), September 2002.27. Kan Zhang. Efficient Protocols for Sign<strong>in</strong>g Rout<strong>in</strong>g Messages. In Proceed<strong>in</strong>gs of 1997 InternetSociety Symposium on Network and Distributed System Security (NDSS’98), San Diego,California, USA, March 1998.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!