1278 references, last updated Fri Aug 1 12:59:16 2003

[1]
Martín Abadi and Andrew D. Gordon. A calculus for cryptographic protocols: the Spi Calculus. In Proceedings of the 4th ACM Conference on Computer and Communications Security, pages 129-137, Zurich, Switzerland, April 1-4, 1997.

[2]
Martín Abadi and Roger Needham. Prudent engineering practice for cryptographic protocols. IEEE Transactions on Software Engineering, 22(1):6-15, January 1996.

[3]
Martín Abadi and M. Tuttle. A semantics for a logic of authentication. In Proceedings of the 10th Annual ACM Symposium on Principles of Distributed Computing, pages 201-216, 1991.

[4]
Michel Abdalla and Matthew Franklin. Secure group communication over partially connected networks. In DISC'01, 2001.

[5]
Gregory D. Abowd, Christopher G. Atkeson, Jason Hong, Sue Long, Rob Kooper, and Mike Pinkerton. Cyberguide: A mobile context-aware tour guide. Wireless Networks, 3(5):421-433, 1997.

[6]
Milton Abramowitz and Irene A. Stegun. Handbook of Mathematical Functions. Dover Publications, Inc., New York, 1970.

[7]
Hosame Abu-Amara and Jahnavi Lokre. Election in asynchronous complete networks with intermittent link failures. IEEE Transactions on Computers, 43(7):778-788, July 1994.

[8]
AS. Acampora and SV. Krishnamurthy. A new adaptive mac layer protocol for wireless atm networks in harsh fading and interference environments. In 1997 IEEE 6th International Conference on Universal Person Communications Record. Bridging the Way to the 21st Century, ICUPC '97. Conference Record (Cat. No.97TH8255)., volume 2, pages 410-415. IEEE, 1997.

[9]
Tomoko Adachi and Masao Nakagawa. Capacity analysis for a hybrid indoor mobile communication system using cellular and ad-hoc modes. In Proc. 11th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC'00), volume 2, pages 767-771, London, UK, 2000.

[10]
F. Adachi, M. Sawahashi, and K. Okawa. Tree structured generation of orthogonal spreading codes with different lengths for the forward link of DS-CDMA mobile radio. IEE Electronic Letters, 33(1):27-28, 1997.

[11]
William A. Adamson, Jim Rees, and Peter Honeyman. Joining security realms: A single login for NetWare and Kerberos. In Proceedings of the 2nd International Workshop on Services in Distributed and Networked Environments, pages 2-10, June 1995.

[12]
William A. Adamson, Jim Rees, and Peter Honeyman. Joining security realms: A single login for NetWare and Kerberos. Technical Report CITI TR 95-1, University of Michigan, Ann Arbor, MI, USA, February 1995. (appeared in Proc. 2nd Intl. Workshop on Services in Distributed and Networked Environments).

[13]
Yehuda Afek, Hagit Attiya, Alan Fekete, Michael Fischer, Nancy Lynch, Yishay Mansour, Dai-Wei Wang, and Lenore Zuck. Reliable communication over unreliable channels. Journal of the ACM (JACM), 41(6):1267-1297, 1994.

[14]
Prathima Agrawal. Energy efficient protocols for wireless systems. In IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC, volume 2, pages 564-569. IEEE, 1998.

[15]
Marcos Kawazoe Aguilera and Sam Toueg. A simple bivalency proof that t-resilient consensus requires t+1 rounds. Technical Report TR98-1701, Department of Computer Science, Cornell University, September 1998.

[16]
Marcos Kawazoe Aguilera, Wei Chen, and Sam Toueg. Heartbeat: A timeout-free failure detector for quiescent reliable communication. In Workshop on Distributed Algorithms, pages 126-140, 1997.

[17]
Marcos Kawazoe Aguilera, Wei Chen, and Sam Toueg. Using the heartbeat failure detector for quiescent reliable communication and consensus in partitionable networks. Theoretical Computer Science, 220(1):3-30, June 1999.

[18]
Marcos Kawazoe Aguilera, Wei Chen, and Sam Toueg. Failure detection and consensus in the crash-recovery model. Distributed Computing, 13(2):99-125, April 2000.

[19]
Marcos Kawazoe Aguilera, Wei Chen, and Sam Toueg. On quiescent reliable communication. SIAM Journal of Computing, 29(6):2040-2073, April 2000.

[20]
Marcos K. Aguilera, Carole Delporte-Gallet, Hugues Fauconnier, and Sam Toueg. On implementing Omega with weak reliability and synchrony assumptions. In Proceeding of the 22nd Annual ACM Symposium on Principles of Distributed Computing (PODC'03), 2003. (to appear).

[21]
IF. Akyildiz and I. Joe. A new arq protocol for wireless atm networks. In ICC '98. 1998 IEEE International Conference on Communications. Conference Record. Affiliated with SUPERCOMM'98 (Cat. No.98CH36220)., volume 2, pages 1109-1113. IEEE, 1998.

[22]
Ian F. Akyildiz and Wei Yen. A new hierarchical routing protocol for dynamic multihop wireless networks. In IEEE Infocom '97 - 16th Conference on Computer Communications. IEEE, 1997.

[23]
Bora A. Akyol and Donald C. Cox. Handling mobility in a wireless atm network. Proceedings - IEEE INFOCOM, 3:1405-1413, 1996.

[24]
R. M. Alguliev. Method of selecting the optimal structure of a distributed authentication system in virtual private networks. Automatic-Control-and-Computer-Sciences, 33(3):12-21, 1999.

[25]
Hasan S. Alkhatib, Chase Bailey, Mario Gerla, and James McCrae. Wireless data networks: Reaching the extra mile. Computer, 30(12):59-62, December 1997.

[26]
J.D. Tygar Alma Whitten. Usability of security: A case study. Technical Report CMU-CS-98-155, Computer Science Department, School of Computer Science, Carnegie Mellon University, December 1998.

[27]
Rajeev Alur and Thomas A. Henzinger, editors. Computer-Aided Verification, CAV '96, volume 1102 of Lecture Notes in Computer Science, New Brunswick, NJ, July/August 1996. Springer-Verlag.

[28]
Carlos M.J. Alves-Serodio, Joao L. Monteiro, and Carlos A.C. Couto. Integrated network for agricultural management applications. IEEE International Symposium on Industrial Electronics, 2:679-683, 1998.

[29]
Sami S. Alwakeel and Mohammad M. Al-Fawaz. Dpap: a dynamic polling based access protocol for wireless networks. In IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC, volume 3, pages 1126-1129. IEEE, 1998.

[30]
A. Alwan, R. Bagrodia, N. Bambos, M. Gerla, L. Kleinrock, J. Short, and J. Villasenor. Adaptive mobile multimedia networks. IEEE Personal Communications, pages 34-51, April 1996.

[31]
Khaled Alzoubi, Peng-Jun Wan, and Ophir Frieder. New distributed algorithm for connected dominating set in wireless ad hoc networks. In Proceedings of the 35th Annual Hawaii International Conference on System Sciences, 2002.

[32]
Khaled M. Alzoubi, Peng-Jun Wan, and Ophir Frieder. Message-optimal connected dominating sets in mobile ad hoc networks. In Proceedings of the third ACM International Symposium on Mobile Ad Hoc Networking and Computing, pages 157-164, June 2002.

[33]
Khaled Alzoubi, Xiang-Yang Li, Yu Wang, Peng-Jun Wan, and Ophir Frieder. Geometric spanners for wireless ad hoc networks. Proceedings of the IEEE Transactions on Parallel and Distributed Systems, 14(5), May 2003.

[34]
Khaled M. Alzoubi. Virtual Backbone in Wireless Ad Hoc Networks. PhD thesis, Illinois Institute of Technology, May 2002.

[35]
Elan Amir, Hari Balakrishnan, Srinivasan Seshan, and Randy H. Katz. Efficient tcp over networks with wireless links. Proceedings of the Workshop on Hot Topics in Operating Systems - HOTOS, pages 35-40, 1995.

[36]
Yair Amir, Giuseppe Ateniese, Damian Hasse, Yongdae Kim, Cristina Nita-Rotaru, Theo Schlossnagle, John Schultz, Jonathan Stanton, and Gene Tsudik. Secure group communication in asynchronous networks with failures: Integration and experiments. In International Conference on Distributed Computing Systems, 1999.

[37]
Yair Amir, Kim Yongdae, Cristina Nita-Rotaru, and Gene Tsudik. On the performance of group key agreement protocols. Technical Report CNDS-2001-5, Center for Networking and Distributed Systems, Johns Hopkins University, November 2001.

[38]
Liping An, Nirwan Ansari, and Ambalavanar Arulambalam. Tcp/ip traffic over atm networks with fmmra abr flow and congestion control. Computer Networks And ISDN Systems, 29(17-18):2091-2102, 1998.

[39]
Giuseppe Anastasi, Davide Grillo, Luciano Lenzini, and Enzo Mingozzi. A contention/reservation access protocol for speech and data integration in tdma-based advanced mobile systems. Mobile Networks and Applications, 2(1):3-18, 1997.

[40]
G. Anastasi, L. Lenzini, E. Mingozzi, A. Hettich, and A. Kramling. Mac protocols for wideband wireless local access: evolution toward wireless atm. IEEE Personal Communications, 5(5):53-64, 1998.

[41]
Ross Anderson and Markus Kuhn. Tamper resistance a cautionary note. In Proceedings of the Second Usenix Workshop on Electronic Commerce, pages 1-11, November 1996.

[42]
Ross Anderson and Markus Kuhn. Low cost attacks on tamper resistant devices. In Security Protocols, 5th International Workshop, LNCS 1361, pages 125-136, April 7-9, 1997.

[43]
R. Anderson, F. Bergadano, B. Crispo, J. Lee, C. Manifavas, and R. Needham. A new family of authentication protocols. Operating Systems Review, 32(4):9-20, October 1998.

[44]
Ross J. Anderson. Why cryptosystems fail. Communications of the ACM, 37(11):97-102, November 1994.

[45]
O. Angin, AT. Campbell, ME. Kounavis, and RRF. Liao. The mobiware toolkit: Programmable support for adaptive mobile networking. IEEE Personal Communications, 5(4):32-43, 1998.

[46]
Tal Anker, Gregory V. Chockler, Danny Dolev, and Idit Keidar. Scalable group membership services for novel applications. In Marios Mavronicolas, Michael Merritt, and Nir Shavit, editors, Proceedings of the DIMACS Workshop on Networks in Distributed Computing, 1998.

[47]
Anon. Motorola integrated wireless data solution. Microelectronics Journal, 26(4):ix-x, 1995.

[48]
(Ed.) Anon. Proceedings of the 1995 1st annual international conference on mobile computing and networking. Proceedings of the Annual International Conference on Mobile Computing and Networking, MOBICOM, page 225pp, 1995.

[49]
(Ed.) Anon. Proceedings of the 1995 ieee international conference on communications. IEEE International Conference on Communications, 1:662p, 1995.

[50]
(Ed.) Anon. Proceedings of the 1995 international conference on network protocols. International Conference on Network Protocols, page 374, 1995.

[51]
(Ed.) Anon. Proceedings of the 1996 15th annual joint conference of the ieee computer and communications societies, infocom'96. Proceedings - IEEE INFOCOM, 3:938-1483, 1996.

[52]
C. Apostolas, R. Tafazolli, and B.G. Evans. Wireless atm lan. IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC, 2:773-777, 1995.

[53]
Andrew W. Appel and Edward W. Felten. Proof-carrying authentication. In Proceedings of the 6th ACM Conference on Computer and Communications Security, pages 52-62, Singapore, November 1-4, 1999.

[54]
Vanitha Aravamudhan, Karunaharan Ratnam, and Sampath Rangarajan. An efficient multicast protocol for pcs networks. Mobile Networks and Applications, 2(4):333-344, 1997.

[55]
William A. Arbaugh, James R. Davin, David J. Farber, and Jonathan M. Smith. Security for virtual private Intranets. Computer, 31(9):48-54, September 1998.

[56]
Jens C. Arnbak. European (r)evolution of wireless digital networks. IEEE Communications Magazine, 31(9):74-82, September 1993.

[57]
I.D. Aron and S.K.S. Gupta. A witness-aided routing protocol for mobile ad-hoc networks with unidirectional links. In Mobile Data Access. First International Conference, MDA'99., 1999.

[58]
M. Artale and R. Winkler. On-demand assignment with centralized scheduling: a novel mac protocol for wireless atm access networks. In Sixth WINLAB Workshop on Third Generation Wireless Information Networks., pages 279-297, 1997.

[59]
K. Arvind. Probabilistic clock synchronization in distributed systems. IEEE Transactions on Parallel and Distributed Systems, 5(5):474-487, May 1994.

[60]
N. Asokan and P. Ginzboorg. Key agreement in ad hoc networks. Computer Communications, 23(17), November 1, 2000.

[61]
A. Asthana, M. Cravatts, and P. Krzyzanowski. An indoor wireless system for personalized shopping assistance. Proceedings. Workshop on Mobile Computing Systems and Applications, pages 69-74, 1995.

[62]
Giuseppe Ateniese, Michael Steiner, and Gene Tsudik. Authenticated group key agreement and friends. In Proceedings of the 5th ACM Conference on Computer and Communications Security, pages 17-26, November 1998.

[63]
Hagit Attiya and Jennifer Welch. Distributed Computing. McGraw-Hill, 1998.

[64]
Hagit Attiya, Danny Dolev, and Joseph Gil. Asynchronous byzantine consensus. Proceedings of the 3rd ACM Symposium of Distributed Computing, pages 119-133, August 1984.

[65]
Hagit Attiya, Cynthia Dwork, Nancy Lynch, and Larry Stockmeyer. Bounds on the time to reach agreement in the presence of timing uncertainty. Journal of the ACM (JACM), 41(1):122-152, 1994.

[66]
Hagit Attiya, Nancy Lynch, and Nir Shavit. Are wait-free algorithms fast? Journal of the ACM, 41(4):725-763, July 1994.

[67]
Malik D. Audeh and Joseph M. Kahn. Performance evaluation of baseband OOK for wireless indoor infrared LAN's operating at 100 Mb/s. IEEE Transactions on Communications, 43(6):2085-2094, June 1995.

[68]
Anna Calveras Auge and Josep Paradells Aspas. Tcp/ip over wireless links: Performance evaluation. In IEEE Vehicular Technology Conference, volume 3, pages 1755-1759. IEEE, 1998.

[69]
Tuomas Aura, Pekka Nikander, and Jussipekka Leiwo. DOS-resistant authentication with client puzzles. In Proceedings of the 8th International Workshop on Security Protocols, LNCS 2133, pages 170-177, April 2000.

[70]
Daniel O. Awduche and Emmanuel Agu. Mobile extensions to rsvp. In 6th International Conference on Computer Communications and Networks (ICCCN '97). IEEE, 1997.

[71]
Baruch Awerbuch. Complexity of network synchronization. Journal of the ACM (JACM), 32(4):804-823, 1985.

[72]
Ender Ayanoglu, Pramod Pancha, and Amy R. Reibman. Video transport in wireless atm. IEEE International Conference on Image Processing, 3:400-403, 1995.

[73]
Ender Ayanoglu. Wireless broadband and atm systems. Computer Networks And ISDN Systems, 31(4):395-409, 1999.

[74]
F. Ayo, B. Jafarian, and AH. Aghvami. A medium access control protocol for wireless atm lan based on polling. In IEE Colloquium on ATM Traffic in the Personal Mobile Communications Environment (Ref. No.1997/032)., pages 1-6. IEE, 1997.

[75]
M.H. Azadmanesh and Roger M. Kieckhafer. Exploiting omissive faults in synchronous approximate agreement. IEEE Transactions on Computers, 49(10):1031-1042, October 2000.

