|
[1] A. Acharya and B. R. Badrinath, "Checkpointing Distributed Applications on Mobile Computers," the 3rd Intl. Conf . on Parallel and Distributed Information Systems, September 1994 [2] M. Aguilera, C. Gallet, H. Fauconnier, S. Toueg Stable leader election. In LNCS 2180, p. 108 ff. [3] E. R. Anton and Duarte, "Group Key Establishment in Wireless Ad Hoc Networks," In Workshop on em Qualidade de Servicoe Mobilidade, O. C. M. B., 2002. [4] O. Babaoglu and R. Drummond, “Street of Byzantium: Network Architectures for Fast Reliable Broadcasts,” IEEE Trans. Software Eng., vol. 11, no. 6, pp. 546-554, June 1985. [5] R. Baldoni, J. M. Helary, A. Mostefaoui, and M. Raynal, "Consistent Checkpointing in Message Passing Distributed Systems," IRISA Tech. Rep. RR-2564, IRISA, July 1995. [6] A. Bar-Noy, D. Dolev, C. Dwork, and R. Strong, "Shifting Gears: Changing Algorithms on the Fly to Expedite Byzantine Agree¬ment," Proc. Symp. Principle of Distributed Computing, pp. 42-51, 1987. [7] Miguel Castro, Barbara Liskov, "Practical Byzantine Fault Tolerance", Proceedings of the Third Symposium on Operating Systems Design and Implementation, New Orleans, USA, February 1999 [8] J. C. Cha and J. H. Cheon. "An Identity-Based Signature from Gap Diffie-Hellman Groups." In International Workshop on Practice and Theory in Public Key Cryptography, January 2003. [9] Chunhsiang Cheng, Srikanta P. R. Kumar. "A Loop-Free Spanning-Tree protocol in Dynamic Topology. Proc. 27th Annual Allerton Conference on Communication", Control and Computing, Sept. 1989, pp. 594-595. [10] M.S. Corson, A. Ephremides, A distributed routing algorithm for mobile wireless networks, Wireless Networks 1 (1995). [11] M.S. Corson, S. Batsell and J. Macker, Architectural considerations for mobile mesh networking, working draft, May 1996, available at http://tonnant.itd.nrl.navy.mill"netl"netRFC.txt. [12] N. Deo, GRAPH THEORY with Applications to Engineerring and Computer Science. Englewood Cliffs, N.J.: Prentice Hall, 1974. [13] D. Dolev, "The Byzantine Generals Strike Again," J. Algorithms, vol. 3, no.1, pp. 14-30, 1982. [14] D. Dolev and H.R. Strong, "Authenticated Algorithms for Byzantine Agreement,"SIAM J. Comput. Vol. 12, No. 4, pp. 191-204, 1985. [15] D. Dolev, N. Lynch, S. Pinter, E. Stark, and W. Weihl, "Reaching Approximate Agreement in the Presence of Faults," J. ACM, vol. 33, no. 3, pp. 499-516, July 1986. [16] E. Gafni and D. Bertsekas, Distributed algorithms for generating loop-free routes in networks with frequently changing topology, IEEE Trans. Commun. (January 1981). [17] Kostas P. Hatzis, George P. Pentaris, aul G. Spirakis, Vasilis T. Tampakas and Richard B. Tan. Fundamental Control Algorithms in Mobile Networks. Proc. 11th Annual ACM Symposium on Parallel Algorithms and Architectures, pages 251-260, 1999. [18] A. Khalili, J. Katz, W.A. Arbaugh, "Toward secure key distribution in truly ad-hoc networks," Applications and the Internet Workshops, 2003. Proceedings. 