Литмир - Электронная Библиотека

EL GAMAL, T.: ‘A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms,” IEEE Trans, on Information Theory, vol. IT-1, pp. 469-472, July 1985.

EPCGLOBAL: EPC Radio-Frequency Identity Protocols Class- Generation- UHF RFID Protocol for Communication at 860-MHz to 960-MHz Version 1.2.0, Brussels: EPCglobal Inc., Oct. 2008.

FALL, K.: “A Delay-Tolerant Network Architecture for Challenged Internets,’’ Proc. SIGCOMM 2003 Conf., ACM, pp. 27-34, Aug. 2003.

FALOUTSOS, M, FALOUTSOS, P, andFALOUTSOS, C.: “On Power-Law Relationships of the Internet Topology,’’ Proc. SIGCOMM ’99 Conf., ACM, pp. 251-262, 1999.

FARRELL, S., and CAHILL, V.: Delay- and Disruption-Tolerant Networking, London: Artech House,

2007.

FELLOWS, D., andJONES, D.: “DOCSIS Cable Modem Technology,” IEEE Commun. Magazine, vol. 39, pp. 202-209, Mar. 2001.

FENNER, B., HANDLEY, M., HOLBROOK, H, andKOUVELAS, I.: “Protocol Independent Multicast-Sparse Mode (PIM-SM),’’ RFC 4601, Aug. 2006.

FERGUSON, N., SCHNEIER, B., and KOHNO, T.: Cryptography Engineering: Design Principles and Practical Applications, New York: John Wiley & Sons, 2010.

FLANAGAN, D.: JavaScript: The Definitive Guide, 6th ed., Sebastopol, CA: O’Reilly, 2010.

FLETCHER, J.: ‘An Arithmetic Checksum for Serial Transmissions,’’ IEEE Trans. on Commun., vol. COM-0, pp. 247-252, Jan. 1982.

FLOYD, S., HANDLEY, M., PADHYE, J., and WIDMER, J.: “Equation-Based Congestion Control for Unicast Applications,” Proc. SIGCOMM 2000 Conf., ACM, pp. 43-56, Aug. 2000.

FLOYD, S., and JACOBSON, V.: “Random Early Detection for Congestion Avoidance,” IEEE/ACM Trans, on Networking, vol. 1, pp. 397-413, Aug. 1993.

FLUHRER, S., MANTIN, I., and SHAMIR, A.: “Weakness in the Key Scheduling Algorithm of RC4,’’ Proc. Eighth Ann. Workshop on Selected Areas in Cryptography, Berlin: Springer-Verlag LNCS 2259, pp. 1-24, 2001.

FORD, B.: “Structured Streams: A New Transport Abstraction,’’ Proc. SIGCOMM 2007 Conf., ACM, pp. 361-372, 2007.

FORD, L.R., Jr., and FULKERSON, D.R.: Flows in Networks, Princeton, NJ: Princeton University Press, 1962.

FORD, W., and BAUM, M.S.: Secure Electronic Commerce, Upper Saddle River, NJ: Prentice Hall, 2000.

FOULI, K., andMALER, M.: “The Road to Carrier-Grade Ethernet,’’ IEEE Commun.

Magazine, vol. 47, pp. S30-S38, Mar. 2009.

FOX, A., GRIBBLE, S., BREWER, E., and AMIR, E.: “Adapting to Network and Client

Variability via On-Demand Dynamic Distillation,’’ SIGOPS Oper. Syst. Rev., vol. 30,

pp. 160-170, Dec. 1996.

FRANCIS, P.: ‘A Near-Term Architecture for Deploying Pip,” IEEE Network Magazine, vol. 7, pp. 30-37, May/June 1993.

FRASER, A.G.: “Towards a Universal Data Transport System,’’ IEEE J. on Selected Areas in Commun., vol. 5, pp. 803-816, Nov. 1983.

FRIDRICH, J.: Steganography in Digital Media: Principles, Algorithms, and Applications, Cambridge: Cambridge University Press, 2009.

FULLER, V., and LI, T.: “Classless Inter-domain Routing (CIDR): The Internet Address Assignment and Aggregation Plan,’’ RFC 4632, Aug. 2006.

GALLAGHER, R.G.: “A Minimum Delay Routing Algorithm Using Distributed Computation,” IEEE Trans. on Commun., vol. COM-5, pp. 73-85, Jan. 1977.

GALLAGHER, R.G.: “Low-Density Parity Check Codes,’’ IRE Trans. on Information Theory, vol. 8, pp. 21-28, Jan. 1962.

GARFINKEL, S., with SPAFFORD, G.: Web Security, Privacy, and Commerce, Sebastopol, CA: O’Reilly, 2002.

GAST, M.: 802.11 Wireless Networks: The Definitive Guide, 2nd ed., Sebastopol, CA: O’Reilly, 2005.

GERSHENFELD, N., and KRIKORIAN, R, and COHEN, D.: “The Internet of Things,’’ Scientific American, vol. 291, pp. 76-81, Oct. 2004.

GILDER, G.: “Metcalfe’s Law and Legacy,’’ Forbes ASAP, Sepy. 13, 1993.

GOODE, B.: “Voice over Internet Protocol,’’ Proc. of the IEEE, vol. 90, pp. 1495-1517, Sept. 2002.