[76]
Ashar Aziz and Whitfeld Diffie. Privacy and authentication for wireless local area networks. IEEE Personal Communications, 1(1):25-31, 1994.

[77]
Ashar Aziz and Whitfield Diffie. Privacy and authentication for wireless local area networks. IEEE Personal Communications, First Quarter:25-31, 1994.

[78]
Ashar Aziz and Martin Patterson. Simple Key-management for Internet Protocols (SKIP). In Proceedings of INET'95, 1995.

[79]
Özalp Babao u glu and Sam Toueg. Non-blocking atomic commitment. In Sape Mullender, editor, Distributed Systems 2nd Ed., pages 147-166. ACM Press, 1993.

[80]
Jean Bacon and David Halls. Mobile applications for ubiquitous environments. ICL Systems Journal, 12(2):264-288, November 1997.

[81]
Joonsang Baek, Kwangjo Kim, and Tsutomu Matsumoto. On the significance of unknown key-share attacks: How to cope with them?. In Symposium on Cryptography and Information Security (SCIS'00), January 26-28, 2000.

[82]
Seung-Jin Baek, Moon-Sang Jeong, Jong-Tae Park, and Tai-Myoung Chung. Policy-based hybrid management architecture for IP-based VPN. In IEEE Symposium Record on Network Operations and Management, pages 987-988. IEEE, Piscataway, NJ, USA, April 2000.

[83]
R. Bagrodia, M. Gerla, L. Kleinrock, J. Short, and T.-C. Tsai. Hierarchical simulation environment for mobile wireless networks. Winter Simulation Conference Proceedings, pages 563-570, 1995.

[84]
Paramvir Bahl. Armap - an energy conserving protocol for wireless multimedia communications. In IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC, volume 2, pages 575-580. IEEE, 1998.

[85]
Paramvir Bahl. Supporting digital video in a managed wireless network. IEEE Communications Magazine, 36(6):94-102, June 1998.

[86]
Dennis J. Baker and Anthony Ephremides. The architectural organization of a mobile radio network via a distributed algorithm. IEEE Transactions on Communications, COM-29(11):1694-1701, November 1981.

[87]
Dennis J. Baker, Anthony Ephremides, and Julia A. Flynn. The design and simulation of a mobile radio network with distributed control. IEEE Journal on Selected Areas in Communications, pages 226-237, 1984.

[88]
Ajay Bakre and B.R. Badrinath. I-tcp: indirect tcp for mobile hosts. Proceedings - International Conference on Distributed Computing Systems, pages 136-146, 1995.

[89]
Ajay V. Bakre and B.R. Badrinath. Reworking the rpc paradigm for mobile clients. Mobile Networks and Applications, 1(4):371-385, 1997.

[90]
Hari Balakrishnan, Srinivasan Seshan, Elan Amir, and Randy H. Katz. Improving tcp/ip performance over wireless networks. Proceedings of the Annual International Conference on Mobile Computing and Networking, MOBICOM, pages 2-11, 1995.

[91]
Hari Balakrishnan, Venkata N. Padmanabhan, Srinivasan Seshan, and Randy H. Katz. A comparison of mechanisms for improving tcp performance over wireless links. IEEE/ACM Transactions on Networking, 5(6):756-769, 1997.

[92]
Roberto Baldoni, Jean-Michel Hélary, Michel Raynal, and Lénaick Tanguy. Consensus in byzantine asynchronous systems. Technical Report RR-3655, INRIA, Institut National de Recherche en Informatique et en Automatique, April 1999.

[93]
K. Ban. Convolutionally coded ds/cdma system using multi-antenna transmission. In GLOBECOM 97. IEEE Global Telecommunications Conference. Conference Record (Cat. No.97CH36125), volume 1, pages 92-96, 1997.

[94]
Soheila V. Bana and Pravin Varaiya. Space division multiple access (SDMA) for robust ad hoc vehicle communication networks. In Proc. IEEE 52st Vehicular Technology Conference (VTC'01), pages 962 -- 967, Oakland, CA, USA, 2001.

[95]
Ayan Banerjee, Ronald A. Iltis, and Emmanouel A. Varvarigos. Performance evaluation for a quasi-synchronous packet radio network (QSPNET). IEEE/ACM Transactions on Networking, 9(5):567 -- 577, 2001.

[96]
Jeffrey Q. Bao and Lang Tong. A performance comparison of CDMA ad-hoc and cellular networks. In Proc. IEEE Global Telecommunications Conference (GLOBECOM'00), pages 208-212, San Francisco, CA, USA, 2000.

[97]
Amotz Bar-Noy and Danny Dolev. Consensus algorithms with one-bit messages. Distributed Computing, 4:105-110, 1991.

[98]
Amotz Bar-Noy, Danny Dolev, Cynthia Dwork, and H. Raymond Strong. Shifting gears: Changing algorithms on the fly to expedite byzantine agreement. In Proceedings of the Sixth Annual ACM Symposium on Principles of Distributed Computing, pages 42-51, August 1987.

[99]
A. Bar-Noy, D. Dolev, C. Dwork, and H.R. Strong. Shifting gears: changing algorithms on the fly to expedite Byzantine agreement. Information and Computation, 97(2):205-233, April 1992.

[100]
J.S. Baras. Fast asymmetric internet over wireless satellite-terrestrial networks. MILCOM 97. MILCOM 97 Proceedings, 1:372-377, 1997.

[101]
P. Barker and AC. Boucouvalas. Performance analysis of the IrDA protocol in wireless communications. In Proceedings of First International Symposium on Communication Systems and Digital Signal Processing, volume 1, pages 6-9. IEEE, 1998.

[102]
W. C. Barker, P. Cochrane, and M. Branstad. Embedding cryptography into a Trusted Mach system. In Fourth Aerospace Computer Security Applications Conference, pages 379-383, Silver Spring, MD, USA, December 12-16, 1988. IEEE Computer Society Press.

[103]
Andre Noll Barreto and Gerhard Fettweis. Performance improvement in DS-spread spectrum CDMA systems using a pre- and a post-RAKE. In Proc. International Zurich Seminar on Broadband Communications, pages 39-46, Zurich, Switzerland, 2000.

[104]
K.A. Bartlett, R.A.Scantlebury, and P.T. Wilkinson. A note on reliable full-duplex transmission over half-duplex links. Communications of the ACM (JACM), 12(5):260-261, 1969.

[105]
Alberto Bartoli. Group-based multicast and dynamic membership in wireless networks with incomplete spatial coverage. Mobile Networks and Applications, 3(2):175-188, 1998.

[106]
Melbourne Barton and T. Russell Hsing. Architecture for wireless atm networks. IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC, 2:778-782, 1995.

[107]
Sanjoy Baruah, Giorgio Buttazzo, Sergey Gorinsky, and Giuseppe Lipari. Scheduling periodic task systems to minimize output jitter. In Proceedings of the International Conference on Real-Time Computing Systems and Applications, pages 62-69, December 1999.

[108]
Anindya Basu, Bernadette Charron-Bost, and Sam Toueg. Crash failures vs. crash + link failures. In Proceedings of the Fifteenth Annual ACM Symposium on Principles of Distributed Computing, page 246. ACM Press, 1996.

[109]
Roberto Battiti, Alan A. Bertossi, and Maurizio A. Bonuccelli. Assigning codes in wireless networks: Bounds and scaling properties. Wireless Networks, 5:195-209, 1999.

[110]
F. J. Bauchot and F. Lanne. Ibm wireless rf lan design and architecture. IBM Systems Journal, 34(3):390-408, 1995.

[111]
Günther Bauer and Michael Paulitsch. An investigation of membership and clique avoidance in TTP/C. In 19th Symposium on Reliable Distributed Systems, Nürnberg, Germany, October 2000.

[112]
S.V. Behrhorst. Digital receivers and dds for base stations. Conf. Title: Conference Proceedings. RF Expo WEST, pages 371-377, 1994.

[113]
J. P. Bekmann and P. de Goede. Multi-dimensional security protocol engineering using SPEAR. Technical Report CS97-20-00, Department of Computer Science, University of Cape Town, South Africa, October 2, 1997.

[114]
J. P. Bekmann, P. de Goede, and Andrew Hutchison. SPEAR: A security protocol engineering and analysis resource. In DIMACS Workshop on Design and Formal Verification of Security Protocols, September 3-5, 1997.

[115]
Giampaolo Bella and Lawrence C. Paulson. Using Isabelle to prove properties of the Kerberos authentication system. In Proceedings of the DIMACS Workshop on Design and Formal Verification of Security Protocols, Rutgers University, September 1997.

[116]
Giampaolo Bella and Lawrence C. Paulson. Kerberos Version IV: Inductive analysis of the secrecy goals. In Jean-Jacques Quisquater, Yves Deswarte, Catherine Meadows, and Dieter Gollmann, editors, 5rd European Symposium on Research in Computer Security, ESORICS'98, LNCS 1485, pages 361-375, September 16-18, 1998.

[117]
Mihir Bellare and Phillip Rogaway. Provable secure session key distribution: the three party case. In Proceedings of the 27th Annual ACM Symposium on Theory of Computing, pages 57-66, Las Vegas, NV, USA, May 29-1, 1995.

[118]
Steve Bellovin and Michael Merritt. Limitations of the Kerberos authentication system. In USENIX Winter Conference, 1991.

[119]
Michael Ben-Or. Another advantage of free choice: Completely asynchronous agreement protocols. In Proceedings of the Second Annual ACM Symposium on Principles of Distributed Computing (PODC'83), pages 27-30, Canada, August 1983.

[120]
Bender, Black, Grob, Padovani, Sindhushyana, and Viterbi. CDMA/HDR: A bandwidth efficient high speed wireless data service for nomadic users. IEEE Communications Magazine, 38(7):70-77, 2000.

[121]
G. Benelli, L. Favalli, and G. Filigheddu. A data link layer protocol for wireless atm. In 1997 IEEE International Conference on Communications. Towards the Knowledge Millennium. ICC '97. Conference Record (Cat. No.97CH36067)., volume 3, pages 1438-1442. IEEE, 1997.

[122]
Saddek Bensalem, Yassine Lakhnech, and Sam Owre. Computing abstractions of infinite state systems compositionally and automatically. In Proceedings of the 10th Conference on Computer-Aided Verification, CAV'98, pages 319-331, 1998.

[123]
Saddek Bensalem, Yassine Lakhnech, and Sam Owre. InVeST: A tool for the verification of invariants. In Proceedings of the 10th Conference on Computer-Aided Verification, CAV'98, pages 505-510, 1998.

[124]
B. Bensaou, Yu Wang, and Chi Chung Ko. Fair medium access in 802.11 based wireless ad-hoc networks. In 2000 First Annual Workshop on Mobile and Ad Hoc Networking and Computing., 2000.

[125]
TJ. Berg. Multidestination arq protocol for radio lans. Telektronikk, 93(2):69-79, 1997.

[126]
M.O. Berger, S. Hoff, K. Jakobs, and O. Kubitz. Integration of dect and osi to support mobile computing applications. 1996 IEEE 46th Vehicular Technology Conference. Mobile Technology for the Human Race, 2:1249-1253, 1996.

[127]
Piotr Berman and Juan A. Garay. Asymptotically optimal consensus. In Proc. 16th International Colloquium on Automata, Languages and Programming, pages 80-94, July 1989.

[128]
Piotr Berman and Juan A. Garay. Efficient distributed consensus with n=(3+ epsilon )t processors. In Proceedings of the 5th International Workshop on Distributed Algorithms, pages 129-142, October 1991.

[129]
Piotr Berman and Juan A. Garay. Cloture votes: n/4-resilient distributed consensus in t+1 rounds. Mathematical Systems Theory, 26:3-19, July 1993.

[130]
Piotr Berman and Juan A. Garay. Cloture votes: n/4-resilient distributed consensus in t+1 rounds. Mathematical Systems Theory, 26(1):3-19, 1993.

[131]
Piotr Berman and Juan A. Garay. Randomized distributed agreement revisited. In Proceedings 23rd Int. Conf. on Fault-Tolerant Computing (FTCS-23), pages 412-419, Toulouse, France, 1993. IEEE Computer Society Press.

[132]
Piotr Berman, Juan A. Garay, and Kenneth J. Perry. Towards optimal distributed consenus. In Proceedings of the 30th IEEE Symposium on the Foundations of Computer Science, pages 410-415. IEEE Computer Society Press, 1989.

[133]
Piotr Berman, Juan A. Garay, and Kenneth J. Perry. Asymptotically optimal distributed consensus. http://www.bell-labs.com/user/garay/#distributed-pub, 1992. (A combination of results from ICALP'89, FOCS'89, and WDAG'91).

[134]
J.T. Bernhard. Analysis of integrated antenna positions on a laptop computer for mobile data communication. In IEEE Antennas and Propagation Society International Symposium 1997., volume 4, pages 2210-2213, 1998.

[135]
P. A. Bernstein, V. Hadzilacos, and N. Goodman. Concurrency Control and Recovery in Database Systems. Addison-Wesley, Reading, Mass., 1987.

[136]
Daniel M. Berry. Towards a formal basis for the formal development method and the Ina Jo specification language. IEEE Transactions on Software Engineering, 13(2):184-200, February 1987.

[137]
Marin Bertier, Olivier Marin, and Pierre Sens. Implementation and performance evaluation of an adaptable failure detector. In Proceedings of the International Conference on Dependable Systems and Networks (DSN'02), pages 354-363, Washington, DC, June 23-26, 2002.

[138]
Elisa Bertino, Francesco Buccafurri, Elena Ferrari, and Pasquale Rullo. An authorization model and its formal semantics. In Jean-Jacques Quisquater, Yves Deswarte, Catherine Meadows, and Dieter Gollmann, editors, 5rd European Symposium on Research in Computer Security, ESORICS'98, LNCS 1485, pages 127-142, September 16-18, 1998.

[139]
Pravin Bhagwat, Partha Bhattacharya, and Arvind Krishna. Using channel state dependent packet scheduling to improve tcp throughput over wireless lans. Wireless Networks, 3(1):91-102, 1997.

[140]
V. Bharghavan and C. V. Ramamoorthy. Security issues in mobile communications. In International Symposium on Autonomous Decentralized Systems'95, April 1995.

[141]
V. Bharghavan. Secure wireless LANs. In Proceedings of the 2nd ACM Conference on Computer and communications security, pages 10-17, November 1994.

[142]
V. Bharghavan. Dynamic addressing scheme for wireless media access. IEEE International Conference on Communications, 2:756-760, 1995.

[143]
V. Bharghavan. Performance analysis of a medium access protocol for wireless packet networks. In IEEE Performance and Dependability Symposium '98, August 1998.

[144]
R. Bhattacharya and A. Ephremides. A distributed multicast routing protocol for ad-hoc (flat) mobile wireless networks. In Waves of the Year 2000+ PIMRC '97. The 8th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications. Technical Program, Proceedings (Cat. No.97TH8271)., volume 3, pages 877-881. IEEE, 1997.

[145]
Giuseppe Bianchi, Flaminio Borgonovo, Luigi Fratta, Luigi Musumeci, and Michele Zorzi. C-prma: the centralized packet reservation multiple access for local wireless communications. IEEE Global Telecommunications Conference, 3:1340-1345, 1994.

[146]
G. Bianchi. Ieee 802.11-saturation throughput analysis. Communications Letters, 2(12):318-20, 1998.

[147]
Martin Biely and Ulrich Schmid. Message-efficient consensus in presence of hybrid node and link faults. Technical Report 183/1-116, Department of Automation, Technische Universität Wien, August 2001. (submitted).

[148]
Martin Biely. Byzantine agreement under the perception-based fault model. Diplomarbeit, Technische Universität Wien, Department of Automation, February 2002.

[149]
Martin Biely. Towards an optimal algorithm for hybrid Byzantine agreement. Technical Report 183/1-130, Department of Automation, Technische Universität Wien, April 2003. (submitted).