2003 Symposium on 27-31 Jan. 2003 Page(s):342 - 346 [19] L. Lamport, R. Shostak, and M. Pease, "The Byzantine Generals Problem," ACM Trans. Programming Language Systems, vol. 4, no. 3, pp. 382-401, July 1982. [20] Nancy A. Lynch, "Distributed Algorithms"Algorithms”, Morgan Kaufmann Publishers, Inc, 1997. [21] N. Malpani, J. Welch and N. Vaidya. Leader Election Algorithms for Mobile Ad Hoc Networks. In Fourth International Workshop on DiscreteAlgorithms and Methods for Mobile Computing and Communications,Boston, MA, August 2000. [22] F.J. Meyer and D.K. Pradhan, "Consensus with Dual Failure Modes," IEEE Trans. Paralledl and Distributed Systems, vol. 2, no.2, pp. 214-222, Apr. 1991. [23] Vicent D. Park and M. Scott Corson. A Hightly Adaptive Distributed Routing Algorithm for Mobile Wireless Networks. Proc. IEEE INFOCOM, April 7-11, 1997. [24] N. Suri, M.M. Hugue, and C.J. Walter, "Synchronization Issues in Real-Time Systems," Proc. IEEE, vol. 82, no. 1, pp. 41-53, Jan. 1994. [25] Vincent D. Park and M. Scott Corson. "A Highly Adaptive Distributed Routing Algorithm for Mobile Wireless Networks," IEEE Trans. Commun. 1997 [26] Elizabeth M. Royer and Charles E. Perkins. "Multicast Operations of the Ad-hoc On-demand Distance Vector Routing Protocol." Proc. Fifth Annual AM/IEEE International conference on Mobile Computing and networking (MOBICOM), pages 207-218, August 15-20, 1999. [27] Elizabeth M. Royer, Samir R. Das and Charles E. Perkins. "Ad Hoc On-Demand Distance Vector (AODV) Routing (Internet-Draft)." Mobile Ad Hoc Network (MANET) Working Group, 10 March, 2000. [28] H. S. Siu, Y. H. Chin and W. P. Yang, "A Note on Consensus on Dual Failure Modes," IEEE Transaction on Parallel and Distributed System, Vol. 7, No. 3, pp. 225-230, 1996. [29] H. S. Siu, Y. H. Chin and W. P. Yang, "Byzantine Agreement in the Presence of Mixed Faults on Processors and Links," IEEE Trans. Parallel and Distributed Systems, Vol. 9, No. 4, pp. 980-986, 1998. [30] Maarten Van Steen, Andrew S. Tanenbaum, "Distributed Systems: Principles and Paradigms," 2002. [31] Andrew S. Tanenbaum, Maarten van Steen, "Distributed systems Principles and paradigms," Pearson Education, p.361-367, 2002. [32] G. Taubenfeld. Leader Election in presence of n-1 initial failures. In Information Processing Letters, vol.33, no.1, pages 25-28, October 1989. [33] J. Turek and D. Shasha, "The Many Faces of Consensus in Dis¬tributed Systems," Computer, vol. 25, no. 6, pp. 8-17, June 1992. [34] S.C. Wang, K.Q. Yan, and H.C. Hsieh, "The Byzantine Agreement under Mobile Network," in the Proceeding of 2004 IEEE International Conference on Networking, Sensing and Control (ICNCS2004), March 2004, pp. 46-51. [35] John Wiley and Sons, "Blueprints for Hight Availability - Designing Resilient Distributed System". [36] Stallins William, "Cryptography and Network Security: Principles and Practice Second Edition". [37] S. Vasudevan, J. Kurose and D. Towsley. Design and Analysis of a Leader Election Algorithm for Mobile, Ad Hoc Networks. UMassCMPSCI Technical Report 03-20. [38] S. Vasudevan, J. Kurose, D. Towsley, "Design and analysis of a leader election algorithm for mobile ad hoc networks," Network Protocols, 2004. ICNP 2004. Proceedings of the 12th IEEE International Conference on 2004 Page(s):350 – 360. [39] L. Zhou and Z. Haas, "Securing Ad Hoc Networks," IEEE Network Magazine, 13(6), November/December 1999.
|