GORALSKI, W.J.: SONET, 2nd ed., New York: McGraw-Hill, 2002.

GRAYSON, M., SHATZKAMER, K., and WAINNER, S.: IP Design for Mobile Networks, Indianapolis, IN: Cisco Press, 2009.

GROBE, K., andELBERS, J.: “PON in Adolescence: From TDMA to WDM-PON,’’ IEEE Commun. Magazine, vol. 46, pp. 26-34, Jan. 2008.

GROSS, G, KAYCEE, M., LIN, A., MALIS, A., and STEPHENS, J.: “The PPP Over AAL5,’’ RFC 2364, July 1998.

HA, S., RHEE, I., and LISONG, X.: “CUBIC: A New TCP-Friendly High-Speed TCP Variant,’’ SIGOPS Oper. Syst. Rev., vol. 42, pp. 64-74, June 2008.

HAFNER, K., and LYON, M.: Where Wizards Stay Up Late, New York: Simon & Schuster, 1998.

HALPERIN, D., HEYDT-BENJAMIN, T,, RANSFORD, B, CLARK, S, DEFEND, B, MORGAN, W., FU, K., KOHNO, T., and MAISEL, W.: “Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses,’’ IEEE Symp. on Security and Privacy, pp. 129-142, May 2008.

HALPERIN, D., HU, W., SHETH, A., and WETHERALL, D.: “802.11 with Multiple Antennas for Dummies,’’ Computer Commun. Rev., vol. 40, pp. 19-25, Jan. 2010.

HAMMING, R.W.: “Error Detecting and Error Correcting Codes,” Bell System Tech. J., vol. 29, pp. 147-160, April 1950.

HARTE, L., KELLOGG, S., DREHER, R.., and SCHAFFNIT, T.: The Comprehensive Guide to Wireless Technology, Fuquay-Varina, NC: APDG Publishing, 2000.

HAWLEY, G.T.: “Historical Perspectives on the U.S. Telephone Loop,” IEEE Commun. Magazine, vol. 29, pp. 24-28, March 1991.

HECHT, J.: “Understanding Fiber Optics,” Upper Saddle River, NJ: Prentice Hall, 2005.

HELD, G.: A Practical Guide to Content Delivery Networks, 2nd ed., Boca Raton, FL: CRC Press, 2010.

HEUSSE, M., ROUSSEAU, F., BERGER-SABBATEL, G., DUDA, A.: “Performance Anomaly of 802.11b,’’ Proc. INFOCOM Conf., IEEE, pp. 836-843, 2003.

HIERTZ, G., DENTENEER, D., STIBOR, L., ZANG, Y., COSTA, X., and WALKE, B.: “The IEEE 802.11 Universe,’’ IEEE Commun. Magazine, vol. 48, pp. 62-70, Jan. 2010.

HOE, J.: “Improving the Start-up Behavior of a Congestion Control Scheme for TCP,’’ Proc. SIGCOMM ’96 Conf., ACM, pp. 270-280, 1996.

HU, Y., and LI, V.O.K.:“Satellite-Based Internet: A Tutorial,’’ IEEE Commun. Magazine, vol. 30, pp. 154-162, Mar. 2001.

HUITEMA, C.: Routing in the Internet, 2nd ed., Englewood Cliffs, NJ: Prentice Hall, 1999.

HULL, B., BYCHKOVSKY, V., CHEN, K., GORACZKO, M., MIU, A., SHIH, E., ZHANG, Y., BALAKRISHNAN, H., and MADDEN, S.: “CarTel: A Distributed Mobile Sensor Computing System,’’ Proc. Sensys 2006 Conf., ACM, pp. 125-138, Nov. 2006.

HUNTER, D., RAFTER, J., FAWCETT, J., VANDER LIST, E., AYERS, D., DUCKETT, J., WATT, A., and MCKINNON, L.: Beginning XML, 4th ed., New Jersey: Wrox, 2007.

IRMER, T.: “Shaping Future Telecommunications: The Challenge of Global Standardization,” IEEE Commun. Magazine, vol. 32, pp. 20-28, Jan. 1994.

ITU (INTERNATIONAL TELECOMMUNICATION UNION): ITU Internet Reports 2005: The Internet of Things, Geneva: ITU, Nov. 2005.

ITU (INTERNATIONAL TELECOMMUNICATION UNION): Measuring the Information Society: The ICT Development Index, Geneva: ITU, Mar. 2009.

JACOBSON, V.: “Compressing TCP/IP Headers for Low-Speed Serial Links,’’ RFC 1144, Feb. 1990.

JACOBSON, V.: “Congestion Avoidance and Control,” Proc. SIGCOMM ‘88 Conf., ACM, pp. 314-329, 1988.

JAIN, R, andROUTHIER, S.: “Packet Trains—Measurements and a New Model for Computer Network Traffic,’’ IEEE J. on Selected Areas in Commun., vol. 6, pp. 986-995, Sept. 1986.

JAKOBSSON, M., and WETZEL, S.: “Security Weaknesses in Bluetooth,” Topics in Cryp-tology: CT-RSA 2001, Berlin: Springer-Verlag LNCS 2020, pp. 176-191, 2001.

315
{"b":"639789","o":1}