[150]
Murat Bilgic. Mobility management application protocol (mmap) for north american pcs network. IEEE Intelligent Network Workshop, IN, 1:6pp, 1996.

[151]
Benny Bing and Regu Subramanian. A novel technique for quantitative performance evaluation of wireless lans. Computer Communications, 21(9):833-838, 1998.

[152]
Ray Bird, Inder Gopal, Amir Herzberg, Phil Janson, Shay Kutten, Refik Molva, and Moti Yung. Systematic design of a family of attack resistant protocols. IEEE Journal on Selected Areas in Communications, 11(5):679-693, June 1993.

[153]
Ray Bird, Inder Gopal, Amir Herzberg, Phil Janson, Shay Kutten, Refik Molva, and Moti Yung. Kryptoknight family of light-weight protocols for authentication and key distribution. IEEE/ACM Transactions on Networking, 3(1):31-41, February 1995.

[154]
Ray Bird, Inder Gopal, Amir Herzberg, Phil Janson, Shay Kutten, Refik Molva, and Moti Yung. The KryptoKnight family of light-weight protocols for authentication and key distribution. IEEE/ACM Transactions on Networking, 3(1):31-41, February 1995.

[155]
Tina Bird. Building VPNs: The 10-point plan. Data Communications, 27(9):123, 124, 126, 128, 130, 132, June 1998.

[156]
C. Bisdikian, P. Bhagwat, BP. Gaucher, FJ. Janniello, M. Naghshineh, and P. Pandoh. Wisap: A wireless personal access network for handheld computing devices. IEEE Personal Communications., 5(6):18-25, 1998.

[157]
Chatschik C. Bisdikian. Throughput behavior of the n-ary stack algorithm in mobile networks with capture. Conference on Local Computer Networks, pages 453-458, 1995.

[158]
W. Blake and I. Mahgoub. Delta service in a mobile file system client cache. 1998 IEEE International Performance, Computing and Communications Conference. Proceedings, pages 222-228, 1998.

[159]
Simon Blake-Wilson and Alfred Menezes. Authenticated Diffie-Hellman key agreement protocols. In Proceedings of the 5th Annual Workshop on Selected Areas in Cryptography (SAC'98), LNCS 1556, pages 339-361, 1999.

[160]
Chiara Bodei, Pierpaolo Degano, Flemming Nielson, and Hanne Riis Nielson. Security analysis using flow logics. Bulletin of the European Association for Theoretical Computer Science EATCS, pages 112-129, February 2000.

[161]
J. Boettcher and T. Limbrunner. Multimedia communications over wireless lans via the swl protocol. Methoden des Fernzugriffs auf Feldbus-basierte Systeme., 119(7/8):8, 10-13, 1998.

[162]
Dominique Bolignano. An approach to the formal verification of cryptographic protocols. In Proceedings of the 3rd ACM Conference on Computer and Communications Security, CCS'96, pages 106-118, March 14-15, 1996.

[163]
Dominique Bolignano. Towards a mechanization of cryptographic protocol verification. In Orna Grumberg, editor, Proceedings of CAV'97, LNCS 1254, pages 131-142. Springer Verlag, June 22-25, 1997.

[164]
R. Bolla, F. Davoli, M. Taffone, and F. Reichert. Prma-isa protocol for multiple access of mixed voice and data traffic. IEEE Vehicular Technology Conference, 2:1213-1217, 1994.

[165]
Raffaele Bolla, Franco Davoli, and Carlo Nobile. The rra-isa multiple access protocol with and without simple priority schemes for real-time and data traffic in wireless cellular systems. Mobile Networks and Applications, 2(1):45-53, 1997.

[166]
T. Bolognesi and E. Brinksma. Introduction to the ISO specification language LOTOS. Computer Networks and ISDN Systems, 14(1):25-59, 1987.

[167]
Mike Bond and Ross Anderson. API-level attacks on embedded systems. IEEE Computer, October 2001.

[168]
Dan Boneh and Hovav Shacham. Fast variants of RSA. CryptoBytes Technical Newsletter, 5(1):1-9, Winter/Spring 2002.

[169]
Wang Bor-Chin and Chang Po-Rong. Spread spectrum multiple-access with dpsk modulation and diversity for image transmission over indoor radio multipath fading channels. IEEE Transactions on Circuits and Systems for Video Technology, 6(2):200-214, April 1996.

[170]
Flaminio Borgonovo and Michele Zorzi. Slotted aloha and cdpa: A comparison of channel access performance in cellular systems. Wireless Networks, 3(1):43-51, 1997.

[171]
Nikita Borisov, Ian Goldberg, and David Wagner. Intercepting mobile communications: The insecurity of 802.11. In Conference on Mobile Computing and Networking (MOBICOM'01), July16-21, 2001.

[172]
Paulina Borsook. Data communications. IEEE Spectrum, 31:26-29, January 1994.

[173]
Charles D. Bosco, Li Pi Su, Henry Girolamo, and Mark Darty. Maintenance and repair support system (marss). AUTOTESTCON (Proceedings), pages 336-343, 1996.

[174]
Prosenjit Bose, Luc Devroye, William Evans, and David Kirkpatrick. On the spanning ratio of gabriel graphs and beta-skeletons. In Proceedings of the Latin American Theoretical INformatics, April 2002.

[175]
Prosenjit K. Bose, Joachim Gudmundsson, and Michiel Smid. Constructing plane spanners of bounded degree and low weight. In Processings of the 10th European Symposium on Algorithms, September 2002.

[176]
Antoon Bosselaers, René Govaerts, and Joos Vandewalle. Fast hashing on the Pentium. In Advances in Cryptology, Proceedings Crypto'96, LNCS 1109, pages 298-312. Springer Verlag, 1996.

[177]
Nora Boukari and Ali Aljane. Security and auditing of VPN. In Proceedings of the International Workshop on Services in Distributed and Networked Environments, pages 132-138. IEEE, 1996.

[178]
Amor Bouzelat and Zoubir Mammeri. Simple reading, implicit rejection and average function for fault-tolerant physical clock synchronization. In Proceedings of the 23rd EUROMICRO Conference, pages 524-531, 1997.

[179]
C. A. Bower and S. J. Lodico. Security and access: new technologies in wide area networks. In 15th Annual Computers in Libraries 2000. Proceedings - 2000, pages 25-30. Inf. Today, Medford, NJ, USA, 2000.

[180]
Colin Boyd and Wenbo Mao. Designing secure key exchange protocols. In Dieter Gollmann, editor, 3rd European Symposium on Research in Computer Security, ESORICS'94, LNCS 875, pages 93-105, November 7-9, 1994.

[181]
Colin Boyd and Anish Mathuria. Key establishment protocols for secure mobile communications: A selective survey. In Colin Boyd and Ed Dawson, editors, 3rd Australasian Conference, ACISP'98, LNCS 1438, pages ??--??, July 13-15, 1998.

[182]
Colin Boyd. A class of flexible and efficient key management protocols. In Proceedings of 9th IEEE Computer Security Foundations Workshop, pages 2-8, 1996.

[183]
Colin Boyd. A framework for design of key establishment protocols. In Information Security and Privacy, LNCS 1172, pages 146-157, 1996.

[184]
Colin Boyd. Extensional goals in authentication protocols. In Proceedings of the DIMACS Workshop on Design and Formal Verification of Security Protocols, Rutgers University, September 1997.

[185]
G. Bracha and Sam Toueg. Resilient consensus protocols. In Proceedings of the 2nd Symposium on the Principles of Distributed Computing (PODC'83), pages 12-26, Montreal, Canada, 1983.

[186]
Stephen H. Brackin, Catherine Meadows, and Jonathan Millen. CAPSL interface for the NRL protocol analyzer. In 2nd IEEE Symposium on Application-Specific Systems and Software Engineering Technology (ASSET'99), pages ??--?? (10 pages), March 1999.

[187]
Stephen H. Brackin. An interface specification language for automatically analyzing cryptographic protocols. In Internet Society Symposium on Network and Distributed System Security, page 12 pages, February 1997.

[188]
Stephen H. Brackin. A state-based HOL theory of protocol failure. Technical Report ATR 98007, Arca Systems / Exodus Communications, 1997.

[189]
Stephen H. Brackin. Automatic analysis of cryptographic protocols. Technical Report ATR 99057, Arca Systems / Exodus Communications, July 1999.

[190]
R. Neil Braithwaite. Using Walsh code selection to reduce the power variance of bandlimited forward-link CDMA waveforms. Technical Report HPL-1999-87, Hewlett-Packard Laboratories, 1999.

[191]
Emmanuel Bresson, Olivier Chevassut, David Pointcheval, and Jean-Jacques Quisquater. Provably authenticated group diffie-hellman key exchange. In Proceedings of the 8th ACM Conference on Computer and Communications Security, pages 255-264, November 2001.

[192]
Emmanuel Bresson, Olivier Chevassut, David Pointcheval, and Jean-Jacques Quisquater. Provably authenticated group diffie-hellman key exchange - the dynamic case. In Advances in Cryptology - ASIACRYPT 2001, LNCS 2248, pages 290-309, December 2001.

[193]
Josh Broch, David A. Maltz, David B. Johnson, Yih Chun Hu, and Jorjeta Jetcheva. A performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. In The fourth annual ACM/IEEE international conference on Mobile computing and networking, October 25-30, 1998.

[194]
Josh Broch, David A. Maltz, David B. Johnson, Yih-Chun Hu, and Jorjeta Jetcheva. A performance comparison of multi-hop wireless ad hoc network routing protocols. In The fourth annual ACM/IEEE international conference on Mobile computing and networking, pages 85-97. ACM/IEEE, 1998.

[195]
Robert Brodersen. Infopad - an experiment in system level design and integration. Proceedings - Design Automation Conference 1997, pages 313-314, 1997.

[196]
Kevin Brown and Suresh Singh. Relm: reliable multicast for mobile networks. Computer Communications, 21(16):1379-1400, 1998.

[197]
Jack Browne. Emulator simulates path losses/fading in wireless systems. Microwaves and RF ISSN: 0745-2993, 33(8):2p, 1994.

[198]
Jeremy Bryans and Steve Schneider. CSP, PVS, and a recursive authentication protocol. In DIMACS Workshop on Design and Formal Verification of Security Protocols, page 20 pages, September 3-5, 1997.

[199]
Budiarto, K. Harumoto, M. Tsukamoto, S. Nishio, and T. Takine. On strategies for allocating replicas of mobile databases. IEICE Transactions on Information and Systems E81D(1), pages 37-46, 1998.

[200]
Anthony Burrell, Harold P. Stern, and P. Papantoni-Kazakos. Dynamic capacity allocation and hybrid multiplexing techniques for atm wireless lans. Mobile Networks and Applications, 3(3):307-316, 1998.

[201]
A. Burrell. An integrated approach to signaling, transmission, and traffic monitoring for dynamic capacity allocation in mobile atm networks. Proceedings of the Thirtieth Hawaii International Conference on System Sciences (Cat. No.97TB100234), 5:109-118, 1997.

[202]
Michael Burrows, Martín Abadi, and Roger Needham. A logic of authentication. Technical Report 39, Digital Equipment Corporation Systems Research Center, Palo Alto, California, USA, February 1989.

[203]
Michael Burrows, Martín Abadi, and Roger Needham. A logic of authentication. ACM Transactions on Computer Systems, 8(1):18-36, February 1990.

[204]
L. Buttyan and J. P. Hubaux. Enforcing service availability in mobile ad-hoc WANs. In 2000 First Annual Workshop on Mobile and Ad Hoc Networking and Computing., 2000.

[205]
Levente Buttyán, Sebastian Staamann, and Uwe G. Wilhelm. A simple logic for authentication protocol design. In Proceedings of the 11th IEEE Computer Security Foundation Workshop, June 9-11, 1998.

[206]
Levente Buttyán. Formal methods in the design of cryptographic protocols (state of the art). Technical Report SSC/1999/38, Swiss Federal Institute of Technology (EPFL), Lausanne, Switzerland, November 1999.

[207]
Stefano Buzzi, Marco Lops, and H. Vincent Poor. Code-aided interference suppresion for DS/CDMA overlay systems. Proceedings of the IEEE, 90(3):394-435, March 2002.

[208]
Ramón Cáceres and Liviu Iftode. Effects of mobility on reliable transport protocols. Proceedings - International Conference on Distributed Computing Systems, pages 12-20, 1994.

[209]
Ramón Cáceres and Liviu Iftode. Improving the performance of reliable transport protocols in mobile computing environments. IEEE Journal on Selected Areas in Communications, 13(5):850-857, 1995.

[210]
Ramón Cáceres and Venkata N. Padmanabhan. Fast and scalable wireless handoffs in support of mobile internet audio. Mobile Networks and Applications, 3(4):351-363, 1998.

[211]
Christian Cachin, Klaus Kursawe, and Victor Shoup. Random oracles in Constantinople: Practical asynchronous byzantine agreement using cryptography. In Proc. 19th ACM Symposium on Principles of Distributed Computing (PODC 2000), pages 123-132, July 2000.

[212]
C. Cachin, K. Kursawe, , F. Petzold, and Victor Shoup. Secure and efficient asynchronous broadcast protocols, March 7, 2001.

[213]
C. Cachin, K. Kursawe, F. Petzold, and Victor Shoup. Secure and efficient asynchronous broadcast protocols. Technical Report RZ 3317, IBM Research, 2001.

[214]
Christian Cachin. Distributing trust on the Internet. In International Conference on Dependable Systems and Networks (DSN'01), pages 183-192, July 1-4, 2001.

[215]
F. Callegati and C. Raffaelli. Carrying atm connections over a csma/ca wireless mac protocol. In E-Int. Soc. Opt. Eng. Proceedings of Spie - the International Society for Optical Engineering, volume 3233, pages 361-70, 1997.

[216]
F. Callegati, M. Pedrelli, and C. Raffaelli. Analysis of csma/ca protocol for wireless networking of atm multiservice applications. Annual International Conference on Universal Personal Communications- Record, 1:286-290, 1996.

[217]
Ran Canetti and Tal Rabin. Fast asynchronous Byzantine agreement with optimal resilience. In Proceedings 25th Annual ACM Symposium on Theory of Computing, pages 42-51, San Diego, CA, 1993.

[218]
J. C. Cano and P. Manzoni. A performance comparison of energy consumption for Mobile Ad Hoc Network routing protocols. In Proceedings 8th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems, August 2000.

[219]
Q. Cao. Medium access control (mac) for wide-band cdma systems with optimal throughput. In VTC '98. 48th IEEE Vehicular Technology Conference. Pathway to a Global Wireless Revolution (Cat. No.98CH36151), volume 2, pages 988-992. IEEE, 1998.

[220]
S. Carcopardi, F. Gatti, and G. Reali. Channel estimation using linear prediction for wireless indoor communications. In Conf. Title: ICC `95 Seattle. Communications - Gateway to Globalization. 1995 IEEE International Conference on Communications, volume 2, pages 1014-1018, 1995.

[221]
Wilmer Caripe, George Cybenko, Katsuhiro Moizumi, and Robert Gray. Network awareness and mobile agent systems. IEEE Communications Magazine, 36(7):44-49, July 1998.

[222]
G.S. Carlson, I.B. Levinstein, J.L. Schwing, and F.M. Williams. Networks in the outdoor, industrial environment. Proceedings of the 32nd Annual Southeast Conference, pages 319-322, 1994.

[223]
M. Cermele and V. Grassi. Performance analysis of a dynamic control policy for prma protocols. In 6th IEEE Workshop on Future Trends of Distributed Computing Systems (FTDCS '97) October 29-31, 1997. IEEE, 1997.

[224]
CERT. CERT advisory: TCP SYN flooding and IP spoofing attacks. Technical Report CA-1996-21, Carnegie Mellon Software Engineering Institute, September 19, 1996. http://www.cert.org/advisories/CA-1996-21.html.

[225]
I. Cervesato, N. Durgin, P. Lincoln, J. Mitchell, and A. Scedrov. A meta-notation for protocol analysis. In Proceedings of the 12th IEEE Computer Security Foundations Workshop, June 1999.

[226]
Toh Chai-Keong. Performance evaluation of crossover switch discovery algorithms for wireless atm lans. Conference Title: Proceedings of the 1996 15th Annual Joint Conference of the IEEE Computer and Communications Societies, INFOCOM'96., 3:1380-1387, 1996.

[227]
H.H. Chan, J.M.H. Elmirghani, and R.A. Cryan. Performance analysis of indoor infrared wireless networks utilising ppm cdma. Conf. Title: 1995 IEEE International Conference on Communications. Converging Technologies for Tomorrow's Applications., 3:1467-1471, 1995.

[228]
ACF. Chan, DHK. Tsang, and S. Gupta. Tcp (transmission control protocol) over wireless links. In 1997 IEEE 47th Vehicular Technology Conference. Technology in Motion (Cat. No.97CH36003)., volume 3, pages 1326-1330. IEEE, 1997.

[229]
Wai Chung Chan, E. Geraniotis, and C. Derrien. A medium access protocol for interconnecting atm and wireless networks. In 1997 IEEE International Conference on Communications. Towards the Knowledge Millennium. ICC '97. Conference Record (Cat. No.97CH36067)., volume 3, pages 1448-1453. IEEE, 1997.

[230]
Tushar Deepak Chandra and Sam Toueg. Unreliable failure detectors for reliable distributed systems. Journal of the ACM, 43(2):225-267, March 1996.

[231]
Tushar Deepak Chandra, Vassos Hadzilacos, and Sam Toueg. The weakest failure detector for solving consensus. Journal of the ACM, 43(4):685-722, June 1996.

[232]
Anantha Chandrakasan, Andy Burstein, and Robert W. Brodersen. Low power chipset for portable multimedia applications. Digest of Technical Papers - IEEE International Solid-State Circuits Conference, pages 82-83, 1994.

[233]
Yu Liang Chang and Ching Chi Hsu. Routing in wireless/mobile ad-hoc networks via dynamic group construction. Mobile Networks and Applications, 5, 2000.

[234]
James J.C. Chang, Richard A. Miska, and R.Anthony Shober. Wireless systems and technologies: an overview. AT and T Technical Journal, 72(4):11-18, 1993.

[235]
H. Chang, C. Tait, N. Cohen, M. Shapiro, S. Mastrianni, R. Floyd, B. Housel, and D. Lindquist. Web browsing in a wireless environment: disconnected and asynchronous operation in artour web express. MobiCom '97. Proceedings of the Third Annual ACM/IEEE International Conference on Mobile Computing and Networking, pages 260-269, 1997.

[236]
Bernadette Charron-Bost and André Schiper. Uniform consensus harder than consensus. Technical Report DSC/2000/028, École Polytechnique Fédérale de Lausanne, Switzerland, May 2000.

[237]
Bernadette Charron-Bost, Rachid Guerraoui, and André Schiper. Synchronous system and perfect failure detector: Solvability and efficiency issues. In Proceedings of the IEEE Int. Conf. on Dependable Systems and Networks (DSN'00), pages 523-532, New York, USA, 2000. IEEE Computer Society.

[238]
Soma Chaudhuri. More choices allow more faults: Set consensus problems in totally asynchronous systems. Information and Control, 105(1):132-158, July 1993.

[239]
Kwang-Cheng Chen and Chia-Sheng Chang. Guaranteed quality-of-services wireless access to broadband networks. In IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC, volume 3, pages 1351-1354. IEEE, 1998.

[240]
Kwang-Cheng Chen and Cheng-Hua Lee. Group randomly addressed polling for multicell wireless data networks. Conference Record - International Conference on Communications, 2:913-917, 1994.

[241]
X.H. Chen and N.C. Lim. Triple-receiver-based code protocol for unslotted ds/ssma packet-radio networks and its performance analysis. IEE Proceedings-Communications, 142(3):193-200, 1995.

[242]
X.H. Chen and N.C. Lim. Triple-receiver-based code protocol for unslotted ds/ssma packet-radio networks and its performance analysis. IEE Proceedings: Communications, 142(3):193-200, 1995.

[243]
X. H. Chen and J. Oksman. Performance-bound analysis of the new ds/ssma protocol for wireless data networks. IEE Proceedings: Communications, 142(4):255-262, 1995.

[244]
X.H. Chen and J. Oksman. Using code sensing and chip rate division techniques to improve stability and throughput-delay performance for distributed ds/ssma wireless networks. Wireless Personal Communications, 1(3):191-209, 1995.

[245]
X.H. Chen and J. Oksman. Destructive collision-free protocol for distributed ds/cdma wireless networks using code-sensing and chip-rate-division techniques. IEE Proceedings: Communications, 143(1):47-55, 1996.

[246]
Kwang-Cheng Chen and Ya-Ku Sun. General multi-layer collision resolution multiple access protocol for wireless networks. IEEE Vehicular Technology Conference, 1:116-120, 1996.

[247]
Kwang-Cheng Chen and Dsun-Chie Twu. On the multiuser information theory for wireless networks with interference. IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC, 3:1313-1317, 1995.

[248]
Kwang-Cheng Chen and Dsun-Chie Twu. Theory of wireless networks with interference. Journal of the Chinese Institute of Electrical Engineering, Transactions of the Chinese Institute of Engineers, Series E/Chung KuoTien Chi Kung Chieng Hsueh K'an, 2(4):329-338, 1996.

[249]
Jyh-Cheng Chen, Krishna M. Sivalingam, and Patrick W. Dowd. Framework for comparative analysis of channel access protocols for wireless atm networks. Annual International Conference on Universal Personal Communications- Record, 1:281-285, 1996.

[250]
X.H. Chen, N.C. Lim, and J. Oksman. Novel group based common-receiver (gbcr) code protocol for cdma wireless networks with improved throughput-delay performance. Conference Record / IEEE Global Telecommunications Conference, 1:350-354, 1996.

[251]
Jyh-Cheng Chen, Krishna M. Sivalingam, and Raj Acharya. Comparative analysis of wireless ATM channel access protocols supporting multimedia traffic. Mobile Networks and Applications, 3:293-306, 1998.

[252]
Jyh-Cheng Chen, Krishna M. Sivalingam, Prathima Agrawal, and Raj Acharya. On scheduling of multimedia services in a low-power mac for wireless atm networks. In IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC, volume 1, pages 243-247. IEEE, 1998.

[253]
Wen-Tsuen Chen, Wen-Tsung Lin, and Shih-Pei Chen. Traffic management for wireless atm networks. In Proceedings of the 1998 International Conference on Parallel and Distributed Systems, ICPADS, pages 398-405. IEEE, 1998.

[254]
Chi-Chung Chen, Kung Yao, and Ezio Biglieri. Optimal spread spectrum sequences -- constructed from Gold codes. In Global Telecommunications Conference (GLOBECOM'00), volume 2, pages 867-871, 2000.

[255]
Wei Chen, Sam Toueg, and Marcos Kawazoe Aguilera. On the quality of service of failure detectors. In Proceedings IEEE International Conference on Dependable Systems and Networks (ICDSN / FTCS'30), 2000.

[256]
Hsiao-Hwa Chen, Jun-Feng Yeh, and Naoki Suehiro. A multicarrier CDMA architecture based on orthogonal complementary codes for new generations of wideband wireless communications. IEEE Communications Magazine, 39(10):126-135, 2001.

[257]
Hsiao-Hwa Chen. Hierarchy schedule sensing protocol for CDMA wireless networks and its performance under multiple collision and capture effect. IEICE Trans. Commun., E83-B(3):703-712, 2000.

[258]
Wei Chen. On the Quality of Service of Failure Detectors. PhD thesis, Cornell University, May 2000.

[259]
Stuart Cheshire and Mary Baker. A wireless network in MosquitoNet. IEEE Micro, pages 44-52, February 1996.

[260]
William Cheung. Building multiservice internet protocol virtual private networks. Proceedings of SPIE - The International Society for Optical Engineering, 3845:340-349, September 1999.

[261]
Harshal S. Chhaya and Sanjay Gupta. Throughput and fairness properties of asynchronous data transfer methods in the ieee 802.11 mac protocol. IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC, 2:613-617, 1995.

[262]
Harshal S. Chhaya and Sanjay Gupta. Performance modeling of asynchronous data transfer methods of ieee 802.11 mac protocol. Wireless Networks, 3(3):217-234, 1997.

[263]
Ching-Chuan Chiang and Mario Gerla. On-demand multicast in mobile wireless networks. In Sixth International Conference on Network Protocols. IEEE, 1998.

[264]
Ching-Chuan Chiang, Mario Gerla, and Lixia Zhang. Shared tree wireless network multicast. In 6th International Conference on Computer Communications and Networks (ICCCN '97). IEEE, 1997.

[265]
Vineet Chikarmane, Carey L. Williamson, Richard B. Bunt, and Wayne L. Mackrell. Multicast support for mobile hosts using mobile ip: Design issues and proposed architecture. Mobile Networks and Applications, 3(4):365-379, 1998.

[266]
Le-Pond Chin. A secure registration protocol for wireless internet. In Waves of the Year 2000+ PIMRC '97. The 8th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications. Technical Program, Proceedings (Cat. No.97TH8271)., volume 2, pages 495-499. IEEE, 1997.

[267]
I. Chlamtac and C.A. Ruszczyk. Integrated protocol stack for efficient resources management in wireless networks. Journal of Network and Systems Management, 4(2):221-239, 1996.

[268]
I. Chlamtac, C. Petrioli, and J. Redi. An energy-conserving access protocol for wireless communication. In 1997 IEEE International Conference on Communications. Towards the Knowledge Millennium. ICC '97. Conference Record (Cat. No.97CH36067)., volume 2, pages 1059-1062. IEEE, 1997.

[269]
Imrich Chlamtac, Chiara Petrioli, and Jason Redi. Energy-conserving selective repeat arq protocols for wireless data networks. In IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC, volume 2, pages 836-840. IEEE, 1998.

[270]
A. Chockalingam and Michele Zorzi. Energy consumption performance of a class of access protocols for mobile data networks. In IEEE Vehicular Technology Conference, volume 2, pages 820-824. IEEE, 1998.

[271]
A. Chockalingam, P. Venkataram, and A. Prabhakar. Throughput-delay characteristics of ocum protocol for media access in multihop wireless networks with buffers. Computer Communications, 17(6):419-427, June 1994.

[272]
A. Chockalingam, Laurence B. Milstein, and P. Venkataram. Analysis of a media access protocol for wireless messaging systems. Annual International Conference on Universal Personal Communications- Record, 1:12-16, 1996.

[273]
A. Chockalingam, Weiping Xu, Michele Zorzi, and Laurence B. Milstein. Energy efficiency analysis of a multichannel wireless access protocol. In IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC, volume 3, pages 1096-1100. IEEE, 1998.

[274]
Sunghyun Choi and Kang G. Shin. A cellular wireless local area network with qos guarantees for heterogeneous traffic. In IEEE Infocom '97 - 16th Conference on Computer Communications. IEEE, 1997.

[275]
Tse-Huong Choo. Vaulted VPN: Compartmented virtual private networks on trusted operating systems. Technical report, HP Lab Bristol, Bristol, UK, March 1999.

[276]
Benny Chor and Brian A. Coan. A simple and efficient randomized byzantine agreement algorithm. IEEE Transactions on Software Engineering, 11(6):531-539, June 1985.

[277]
Hsiu-Fen Chou and Kwang-Cheng Chen. Performance of group randomly addressed polling with reservation in wireless integrated service networks. Conference Record / IEEE Global Telecommunications Conference, 2:1497-1501, 1995.

[278]
Hsiu-Fen Chou, Cheng-Hua Lee, and Kwang-Cheng Chen. Group randomly addressed polling with reservation for wireless integrated service networks. IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC, 2:618-622, 1995.

[279]
Mooi Choo Chuah and Enrique J. Hernandez-Valencia. Mobile virtual private dial-up services. Bell-Labs-Technical-Journal, 4(3):51-72, July 1999.

[280]
Mooi Choo Chuah, On-Ching Yue, and Antonio DeSimone. Performance of two tcp implementations in mobile computing environments. Conference Record / IEEE Global Telecommunications Conference, 1:339-344, 1996.

[281]
Mooi Choo Chuah, Bharat Doshi, Subra Dravida, Richard Ejzak, and Sanjiv Nanda. Link layer retransmission schemes for circuit-mode data over the cdma physical channel. Mobile Networks and Applications, 2(2):195-211, 1997.

[282]
Justin Chuang and Nelson R. Sollenberger. Performance of autonomous dynamic channel assignment and power control for tdma/fdma wireless access. IEEE Vehicular Technology Conference, 2:794-798, 1994.

[283]
Justin C.-I. Chuang and Nelson R. Sollenberger. Performance of autonomous dynamic channel assignment and power control for tdma/fdma wireless access. IEEE Journal on Selected Areas in Communications, 12(8):1314-1323, 1994.

[284]
Shaw-Cheng Chuang. Securing ATM networks. In Proceedings of the 3rd ACM Conference on Computer and Communications Security, CCS'96, pages 19-30, March 1996.

[285]
Augusto Ciuffoletti. Self-stabilizing clock synchronization in a hierarchical network. In 19th IEEE International Conference on Distributed Computing Systems Workshop on Self-Stabilizing Systems, pages 86-93, 1999.

[286]
Brent N. Clark, Charles J. Colbourn, and David S. Johnson. Unit disk graphs. Discrete Mathematics, 86(1-3):165-177, 1990.

[287]
Russell J. Clark, Mostafa H. Ammar, and Kenneth L. Calvert. Protocol discovery in multiprotocol networks. Mobile Networks and Applications, 2(3):271-284, 1997.

[288]
Edmund M. Clarke, Somesh Jha, and Will Marrero. A machine checkable logic of knowledge for specifying security properties of electronic commerce protocols. In Workshop on Formal Methods and Security Protocols, 1998.

[289]
Edmund M. Clarke, Somesh Jha, and Will Marrero. Using state exploration and a natural deduction style message derivation engine to verify security protocols. In Proceedings of the IFIP Working Conference on Programming Concepts and Methods (PROCOMET), 1998.

[290]
Allan C. Cleary and Michael Paterakis. Investigation of reservation random access algorithms for voice-data integration in microcellular wireless environments. IEEE Global Telecommunications Conference, 3:1333-1339, 1994.

[291]
Allan C. Cleary and Michael Paterakis. Investigation of reservation random access algorithms for voice-data integration in microcellular wireless environments. International Journal of Wireless Information Networks, 2(1):1-16, 1995.

[292]
Brian A. Coan and Jennifer L. Welch. Modular construction of a byzantine agreement protocol with optimal message bit complexity. Information and Computation, 97:61-85, 1992.

[293]
Brian Coan and Jennifer Welch. Modular construction of an efficient 1-bit byzantine agreement protocol. Mathematical Systems Theory, 26:131-154, July 1993.

[294]
Brian Coan. A communication-efficient canonical form for fault-tolerant distributed algorithms. In Proccedings of the Fifth Annual ACM Symposium on Principles of Distributed Computing, pages 63-72, 1986.

[295]
Brian Coan. Efficient agreement using fault diagnosis. Distributed Computing, 7, 1993. also in Proc 26th Allerton Conf. on Communication, Control and Computing, 1988.

[296]
Jorge A. Cobb and Prathima Agrawal. Congestion or corruption: a strategy for efficient wireless tcp sessions. IEEE Symposium on Computers and Communications - Proceedings, pages 262-268, 1995.

[297]
Philip R. Cohen, Michael Johnston, David McGee, Sharon Oviatt, Jay Pittman, Ira Smith, Liang Chen, and Josh Clow. Quickset: multimodal interaction for distributed applications. Proceedings of the ACM International Multimedia Conference and Exhibition 1997., pages 31-40, 1997.

[298]
Marco Conti, Claudio Demaria, and Lorenzo Donatiello. Design and performance evaluation of a mac protocol for wireless local area networks. Mobile Networks and Applications, 2(1):69-87, 1997.

[299]
David A. Cooper and Kenneth P. Birman. The design and implementation of a private message service for mobile computers. Wireless Networks, 1(3):297-309, 1995.

[300]
David A. Cooper and Kenneth P. Birman. Preserving privacy in a network of mobile computers. Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy, pages 26-33, 1995.

[301]
G.E. Corazza. On the generation of side information for frequency hopping multiple access in rice fading. In 1997 IEEE 47th Vehicular Technology Conference. Technology in Motion (Cat. No.97CH36003), volume 3, pages 1605-1608, 1997.

[302]
James C. Corbett, Matthew B. Dwyer, John Hatcliff, and Roby. Bandera: a source-level interface for model checking Java programs. In International Conference on Software Engineering, ICSE 2000, pages 762-765, 2000.

[303]
Costas Courcoubetis, editor. Computer-Aided Verification, CAV '93, volume 697 of Lecture Notes in Computer Science, Elounda, Greece, June/July 1993. Springer-Verlag.

[304]
Andrew Cray. Secure VPNs: Lock the data, unlock the savings. Data Communications, 26(7):49-56, May 1997.

[305]
Andrew Cray. Armed compounds. Data Communications, 27(6):57-62, 64, April 1998.

[306]
Flaviu Cristian and Christof Fetzer. Fault-tolerant internal clock synchronization. In Proceedings of the Thirteenth Symposium on Reliable Distributed Systems, pages 22-31, Dana Point, Ca., Oct 1994.

[307]
Flaviu Cristian and Christof Fetzer. Fault-tolerant external clock synchronization. In Proceedings of the 15th International Conference on Distributed Computing Systems, pages 70-77, 1995.

[308]
Flaviu Cristian and Christof Fetzer. The timed asynchronous distributed system model. IEEE Transactions on Parallel and Distributed Systems, 10(6):642-657, 1999.

[309]
Flaviu Cristian, Houtan Aghili, Ray Strong, and Danny Dolev. Atomic broadcast: From simple message diffusion to byzantine agreement. In Proceedings 15th Int. Conf. on Fault-Tolerant Computing (FTCS-15), pages 200-206, Ann Arbor, Michigan, USA, 1985.

[310]
Brian Crow, Indra Widjaja, Jeong Geun Kim, and Prescott Sakai. Investigation of the ieee 802.11 medium access control (mac) sublayer functions. In IEEE Infocom '97 - 16th Conference on Computer Communications. IEEE, 1997.

[311]
William H. Cunningham. Optimal attack and reinforcement of a network. Journal of the ACM, 32(3), 1985.

[312]
D. Cypher and S. Wakid. Nomadic computing and cdma. In 6th IEEE Workshop on Future Trends of Distributed Computing Systems (FTDCS '97) October 29-31, 1997. IEEE, 1997.

[313]
Joan Daemen and Vincent Rijmen. AES proposal: Rijndael, September 1999.

[314]
Jiang-Whai Dai. Capture effect of randomly addressed polling protocol. Wireless Personal Communications, 10(1):119-135, 1999.

[315]
John N. Daigle, P. Giacomazzi, and R. Petorovic. Contention protocol performance in wireless personal communication systems. IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC, 3:1112-1117, 1995.

[316]
Chris I. Dalton and D. A. Clarke. Secure partitioned access to local network resources over the internet. Technical report, HP Lab Bristol, Bristol, UK, December 1998.

[317]
Zhe Dang and Richard A. Kemmerer. Using the ASTRAL model checker for cryptographic protocol analysis. In DIMACS Workshop on Design and Formal Verification of Security Protocols, page 14 pages, September 3-5, 1997.

[318]
Abdel-Ghani A. Daraiseh. Protocol enhancements in wireless multimedia and multiple-access networks. In WOWMOM '98. Proceedings of first ACM international workshop on Wireless mobile multimedia, pages 68-72. ACM, 1998.

[319]
Bevan Das and Vaduvur Bharghavan. Routing in ad-hoc networks using minimum connected dominating sets. In IEEE International Conference on Communications, 1997.

[320]
Gautam Das. The visibility graph contains a bounded-degree spanner. In Proceedings of the 9th Canadian Conference on Computational Geometry, August 1997.

[321]
G.R. Dattatreya, S.S. Kulkarni, H. Martinez, and R. Soto. Adaptive control of heterogeneous ad hoc network. In 2000 IEEE International Conference on Systems, Man and Cybernetics. `Cybernetics Evolving to Systems, Humans, Organizations, and their Complex Interactions', volume 5, May 2000.

[322]
Bruno D'Ausbourg. Implementing secure dependencies over a network by designing a distributed security SubSystem. In Dieter Gollmann, editor, 3rd European Symposium on Research in Computer Security, ESORICS'94, LNCS 875, pages 249-266, November 7-9, 1994.

[323]
R.L. Davies, M.H. Barton, and A. Munro. Performance of a high speed wireless lan using csma. Performance Engineering in Telecommunications Networks IEE Colloquium (Digest), pages 11B/1-11B/8, 1994.

[324]
R.L. Davies, M.H. Barton, and A. Munro. Performance of a high speed wireless lan using csma. Performance Engineering in Telecommunications Networks IEE Colloquium (Digest), 078:11B/1-11B/8, 1994.

[325]
N. Davies, G.S. Blair, K. Cheverst, and A. Friday. A network emulator to support the development of adaptive applications. Proceedings of the Second USENIX Symposium on Mobile and Location-Independent Computing, pages 47-55, 1995.

[326]
Nigel Davies, Joe Finney, Adrian Friday, and Andrew Scott. Supporting adaptive video applications in mobile environments. IEEE Communications Magazine, 36(6):138-143, 1998.

[327]
J. Davila, J. Lopez, and R. Peralta. Implementation of virtual private networks at the transport layer. In Information Security. Second International Workshop, ISW'99., volume 1729, pages 85-102. Springer-Verlag, Berlin, Germany, 1999.

[328]
D. Davis and R. Swick. Network security via private-key certificates. ACM Operating Systems Review, 24(4):64-67, October 1990.

[329]
D. Davis, D. Geer, and T. Y. Ts'o. Kerberos with clocks adrift: History, protocols, and implementation. USENIX Computing Systems, 9(1), 1996.

[330]
Marcelo Moraes de Azevedo and Douglas M. Blough. Fault-tolerant clock synchronization for distributed systems with high message delay variation. In IEEE Workshop on Fault-Tolerant Parallel and Distributed Systems, pages 268-277, 1994.

[331]
Marcelo Moraes de Azevedo and Douglas M. Blough. Multistep interactive convergence: An efficient approach to the fault-tolerant clock synchronization of large multicomputers. IEEE Transactions on Parallel and Distributed Systems, 9(12):1195-1212, December 1998.

[332]
M. Debbabi, M. Mejri, N. Tawbi, and I. Yahmadi. A new algorithm for the automatic verification of authentication protocols: From specifications to flaws and attack scenarios. In DIMACS Workshop on Design and Formal Verification of Security Protocols, page 19 pages, September 3-5, 1997.

[333]
Mikael Degermark, Mathias Engan, Björn Nordgren, and Stephen Pink. Low-loss tcp/ip header compression for wireless networks. Wireless Networks, 3(5):375-387, 1997.

[334]
Enrico Del Re, Romano Fantacci, and Carlo Manfucci. A preemptive polling protocol for applications in wireless lans. Telecommunication Systems, 7(4):339-353, 1997.

[335]
L. Delgrossi and D. Ferrari. The design of supranet security mechanisms. In 7th IEEE Intelligent Network Workshop Proceedings, pages 167-173. IEEE, 1998.

[336]
Dell'Amico, Merani, and Maffioli. Efficient algorithms for the assignment of OVSF codes in wideband CDMA. In Proc. IEEE International Conference on Communications (ICC'02), volume 5, pages 3055 -- 3060, New York City, USA, 2002.

[337]
Grit Denker and Jonathan Millen. CAPSL and CIL language design. Technical Report SRI-CSL-99-02, SRI International, Computer Science Lab, Menlo Park, CA, USA, February 1999.

[338]
J.S. Denker, S.M. Bellovin, H. Daniel, N.L. Mintz, T. Killian, and M.A. Plotnick. Moat: a virtual private network appliance and services platform. In 13th Systems Adminstration Conference (LISA '99)., pages 251-260. USENIX Assoc, Berkeley, CA, USA, 1999.

[339]
Ch. Dhawan. Unique applications and opportunities in wireless computing in developing countries. IEEE International Conference on Personal Wireless Communications 1997, pages 297-301, 1997.

[340]
N. Diehl and A. Held. Mobile computing-components, system aspects, applications. IT+TI Informationstechnik und Technische Informatik, 37:21-28, 1995.

[341]
T. Dierks and C. Allen. The TLS protocol, version 1.0, January 1999. RFC 2246.

[342]
W. Diffie and M. Hellman. New directions in cryptography. IEEE Transactions on Information Theory, 22(6):644-654, 1976.

[343]
Hans Dobbertin, Antoon Bosselaers, and Bart Preneel. RIPEMD-160: A strengthened version of RIPEMD. In Proceedings of Fast Software Encryption (FSE'96), LNCS 1039, pages 71-82. Springer Verlag, 1996.

[344]
Danny Dolev and H. Raymond Strong. Polynomial algorithms for multiple processor agreement. In Proceedings 14th Annual ACM Symposium on Theory of Computing (STOC'82), pages 401-407, San Francisco, May 1982.

[345]
Danny Dolev and H. Raymond Strong. Authenticated algorithms for multiple process agreement. SIAM Journal of Computing, 12(4):656-666, 1983.

[346]
Shlomi Dolev and Jennifer L. Welch. Wait-free clock synchronization. In Proceeding of the 12th Annual ACM Symposium on Principles of Distributed Computing (PODC'93), pages 97-108, 1993.

[347]
Shlomi Dolev and Jennifer L. Welch. Self-stabilizing clock synchronization in the presence of byzantine faults. In Proc. of the 2nd Workshop on Self-Stabilizing Systems, May 1995.

[348]
D. Dolev and A. C. Yao. On the security of public key protocols. In Proceedings of the 22th IEEE Symposium on Foundations of Computer Science, pages 350-357, 1981.

[349]
Danny Dolev, Michael J. Fischer, R. Fowler, N. Lynch, and H. Raymond Strong. An efficient algorithm for Byzantine agreement without authentication. Information and Control, 52:257-274, 1982.

[350]
Danny Dolev, Nancy A. Lynch, Shlomit S. Pinter, Eugene W. Stark, and H. Raymond Strong. Reaching approximate agreement in the presence of faults. Journal of the ACM, 33(3):499-516, July 1986.

[351]
Danny Dolev, Cynthia Dwork, and Larry Stockmeyer. On the minimal synchronism needed for distributed consensus. Journal of the ACM, 34(1):77-97, January 1987.

[352]
Danny Dolev, Ruediger Reischuk, and H. Raymond Strong. Early stopping in Byzantine agreement. Journal of the ACM, 37(4):720-741, October 1990.

[353]
Danny Dolev, Cynthia Dwork, Orli Waarts, and Moti Yung. Perfectly secure message transmission. Journal of the ACM, 40(1):17-47, January 1993.

[354]
Danny Dolev, Roy Friedman, Idit Keidar, and Dahlia Malkhi. Failure detectors in omission failure environments. In Proc. 16th ACM Symposium on Principles of Distributed Computing, page 286, Santa Barbara, California, 1997.

[355]
Shlomi Dolev, Elad Schiller, and Jennifer L. Welch. Random walk for self-stabilizing group communication in ad-hoc networks. Technical Report 02-04, Department of Computer Science Ben-Gurion University, Beer-Sheva, Israel, April 2002. (preliminary version).

[356]
Danny Dolev. The Byzantine generals strike again. Journal of Algorithms, 3(1):14-30, 1982.

[357]
Shlomi Dolev. Possible and impossible self-stabilizing digital clock synchronization in general graphs. Technical Report 96-06, Department of Mathematics and Computer Science Ben-Gurion University, Beer-Sheva, Israel, August 1996.

[358]
Shlomi Dolev. Possible and impossible self-stabilizing digital clock. Journal of Real-Time Systems, 12(1):95-107, 1997.

[359]
Josep Domingo-Ferrer. Distributed user identification by zero-knowledge access rights proving. Information Processing Letters, 40(5):235-239, December 1991.

[360]
William A. Doster and Jim Rees. Third-party authentication in the institutional file system. Technical Report CITI TR 92-1, University of Michigan, Ann Arbor, MI, USA, February 1992.

[361]
Assia Doudou and André Schiper. Mute failure detectors for consensus with byzantine processes. Technical Report 97/230, École Polytechnique Fédérale de Lausanne, July 1997.

[362]
Assia Doudou and André Schiper. Muteness detectors for consensus with byzantine processes. In Proceedings of the 17th ACM Symposium on Principles of Distributed Computing (PODC-17), 1998.

[363]
Assia Doudou, Benoit Garbinato, Rachid Guerraoui, and André Schiper. Muteness failure detectors: Specification and implementation. In Proceedings 3rd European Dependable Computing Conference (EDCC-3), LNCS 1667, pages 71-87, Prague, Czech Republic, September 1999. Springer.

[364]
Assia Doudou, Benoit Garbinato, and Rachid Guerraoui. Encapsulating failure detection: From crash to byzantine failures. In Reliable Software Technologies - Ada-Europe 2002, LNCS 2361, pages 24-50. Springer, June 2002.

[365]
T.T. Drashansky, S. Weerawarana, A. Joshi, R.A. Weerasinghe, and E.N. Houstis. Software architecture of ubiquitous scientific computing environments for mobile platforms. Journal of Special Topics in Mobile Networks and Applications [MONET], 1(4):421-432, 1997.

[366]
Yonggang Du, Christoph Herrmann, Klaus Peter May, Samir N. Hulyalkar, and David Evans. Wireless ATM LAN with and without infrastructure. IEEE Communications Magazine., 36(4):90-95, April 1998.

[367]
N.G. Duffield, P. Goyal, A. Greenberg, Mishra Partho, K. K. Ramakrishnan, and J. E. Van der Merwe. A flexible model for resource management in virtual private networks. Computer-Communication-Review, 29(4):95-108, October 1999.

[368]
A. Durante, R. Focardi, and R. Gorrieri. CVS: A compiler for the analysis of cryptographic protocols. In Proceedings of the 12th IEEE Computer Security Foundations Workshop, pages 203-212, June 1999.

[369]
Robert C. Durst, Gregory J. Miller, and Eric J. Travis. Tcp extensions for space communications. Wireless Networks, 3(5):389-403, 1997.

[370]
Bruno Dutertre and Steve Schneider. Using a PVS embedding of CSP to verify authentication protocols. In Proceedings of the 10th IEEE Computer Security Foundation Workshop, pages 3-17, 1997.

[371]
Partha Dutta and Rachid Guerraoui. The inherent price of indulgence. In Proceedings of the Twenty-first Annual Symposium on Principles of Distributed Computing, pages 88-97. ACM Press, 2002.

[372]
Cynthia Dwork and Moni Naor. Pricing via processing or combatting junk mail. In Proceedings of Crypto'92, 1992.

[373]
Cynthia Dwork, Nancy Lynch, and Larry Stockmeyer. Consensus in the presence of partial synchrony. Journal of the ACM, 35(2):288-323, April 1988.

[374]
Martin Dyer, Trevor Fenner, Alan Frieze, and Andrew Thomason. On key storage in secure networks. Journal Of Cryptology, 8:189-200, 1995.

[375]
Joan Dyer, Ron Perez, Sean W. Smith, and Mark Lindemann. Application support architecture for a high-performance, programmable secure coprocessor. In 22nd National Information Systems Security Conference, October 1999.

[376]
Joan G. Dyer, Mark Lindemann, Ronald Perez, Reiner Sailer, Leendert van Doorn, Sean W. Smith, and Steve Weingart. Building the IBM 4758 secure coprocessor. IEEE Computer, 34(10):57-65, October 2001.

[377]
DA. Dyson and ZJ. Haas. A dynamic packet reservation multiple access scheme for wireless atm. In MILCOM 97. MILCOM 97 Proceedings (Cat. No.97CH36134)., volume 2, pages 687-693. IEEE, 1997.

[378]
J-P. Ebert, R. Holtkamp, A. Wolisz, and L. Ramel. A distributed media access control for wireless atm environments. In Sixth WINLAB Workshop on Third Generation Wireless Information Networks., pages 263-277, 1997.

[379]
Claudia Eckert. Tool-supported verification of cryptographic protocols. In IFIP 1998, 1998.

[380]
David Eckhardt and Peter Steenkiste. Measurement and analysis of the error characteristics of an in-building wireless network. SIGCOMM'96, pages 243-254, August 1996.

[381]
David A. Eckhardt and Peter Steenkiste. Improving wireless lan performance via adaptive local error control. In Sixth International Conference on Network Protocols. IEEE, 1998.

[382]
L. Economou. Patch antenna equivalent to simple monopole. Electronics Letters, 33(9):727-729, 1997.

[383]
J.M.H. Elmirghani and R.A. Cryan. Indoor infrared wireless networks utilising ppm cdma. Conf. Title: Singapore ICCS '94. Conference Proceedings, 1:334-337, 1994.

[384]
J.M.H. Elmirghani and R.A. Cryan. Mobile diffuse infrared data communication lans utilising ppm-cdma. Conf. Title: Thirteenth Annual Conference on European Fibre Optic Communications and Networks., 3:132-135, 1996.

[385]
Erin English and Scott Hamilton. Network security under siege: The timing attack. Computer, 29(3):95-97, March 1996.

[386]
M. Epstein, P. Gilmour, and C.J. Yoon. Application of commercial wireless lan technology to forward area mobile communications. MILCOM '93. 'Communications on the Move'. Conference Record, 2:490-496, 1993.

[387]
R. Ernst and W. Ye. Embedded program timing analysis based on path clustering and architecture classification. In Digest of Technical Papers of IEEE/ACM International Conference on Computer-Aided Design, pages 598-604. IEEE Computer Society, April 1997.

[388]
Pasi Eronen. Denial of service in public key protocols. In Paper presented in Helsinki University of Technology's Seminar on Network Security course (Fall 2000), December 2000.

[389]
M. Ettus. System capacity, latency, and power consumption in multihop-routed ss-cdma wireless networks. In Radio and Wireless Conference, pages 55-58, 1998.

[390]
Matthew Ettus. System capacity, latency, and power consumption in multihop-routed SS-CDMA wireless networks. In Proc. IEEE Radio and Wireless Conference (RAWCON'98), pages 55 -- 58, Colorado Springs, CO, USA, 1998.

[391]
P. Th. Eugster, R. Guerraoui, S.B. Handurukande, A.-M. Kermarrec, and P. Kouznetsov. Lightweight probabilistic broadcast. In Proceedings of the International Conference on Dependable Systems and Networks (DSN'01), pages 443-452, Göteborg, Sweden, July 1-4, 2001.

[392]
David Falconer. A system architecture for broadband millimeter-wave access to an atm lan. IEEE Personal Communications, 3(4):36-41, August 1996.

[393]
R. Falk and M. Trommer. Integrated management of network and host based security mechanisms. In Colin Boyd and Ed Dawson, editors, 3rd Australasian Conference, ACISP'98, LNCS 1438, pages 36--??, July 13-15, 1998.

[394]
Aram Falsafi and Kaveh Pahlavan. Comparison between the performance of fhss and dsss for wireless lans using a 3d ray tracing program. Conference Title: Proceedings of the 1995 IEEE 45th Vehicular Technology Conference, 2:569-572, 1995.

[395]
Aram Falsafi, Kaveh Pahlavan, and Ganning Yang. Transmission techniques for radio lan's - a comparative performance evaluation using ray tracing. IEEE Journal on Selected Areas in Communications, 14(3):477-491, 1996.

[396]
Lin Fang and Laurence B. Milstein. Successive interference cancellation in multicarrier DS/CDMA. IEEE Transactions on Communications, 48(9):1530-1540, September 2000.

[397]
Romano Fantacci and Massimo Scardi. Performance evaluation of preemptive polling schemes and arq techniques for indoor wireless networks. IEEE Transactions on Vehicular Technology, 45(2):258-257, 1996.

[398]
Romano Fantacci. Queuing analysis of the selective repeat automatic repeat request protocol wireless packet networks. IEEE Transactions on Vehicular Technology, 45(2):258-264, May 1996.

[399]
Rik Farrow. Virtual private networks: end-to-end privacy or open-ended problems?. Computer Security Journal, 14(3):1-6, 1998.

[400]
Alan Fekete, Nancy Lynch, Yishay Mansour, and John Spinelli. The impossibility of implementing reliable communication in the face of crashes. Journal of the ACM (JACM), 40(5):1087-1107, 1993.

[401]
A. D. Fekete. Asymtotically optimal algorithms for approximate agreement. Distributed Computing, 4(1):9-29, March 1990.

[402]
A. D. Fekete. Asynchronous approximate agreement. Information and Computation, 115(1):95-124, November 15 1994.

[403]
A. Ferchichi. IPsec VPN: theory and practice. ComTec, 78(7):9-14, 2000.

[404]
Jean-Claude Fernandez, Hubert Garavel, Alain Kerbrat, Radu Mateescu, Laurent Mounier, and Mihaela Sighireanu. CADP: A protocol validation and verification toolbox. In Rajeev Alur and Thomas A. Henzinger, editors, Proceedings of the 8th Conference on Computer-Aided Verification, LNCS 1102, pages 437-440, 1996.

[405]
C. Fetzer and F. Cristian. On the possibility of consensus in asynchronous systems. In Proceedings of the 1995 Pacific Rim Int'l Symp. on Fault-Tolerant Systems, pages 86-91, Newport Beach, CA, Dec 1995.

[406]
Christof Fetzer and Flaviu Cristian. An optimal internal clock synchronization algorithm. In Proceedings of the Tenth Annual Conference on Computer Assurance (COMPASS'95), pages 187-196, 1995.

[407]
Christof Fetzer and Ulrich Schmid. Architecture and services of the W2F fieldbus. Technical Report 183/1-101, Department of Automation, Technische Universität Wien, March 2000.

[408]
Christof Fetzer, Michel Raynal, and Frederic Tronel. An adaptive failure detection protocol. In Pacific Rim International Symposium on Dependable Computing (PRDC 2001), December 2001.

[409]
Christof Fetzer. Fail-Awareness in Timed Asynchronous Systems. Dissertation, University of California, San Diego, Computer Science, 1997.

[410]
Christof Fetzer. The message classification model. In Proceedings of the Seventeenth Annual ACM Symposium on Principles of Distributed Computing, pages 153-162. ACM Press, 1998.

[411]
J.F. Fhem, D. Veithen, and J.J. Quisquater. SCALPS: Smart card applied to little payment systems. IEEE Micro, 16(3):42-51, June 1996.

[412]
Andreas Fieger and Martina Zitterbart. Transport protocols over wireless links. In 2nd IEEE Symposium on Computers and Communications (ISCC '97) July 1-3, 1997. IEEE, 1997.

[413]
Andreas Fieger, Axel Boeger, and Martina Zitterbart. Migrating state information in mobile environments. In 6th IEEE Workshop on Future Trends of Distributed Computing Systems (FTDCS '97) October 29-31, 1997. IEEE, 1997.

[414]
FIPS. Security requirements for cryptographic modules, FIPS PUB 140-2, 1999.

[415]
FIPS. Digital Signature Standard (DSS), FIPS PUB 186-2, January 27, 2000.

[416]
FIPS. Advanced Encryption Standard, FIPS PUB 197, November 2001.

[417]
FIPS. The Keyed-hash Message Authentication Code (HMAC), FIPS PUB 198, March 6, 2002.

[418]
FIPS. Secure Hash Standard, FIPS PUB 180-2, August 1, 2002.

[419]
Michael J. Fischer and Nancy A. Lynch. A lower bound for the time to assure interactive consistancy. Information Processing Letters, 14(4):198-202, May 1982.

[420]
Michael J. Fischer, Nancy A. Lynch, and M. S. Paterson. Impossibility of distributed consensus with one faulty processor. Journal of the ACM, 32(2):374-382, April 1985.

[421]
Patrick Flanagan. 10 hottest technologies in telecom: a market research perspective. Telecommunications (Americas Edition), 29(5):7pp, 1995.

[422]
R. Floyd, B. Housel, and C. Tait. Mobile web access using enetwork web express. IEEE Personal Communications, 5(5):47-52, 1998.

[423]
R. Focardi and R. Gorrieri. Automatic compositional verification of some security properties. In Tiziana Margaria and Berhard Steffen, editors, Tools and Algorithms for the Construction and Analysis of Systems, 2nd International Workshop TACAS'96, LNCS 1055, pages 167-186. Springer Verlag, March 27-29, 1996.

[424]
Jeff Foerster, Evan Green, Srinivasa Somayazulu, and David Leeper. Ultra-wideband technology for short- or medium-range wireless communication. Intel Technology Journal, Q2:(11 pages), 2001.

[425]
Warwick Ford. Standardizing information technology security. StandardView, 2(2):64-71, 1994.

[426]
G.J. Foschini. On limits of wireless communications in a fading environment when using multiple antennas. Wireless Personal Communications, 6:311-335, 1998.

[427]
Armando Fox and Steven D. Gribble. Security on the move: Indirect authentication using Kerberos. In Proceedings of the 2nd Annual International Conference on Mobile Computing and Networking, pages 155-164, November 1996.

[428]
L. Franchina. A wireless cdma local area network: Rf modellization and design. In IWMC '96, International Workshop on Mobile Communications, pages 253-257, 1997.

[429]
Yair Frankel, Amir Herzberg, Paul A. Karger, Hugo Krawczyk, Charles A. Kunzinger, and Moti Yung. Security issues in a CDPD wireless network. IEEE Personal Communications, pages 16-27, August 1995.

[430]
Yair Frankel, Amir Herzberg, Paul A. Karger, Hugo K. Krawczyk, Charles A. Kunzinger, and Moti Yung. Security issues in a cdpd wireless network. IEEE Personal Communications, 2(4):16-27, 1995.

[431]
I. Frigyes. Application of optical methods in wireless communications. 1993 SBMO International Microwave Conference/Brazil Proceedings, 2:691-696, 1994.

[432]
K. Fu, Y. J. Guo, and S. K. Barton. Performance of the ey-npma protocol. Wireless Personal Communications, 4(1):41-50, 1997.

[433]
Chane L. Fullmer and J.J. Garcia-Luna-Aceves. Fama-pj: a channel access protocol for wireless lans. Proceedings of the Annual International Conference on Mobile Computing and Networking, MOBICOM, pages 76-85, 1995.

[434]
Walter Fumy. (local area) network security. In Bart Preneel, René Govaerts, and Joos Vandewalle, editors, Computer Security and Industrial Cryptography, ESAT Course'91, LNCS 741, pages 211-226, May 21-23, 1991.

[435]
Klaus Gaarder and Einar Snekkenes. Applying a formal analysis technique to the CCITT X.509 strong two-way authentication protocol. Journal Of Cryptology, 3:81-98, 1991.

[436]
Eli Gafni and Yehuda Afek. End-to-end communication in unreliable networks. In Proceedings of the Seventh Annual ACM Symposium on Principles of Distributed Computing, pages 131-148. ACM Press, 1988.

[437]
Eli Gafni. Round-by-round fault detectors (extended abstract): unifying synchrony and asynchrony. In Proceedings of the Seventeenth Annual ACM Symposium on Principles of Distributed Computing, pages 143-152. ACM Press, 1998.

[438]
J. Galvin and K. McCloghrie. RFC 1446: Security protocols for version 2 of the Simple Network Management Protocol (SNMPv2), April 1993. Status: HISTORIC.

[439]
Taher El Gamal. A public key cryptosystem and a signature scheme based on discrete logarithms. In Advances in Cryptology: Proceedings of CRYPTO 1984, LNCS 0196, pages 10-18, 1985.

[440]
Wu Gang and Y. Hase. An integrated multimedia transmission protocol for high-speed wireless lan. Journal of the Communications Research Laboratory, 44(3):361-371, 1997.

[441]
Wu. Gang, T. Okazaki, and Y. Hase. Performance analysis of a hybrid wireless lan using r-isma. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E80-A(7):1272-1280, 1997.

[442]
Aura Ganz, Se Hyun Park, and Zvi Ganz. Robust re-authentication and key exchange protocol for ieee 802.11 wireless lans. In Proceedings - IEEE Military Communications Conference MILCOM, volume 3, pages 1018-1022. IEEE, 1998.

[443]
Aura Ganz, Anan Phonphoem, and Zvi Ganz. Robust superpoll protocol for ieee 802.11 wireless lans. In Proceedings - IEEE Military Communications Conference MILCOM, volume 2, pages 570-574. IEEE, 1998.

[444]
Jie Gao, Leonidas J. Guibas, John Hershberger, Li Zhang, and An Zhu. Geometric spanner for routing in mobile networks. Proceedings of the second ACM International Symposium on Mobile Ad Hoc Networking and Computing, pages 45-55, October 2001.

[445]
Hubert Garavel. An overview of the Eucalyptus toolbox. In Proceedings of COST247 International Workshop on Applied Formal Methods in System Design, pages 76-88, June 1996.

[446]
Juan A. Garay and Yoram Moses. Fully polynomial byzantine agreement in t+1 rounds. In Proceedings of the 25th Annual ACM Symposium on Theory of Computing, pages 31-41, May 1993.

[447]
Juan A. Garay and Yoram Moses. Fully polynomial Byzantine agreement for n > 3t processors in t+1 rounds. SIAM Journal of Computing, 27(1):247-290, February 1998.

[448]
Lee Garber. Denial-of-service attacks rip the Internet. IEEE Computer, 33(4):12-17, April 2000.

[449]
Benoit Garbinato and Rachid Guerraoui. Flexible protocol composition in Bast. In Proceedings of the 18th International Conference on Distributed Computing Systems (ICDCS-18), pages 22-29, Amsterdam, The Netherlands, 1998. IEEE Computer Society Press.

[450]
Rodrigo Garces and J.J. Garcia-Luna-Aceves. Collision avoidance and resolution multiple access with transmission groups. In IEEE Infocom '97 - 16th Conference on Computer Communications. IEEE, 1997.

[451]
Rodrigo Garcés and J.J. Garcia-Luna-Aceves. Collision avoidance and resolution multiple access with transmission queues. Wireless Networks, 5(2):95-109, 1999.

[452]
J.J. Garcia-Luna-Aceves and Yuxia Zhang. Reliable broadcasting in dynamic network. IEEE International Conference on Communications, 3:1630-1634, 1996.

[453]
Vijay K. Garg and J. Roger Mitchell. Implementable failure detectors in asynchronous systems. In Proceedings of the 18th Int. Conference on Foundations of Software Technology and Theoretical Computer Science (FST & TCS'98), LNCS 1530, pages 158-169. Springer, 1998.

[454]
Stephen J. Garland and Nancy A. Lynch. Using I/O Automata for Developing Distributed Systems, pages 227-303. Cambridge University Press, 1999.

[455]
J.H. Gass, M.B. Pursley, H.B. Russell, R.J. Saulitis, and C.S. Wilkins. Adaptive transmission protocols for frequency-hop radio networks. In Proceedings - IEEE Military Communications Conference MILCOM, volume 1, pages 282-285. IEEE, 1998.

[456]
Morrie Gasser. Access control and authentication in LANs. In Thomas A. Berson and Thomas Beth, editors, Proceedings of the Workshop on Local Area Network Security (LANSEC'89), LNCS 396, pages 19-30, Berlin, April 1989. Springer.

[457]
F. Gatti, S. Cacopardi, and G. Reali. Channel estimation using linear prediction for wireless indoor communications. CSELT Technical Reports, 24(1):29-39, 1996.

[458]
Robert L. Geiger, James D. Solomon, and Kenneth J. Crisler. Wireless network extension using mobile IP. IEEE Micro, 17(6):63-68, November/December 1997.

[459]
Laurent George, Christophe Lizzi, and Jacky Montiel. External/internal clock synchronization in ATM-based distributed systems. In Proceedings of the 23rd EUROMICRO Conference, pages 359-368, 1997.

[460]
DP. Gerakoulas, WC. Chan, and E. Geraniotis. A time reuse capture access (trca) protocol for wireless atm applications. In ICT '98. International Conference on Telecommunications, volume 3, pages 270-274, 1998.

[461]
DP. Gerakoulis, Wai Chung Chan, and E. Geraniotis. A time reuse capture access (trca) protocol for wireless personal communications. In ICC '98. 1998 IEEE International Conference on Communications. Conference Record. Affiliated with SUPERCOMM'98 (Cat. No.98CH36220)., volume 3, pages 1627-1632. IEEE, 1998.

[462]
Edgardo Gerck. Overview of certification systems: X.509, CA, PGP and SKIP, July 2000. A previous version has been published at the '99 Black Hat Conference in Las Vegas, NV, USA.

[463]
F. Germeau and G. Leduc. A computer aided design of a secure registration protocol. In Proceedings of Formal Description Techniques (X) / Protocol Specification, Testing and Verification (XVII), FORTE/PSTV'97, Osaka, Japan, November 1997.

[464]
F. Germeau and G. Leduc. Model-based design and verification of security protocols using LOTOS. In Proceedings of the DIMACS Workshop on Design and Formal Verification of Security Protocols, Rutgers University, September 1997.

[465]
Thomer Michael Gil. MULTOPS: A data structure for denial-of-service attack detection. Master's thesis, Division of Mathematics and Computer Science, Vrije Universiteit, Netherlands, December 2000.

[466]
C. Gray Girling. Covert channels in LANs. IEEE Transactions on Software Engineering, 13(2):292-296, February 1987.

[467]
Frédéric Gittler and Anne C. Hopkins. The DCE security service. Hewlett-Packard Journal: technical information from the laboratories of Hewlett-Packard Company, 46(6):41-48, December 1995.

[468]
Jack P. F. Glas. An embedded CDMA-receiver: A design example. Integration, the VLSI Journal, 23(1), 1997.

[469]
Jaeseung Go and Kwangjo Kim. Wireless authentication protocols preserving user anonymity. In Symposium on Cryptography and Information Security (SCIS'01), pages 159-164, January 23-26, 2001.

[470]
Alois M.J. Goiser. Handbuch der Spread-Spectrum Technik. Springer, Wien -- New York, 1998.

[471]
David Goldschlag, Michael Reed, and Paul Syverson. Onion Routing for anonymous and private Internet connections. Communications of the ACM, 42(2):39-41, February 1999.

[472]
David M. Goldschlag. Several secure store and forward devices. In Proceedings of the 3rd ACM Conference on Computer and Communications Security, CCS'96, pages 129-137, March 14-15, 1996.

[473]
Li Gong and Nachum Shacham. Multicast security and its extension to a mobile environment. Wireless Networks, 1(3):281-295, 1995.

[474]
Li Gong, Roger Needham, and R. Yahalom. Reasoning about belief in cryptographic protocols. In Proceedings of the IEEE Symposium on Research in Security and Privacy, pages 234-248, May 1990.

[475]
Li Gong, Patrick Lincoln, and John Rushby. Byzantine agreement with authentication: Observations and applications in tolerating hybrid and link faults. In Proceedings Dependable Computing for Critical Applications-5, pages 139-157, Champaign, IL, September 1995.

[476]
Li Gong. Using one-way functions for authentication. ACM Computer Communication Review, 19(5):8-11, October 1989.

[477]
Li Gong. A security risk of depending on synchronized clocks. ACM Operating Systems Review, 26(1):49-54, January 1992.

[478]
Li Gong. New protocols for third-party-based authentication and secure broadcast. In Proceedings of the 2nd ACM Conference on Computer and Communications Security, pages 176-183, Fairfax, VA, USA, November 2-4, 1994.

[479]
Li Gong. Efficient network authentication protocols: Lower bounds and optimal implementations. Distributed Computing, 9(3):131-145, 1995.

[480]
David J. Goodman and Dipankar Raychaudhuri, editors. Mobile Multimedia Communications -- Procedings of the Third International Workshop. Kluwer Academic/Plenum Publishers, September 25-27 1996.

[481]
Goodman, Dancy, and Chandrakasan. An energy/security scalable encryption processor using an embedded variable voltage DC/DC converter. IEEE Journal of Solid-State Circuits, 33(11):1799-1809, November 1998.

[482]
M.G. Gouda and Sanjoy Paul. Wireless link protocol: design by refinement. International Conference on Network Protocols, pages 192-200, 1995.

[483]
Charles Graff, Michael Bereschinsky, Mitesh Patel, and Li Fung Chang. Application of mobile ip to tactical mobile internetworking. In Proceedings - IEEE Military Communications Conference MILCOM, volume 2, pages 409-414. IEEE, 1998.

[484]
Vincenzo Grassi and Francesco Lo Presti. Markov analysis of the prma protocol for local wireless networks. Wireless Networks, 4(4):297-306, 1998.

[485]
James W. Gray and John D. McLean. Using temporal logic to specify and verify cryptographic protocols. In Proceedings of the 8th IEEE Computer Security Foundation Workshop, pages 108-116, 1995.

[486]
Jim N. Gray. Notes on data base operating systems. In G. Seegmüller R. Bayer, R.M. Graham, editor, Operating Systems: An Advanced Course, volume 60 of Lecture Notes in Computer Science, chapter 3.F, page 465. Springer, New York, 1978.

[487]
Günther Gridling, Martin Hutle, Ulrich Schmid, Hannes Stratil, Bernd Thallner, and Bettina Weiss. Service specification of W2F. Technical Report 183/1-XXX, Department of Automation, Technische Universität Wien, 2002. (in progress).

[488]
Günther Gridling. Initial clock synchronization with fault detection. Technical Report 183/1-115, Department of Automation, Technische Universität Wien, July 2001.

[489]
Günther Gridling. An algorithm for three-process consensus under restricted link failures. Technical Report 183/1-123, Department of Automation, Technische Universität Wien, October 2002.

[490]
Günther Gridling. On the problem of internal interference in CDMA-based ad-hoc networks. Technical Report 183/1-121, Department of Automation, Technische Universität Wien, June 2002.

[491]
Stefanos Gritzalis and Diomidis Spinellis. Cryptographic protocols over open distributed systems: A taxonomy of flaws and related protocol analysis tools. In Peter Daniel, editor, 16th International Conference on Computer Safety, Reliability and Security (SAFECOMP'97), pages 123-137, York, UK, September 1997. European Workshop on Industrial Computer Systems: TC-7, Springer Verlag.

[492]
S. Gritzalis, D. Spinellis, and P. Georgiadis. Security protocols over open networks and distributed systems: Formal methods for their analysis, design and verification. Computer Communications, 22(8):697-709, May 1999.

[493]
R. Guerraoui and A. Schiper. The decentralized non-blocking atomic commitment protocol. In Proceedings of the 7th IEEE Symposium on Parallel and Distributed Processing (SPDP-7), pages 2-9, San Antonio, Texas, USA, 1995.

[494]
R. Guerraoui and A. Schiper. Consensus service: A modular approach for building agreement protocols in distributed systems. In Proceedings of the 26th IEEE Symposium on Fault Tolerant Computing Systems (FTCS-26), pages 168-177, 1996.

[495]
R. Guerraoui, R. Oliveira, and A. Schiper. Stubborn communication channels. Technical Report 98-278, Dèpartment d'Informatique, Ècole Polytechnique Fédérale de Lausanne, 1998.

[496]
R. Guerraoui, M. Hurfin, A. Mostefaoui, R. Oliveira, M. Raynal, and A. Schiper. Consensus in asynchronous distributed systems: A concise guided tour. In S. Shrivastava S. Krakowiak, editor, Advances in Distributed Systems, number 1752 in LNCS, pages 33-47. Spinger, 2000.

[497]
Rachid Guerraoui. Indulgent algorithms (preliminary version). In Proceedings of the Nineteenth Annual ACM Symposium on Principles of Distributed Computing, pages 289-297. ACM Press, 2000.

[498]
Carl A. Gunter and Trevor Jim. Generalized certificate revocation. In ACM Symposium on Principles of Programming Languages, page (14 pages), January 2000.

[499]
M. Günter, T. Braun, and I. Khalil. An architecture for managing QoS-enabled VPNs over the Internet. In Proceedings 24th Conference on Local Computer Networks. LCN'99, pages 122-131. IEEE Comput. Soc, Los Alamitos, CA, USA, October 1999.

[500]
Ning Guo and Salvatore D. Morgera. Grade of service for integrated voice/data wireless DS-CDMA networks. Conference Record - International Conference on Communications, 2:1104-1110, 1994.

[501]
Y.J. Guo, A. Paez, R. A. Sadeghzadeh, and S. K. Barton. A circular patch antenna for radio LAN's. IEEE Transactions on Antennas and Propagation, 45(1):177-178, January 1997.

[502]
Vipul Gupta and Gabriel Montenegro. Secure and mobile networking. Mobile Networks and Applications, 3(4):381-390, 1998.

[503]
Vipul Gupta and Gabriel Montenegro. Secure and mobile networking. Mobile Networks and Applications, 3(4):381-390, January 1999.

[504]
Indranil Gupta, Tushar D. Chandra, and Germán S. Goldszmidt. On scalable and efficient distributed failure detectors. In Proceedings of the 20th ACM Symposium on Principles of Distributed Computing (PODC'01), pages 170-179, August 2001.

[505]
Indranil Gupta. Minimal CDMA recoding strategies in power-controlled ad-hoc wireless networks. Technical report, Cornell Computer Science Technical Report Collection, TR2001-1834, 2001.

[506]
S. Gurley. Wireless data: the path to progress. Telecommunications [International Edition], 30:79-80, 1996.

[507]
S. Guthery. Wireless relay networks. IEEE Network, 11(6):46-51, 1997.

[508]
J.C. Palencia Gutiérrez, J.J. Gutiérrez Garcia, and M. Gonzáles Harbour. Best-case analysis for improving the worst-case schedulability test for distributed hard real-time systems. In Proceedings of the 10th Euromicro Workshop on Real-Time Systems, pages 35-44, June 1998.

[509]
László Györfi and István Vajda. Analysis of protocol sequences for slow frequency hopping. Wireless Networks, 4(5):411-418, 1998.

[510]
Zygmunt J. Haas, Mario Gerla, David B. Johnson, Charles E. Perkins, Michael B. Pursley, Martha Steenstrup, C.-K. Toh, and J. F. Hayes. Guest editorial wireless ad hoc networks. IEEE Journal on Selected Areas in Communications, 17(8):1329-1332, 1999.

[511]
Zygmunt J. Haas. Location-independent access in mobile systems. IEEE International Conference on Communications, 1:255-259, 1996.

[512]
George Hadjiyiannis, Anantha Chandrakasan, and Srinivas Devadas. A low power, low bandwidth protocol for remote wireless terminals. Wireless Networks, 4(1):3-15, 1998.

[513]
Vassos Hadzilacos and Sam Toueg. Fault-tolerant broadcasts and related problems. In Sape Mullender, editor, Distributed Systems, chapter 5, pages 97-145. Addison-Wesley, 2nd edition, 1993.

[514]
Vassos Hadzilacos. Connectivity requirements for Byzantine agreement under restricted types of failures. Distributed Computing, 2:95-103, 1987.

[515]
Lee Haeryong, Hwang Jeongyeon, Kang Byungryong, and Jun Kyoungpyo. End-to-end QoS architecture for VPNs: MPLS VPN deployment in a backbone network. In Proceedings 2000. International Workshop on Parallel Processing., pages 479-483. IEEE Comput. Soc, Los Alamitos, CA, USA, 2000.

[516]
Shai Halevi and Hugo Krawczyk. Public-key cryptography and password protocols. In Proceedings of the 5th ACM Conference on Computer and Communications Security, pages 122-131, San Francisco, CA, USA, November 2-5, 1998.

[517]
J. Daniel Halpern, Sam Owre, Norman Proctor, and William F. Wilson. Muse -- a computer assisted verification system. IEEE Transactions on Software Engineering, 13(2):151-156, February 1987.

[518]
Goichiro Hanaoka, Yuliang Zheng, and Hideki Imai. LITESET: A light-weight secure electronic transaction protocol. In Colin Boyd and Ed Dawson, editors, 3rd Australasian Conference, ACISP'98, LNCS 1438, pages ??--??, July 13-15, 1998.

[519]
B. Hancock. Virtual private networks: what, why, when, where and how. Network-Security, pages 8-11, August 1997.

[520]
Marko Hannikainen, Jarno Knuutila, Ari Letonsaari, Timo Hamalainen, Jari Jokela, Juha Ala-Laurila, and Jukka Saarinen. Tutmac: a medium access control protocol for a new multimedia wireless local area network. In IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC, volume 2, pages 592-596. IEEE, 1998.

[521]
Jimmi Grönkvistand Anders Hansson and Jan Nilsson. A comparison of access methods for multi-hop ad hoc radio networks. In Proc. IEEE 51st Vehicular Technology Conference (VTC'00), volume 2, pages 1435 -- 1439, Tokyo, Japan, 2000.

[522]
Shinsuke Hara and Ramjee Prasad. Overview of multicarrier CDMA. IEEE Communications Magazine, 35(12):126-133, December 1997.

[523]
D.J. Harasty, Li Fung Chang, and A.R. Noerpel. Architecture alternatives for wireless data services. 1994 Third Annual International Conference on Universal Personal Communications. Record, pages 310-314, 1994.

[524]
Zsolt Haraszti, Keith J. Townsend, and James A. Freebersyser. Efficient simulation of tcp/ip for mobile wireless communications using importance sampling. In Proceedings - IEEE Military Communications Conference MILCOM, volume 3, pages 867-871. IEEE, 1998.

[525]
Dan Harkins and Dave Carrel. The Internet Key Exchange (IKE), May 1999. INTERNET DRAFT (http://www.ietf.org/internet-drafts/draft-ietf-ipsec-ike-01.txt).

[526]
Francoise Harmsze and Ramjee Prasad. Hybrid isma/cdma and cdma/isma protocols for iwcc. Annual International Conference on Universal Personal Communications- Record, pages 733-737, 1996.

[527]
H.M. Hauser. Personal communicators: a better way to stay in touch. IFIP Transactions A: Computer Science and Technology, 42:57-61, 1994.

[528]
Martin P. Hayes, Sean McGrath, and Cyril J. Burkley. Spread spectrum wireless LAN based on interference cancellation techniques. IEEE Vehicular Technology Conference, 2:775-779, 1994.

[529]
M.P. Hayes, S. McGrath, and C.J. Burkley. A spread spectrum wireless lan based on interference cancellation techniques. In Konferenz-Einzelbericht: VTC 1994, 1994 IEEE 44th Vehicular Technol. Conf., volume 2, pages 775-779, 1994.

[530]
Jingmin He and Ed Dawson. Shared secret reconstruction. Designs, Codes and Cryptography, 14(3):221-237, September 1998.

[531]
Junfeng He, Ming T. Liu, Yibin Yang, and Mervin E. Muller. A medium access control protocol for multimedia multi-code cdma personal communication networks. In IEEE Conference on Protocols for Multimedia Systems - Multimedia Networking (PROMSMmNet'97) November 24-26, 1997. IEEE, 1997.

[532]
J. He, M. Liu, and M. Muller. Performance of voice/data integration for two mac protocols in ds-cdma wireless networks. In Sixth International Conference on Network Protocols. IEEE, 1998.

[533]
Junfeng He, Ming T. Liu, Yibin Yang, and Mervin E. Muller. A mac protocol supporting wireless video transmission over multi-code cdma personal communication networks. Computer Communications, 21(14):1256-1268, 1998.

[534]
Nevin Heintze and J. Doug Tygar. Timed models for protocol security. Technical Report CMU-CS-92-100, Carnegie Mellon University, January 1992.

[535]
Nevin Heintze and J. Tygar. A model for secure protocols and their compositions. IEEE Transactions on Software Engineering, 22(1):16-30, January 1996.

[536]
Jeong Seok Heo, Seong Ryong Yang, and Jung Tae Lee. Performance evaluation of mini slotted spread spectrum aloha system for wireless data network. National Conference Publication - Institution of Engineers, Australia, 1(94):519-524, 1994.

[537]
J.-F. Hermant and Gerard Le Lann. Fast asynchronous uniform consensus in real-time distributed systems. IEEE Transactions on Computers, 51(8):931-944, August 2002.

[538]
E. Herscovitz. Secure virtual private networks: the future of data communications. International Journal of Network Management, 9(4):213-220, July 1999.

[539]
Stefan G. Hild and Peter Robinson. Mobilizing applications. IEEE Personal Communications, 4(5):26-34, October 1997.

[540]
Henrik Hogberg. Wide-area wireless data. currently available systems and applications. Telecommunications (Americas Edition), 27(12):3p, 1993.

[541]
Jack M. Holtzman and Michele Zorzi. Advances in Wireless Communications. Kluwer Academic Publishers, Boston, 1998.

[542]
Witold Holubowicz. 1990's - the decade of pan-european digital standards in wireless communications. IEEE International Conference on Personal Wireless Communications 1996, pages 91-95, 1996.

[543]
Shinkuro Honda, Hironari Tomioka, Takaaki Kimurai, Takaharu Oosawa, Ken ichi Okada, and Yukata Matsushita. Valentine: An environment for home office worker providing informal communication and personal space. unbekannt, pages 368-375, 1997.

[544]
Günther Horn and Bart Preneel. Authentication and payment in future mobile systems. In European Symposium on Research in Computer Security (ESORICS'98), LNCS 1485, pages 277-293, 1998.

[545]
R. Housley, W. Polk, W. Ford, and D. Solo. RFC 3280: Internet X.509 public key infrastructure certificate and certificate revocation list (CRL) profile, April 2002. http://www.ietf.org/rfc/rfc3280.txt.

[546]
Russell Housley. Encapsulation security protocol design for local area networks. In Thomas A. Berson and Thomas Beth, editors, Proceedings of the Workshop on Local Area Network Security (LANSEC'89), LNCS 396, pages 103-112, Berlin, April 1989. Springer.

[547]
Mohammad M. K. Howlader and Brian D. Woerner. Direct-sequence spread-spectrum with multiuser detection for peer to peer packet radio. In Proc. Military Communications Conference (MILCOM'98), volume 3, pages 762 -- 766, Boston, MA, USA, 1998.

[548]
Mohammad M. K. Howlader and Brian D. Woerner. Iterative interference cancellation and decoding for DS-CDMA systems. In Proc. Vehicular Technology Conference (VTC'99), volume 3, pages 1815-1819, Amsterdam, Netherlands, 1999.

[549]
Mohammad M. K. Howlader and Brian D. Woerner. Single-user adaptive and multiuser receivers for ds-cdma in peer-to-peer packet radio networks. In Proc. Military Communications Conference (MILCOM'99), volume 2, pages 1041 -- 1045, Atlantic City, NJ, USA, 1999.

[550]
Mohammad M. K. Howlader and Brian D. Woerner. System architecture for implementing multiuser detector within an ad-hoc network. In Proc. Military Communications Conference (MILCOM'01). Communications for Network-Centric Operations: Creating the Information Force, volume 2, pages 1119 -- 1123, 2001.

[551]
Pierre A. Humblet, Serge Hethuin, and Louis Ramel. Multiaccess protocol for high-speed wlan. IEEE Vehicular Technology Conference, 1:257-261, 1996.

[552]
M. Hurfin and M. Raynal. Asynchronous protocols to meet real-time constraints: Is it really feasible? How to proceed? In Proceedings of the IEEE Intl. Symposium on Object-Oriented Real-Time Distributed Computing (ISORC), pages 290-297. IEEE Computer Society, April 2003.

[553]
Linh Anh Le Huy, H. van Roosmalen, J. Nijhof, and R. Prasad. Unslotted hybrid cdma/isma protocol for indoor wireless computer communications. Conf. Title: Proceedings IEEE Third Symposium on Communications and Vehicular Technology in the Benelux, pages 68-75, 1995.

[554]
Tzonelih Hwang and Yung-Hsiang Chen. On the security of SPLICE slash AS -- the authentication system in WIDE Internet. Information Processing Letters, 53(2):97-101, January 1995.

[555]
Shu-Yuen Hwang and Tsan-Pin Wang. Two auction-based protocols for fair and fast resource assignment in wireless pcs. Wireless Personal Communications, 10(2):175-187, 1999.

[556]
Tzonelih Hwang, Narn-Yih Lee, Chuan-Ming Li, Ming-Yung Ko, and Yung-Hsiang Chen. Two attacks on Neuman-Stubblebine authentication protocols. Information Processing Letters, 53(2):103-107, January 1995.

[557]
Chih-Lin I and Gregory P. Pollini. Tree-search resource auction multiple access (trama) protocol for wireless personal communications. IEEE Vehicular Technology Conference, 2:1170-1174, 1994.

[558]
IEEE. 3rd IEEE Symposium on Computers and Communications (ISCC '98), 1998.

[559]
802.11-1997. IEEE Standard, 1997.

[560]
IEEE. A novel beam combination method for indoor high-speed wireless communication systems. In 1997 IEEE 47th Vehicular Technology Conference. Technology in Motion, volume 3, pages 1758-1762, 1997.

[561]
IEEE. A planar sector antenna for indoor high-speed wireless communication terminals. In IEEE Antennas and Propagation Society International Symposium 1997, volume 2, pages 1352-1355, 1997.

[562]
Approved draft 802.11-1999 (revisions to ieee std 802.11-1997). IEEE Standard, 1999.

[563]
A. Iera, S. Marano, and A. Molinaro. Protocol architecture for wireless atm networks supporting multimedia teleservice. Annual International Conference on Universal Personal Communications- Record, 2:482-486, 1996.

[564]
Antonio Iera, Salvatore Marano, and Antonella Molinaro. On the evolution of mobile network protocols towards the support of multimedia teleservices. IEEE International Conference on Communications, 3:1241-1246, 1996.

[565]
Antonio Iera, Salvatore Marano, and Antonella Molinaro. A layered protocol architecture for multimedia wireless-pcs networks. Mobile Networks and Applications, 3(1):73-87, 1998.

[566]
Tomasz Imielinski and B.R. Badrinath. Mobile wireless computing: Wireless computing challenges in data management. Communications of the ACM, 37(10):18-28, October 1994.

[567]
Tomasz Imielinski. Mobile computing: dataman project perspective. Mobile Networks and Applications, 1(4):359-369, 1997.

[568]
Jon Inouye, Shanwei Cen, Calton Pu, and Jonathan Walpole. System support for mobile multimedia applications. Proceedings of the IEEE International Workshop on Network and Operating System Support for Digital Audio and Video 1997, pages 135-146, 1997.

[569]
Masahiro Ishigaki, Yutaka Takahashi, and Toshiharu Hasegawa. Performance analysis of csma/cd-ps systems. Telecommunication Systems, 10(3,4):291-320, 1998.

[570]
H. Ishikawa, H. Shinonaga, and H. Kobayashi. Carrier frequency offset-spread spectrum (cfo-ss) method for wireless lan system using 2.4 ghz ism band. IEICE Transactions on Fundamentals of Electronics, E80-A(12):2366-2371, 1997.

[571]
ISO/IEC. ITU-T Recommendation X.509, ISO/IEC 9594-8: Information technology -- open systems interconnection -- the directory: Public key and attribute certificate frameworks, May 2001. http://www-t.zhwin.ch/it/ksy/Block08/ITU/X509_4thEditionDraftV8.pdf.

[572]
Naomaru Itoi and Peter Honeyman. Pluggable authentication module for Windows NT. Technical Report CITI TR 98-1, University of Michigan, Ann Arbor, MI, USA, August 1998.

[573]
Wen-Ai Jackson, Keith M. Martin, and Christine M. O'Keefe. Mutually trusted authority-free secret sharing schemes. Journal Of Cryptology, 10:261-289, 1997.

[574]
Philippe Jacquet, Pascale Minet, Paul Mühlethaler, and Nicolas Rivierre. Data transfer for hiperlan. Wireless Personal Communications, 4(1):65-80, 1997.

[575]
B. Jafarian, TH. Le, and AH. Aghvami. Design and performance evaluation of a new medium access control protocol for wireless atm networks. In 1997 IEEE 6th International Conference on Universal Person Communications Record. Bridging the Way to the 21st Century, ICUPC '97. Conference Record (Cat. No.97TH8255)., volume 2, pages 434-437. IEEE, 1997.

[576]
R. Jain and Li Fung Chang. Towards an asymmetric air interface protocol for wireless internet access. In Waves of the Year 2000+ PIMRC '97. The 8th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications. Technical Program, Proceedings (Cat. No.97TH8271)., volume 2, pages 688-692. IEEE, 1997.

[577]
Shrirang Jangi and Lazaros F. Merakos. Performance analysis of reservation random access protocols for wireless access networks. IEEE Transactions on Communications, 42(2):1223-1234, February 1994.

[578]
Philippe A. Janson, Gene Tsudik, and Moti Yung. Scalability and flexibility in authentication services: The KryptoKnight approach. In Proceedings of IEEE INFOCOM'97, pages 725-736, April 1997.

[579]
G.J.M. Janssen and R. Prasad. Propagation measurements in an indoor radio environment at 2.4 GHz, 4.75 GHz and 11.5 GHz. In Proc. of the 42nd IEEE VTS Conf., pages 617-620, May 1992.

[580]
Sanjoy Sen. Jastinder Jawanda, Kalyan Basu, Naveen K. Kakani, and Sajal K. Das. Tcp source activity and its impact on call admission control in cdma voice/data network. In MOBICOM '98. The fourth annual ACM/IEEE international conference on Mobile computing and networking, pages 276-283. ACM/IEEE, 1998.

[581]
S.S. Jeng, G. Xu, H.P. Lin, and W.J. Vogel. Experimental study of antenna arrays in indoor wireless applications. In Conf. Title: Conference Record of The Twenty-Ninth Asilomar Conference on Signals, Systems and Computers, volume 2, pages 766-770, 1995.

[582]
Dong Geun Jeong and Wha Sook Jeon. Performance of an exponential backoff scheme for slotted-aloha protocol in local wireless environment. IEEE Transactions on Vehicular Technology, 44(3):470-479, August 1995.

[583]
Dong Geun Jeong, Chong-Ho Choi, and Wha Sook Jeon. Design and performance evaluation of a new medium access control protocol for local wireless data communications. IEEE/ACM Transactions on Networking, 3(6):742-752, December 1995.

[584]
Robert Jerdonek, Peter Honeyman, Kevin W. Coffman, Jim Rees, and Kip Wheeler. Implementation of a provably secure, Smartcard-based key distribution protocol. Technical Report CITI TR 98-4, University of Michigan, Ann Arbor, MI, USA, April 1998.

[585]
Songchar Jiang and Wan de Weng. An evaluation model for integrated services on wireless broadband cdma networks. Wireless Personal Communications, 10(1):137-153, 1999.

[586]
Jianping Jiang and Ten-Hwang Lai. Efficient media access control protocol for delay sensitive bursty data in broadband wireless networks. In IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC, volume 3, pages 1355-1359. IEEE, 1998.

[587]
S.j. Jiang, Wande Weng, and Lin Longsong. A handshake protocol for cdma wireless lans with error control capabilities. Conf. Title: APCCAS `94. 1994 IEEE Asia-Pacific Conference on Circuits and Systems, pages 39-44, 1994.

[588]
Songchar J. Jiang, Wande Weng, and Longsong Lin. Handshake protocol for cdma wireless lans with error control capabilities. IEEE Asia-Pacific Conference on Circuits and Systems - Proceedings, pages 39-44, 1994.

[589]
S.J. Jiang, Y. Huang, W. Weng, L. Lin, C. Chen, and W. Huang. An integrated packet video/voice/data protocol for cdma wireless lans. Konferenz-Einzelbericht: Visual Communications and Image Processing 95, 2501(3):1396-1407, 1995.

[590]
Songchar J. Jiang, Y. Huang, W. Weng, L. Lin, C. Chen, and W. Huang. Integrated packet video/voice/data protocol for cdma wireless lans. Proceedings of SPIE - The International Society for Optical Engineering, 2501(3):1396-1407, 1995.

[591]
S.J. Jiang. A novel error control scheme for cdma wireless lans. In Conf. Title: Proceedings of 1994 IEEE Region 10's Ninth Annual International Conference. Theme: Frontiers of Computer Technology, volume 2, pages 581-586, 1994.

[592]
Songchar J. Jiang. Novel error control scheme for cdma wireless lans. Frontiers of Computer Technology IEEE Region 10's Annual International Conference, Proceedings, 2:581-586, 1995.

[593]
S. Jiang. Improvement of integrated services on cdma wireless lans using the handshake- aloha protocol. Electronics Letters, 32(1):12-14, 1996.

[594]
S. Jiang. Improvement of integrated services on cdma wireless lans using the handshake-aloha protocol. Electronics Letters, 32(1):12-14, 1996.

[595]
Songchar Jiang. Performance improvement of integrated services on cdma wireless lans using a novel protocol. IEEE International Conference on Communications, 1:250-254, 1996.

[596]
Dennis A. Jiraud. Codes improve multiple-access communications. Microwaves and RF, 32(12):6pp, 1994.

[597]
Per Johansson, Tony Larsson, Nicklas Hedman, Bartosz Mielczarek, and Mikael Degermark. Scenario-based Performance Analysis of Routing Protocols for Mobile Ad-hoc Networks. In Proceedings of the fifth annual ACM/IEEE international conference on Mobile computing and networking, August 15-19, 1999.

[598]
N. Johansson, U. Korner, and P. Johansson. Performance evaluation of scheduling algorithms for Bluetooth. In Broadband Communications. Convergence of Network Technologies., June 2000.

[599]
David B. Johnson and David A. Maltz. Protocols for adaptive wireless and mobile networking. IEEE Personal Communications, 3(1):34-42, 1996.

[600]
Audun Jøsang. A subjective metric of authentication. In Jean-Jacques Quisquater, Yves Deswarte, Catherine Meadows, and Dieter Gollmann, editors, 5rd European Symposium on Research in Computer Security, ESORICS'98, LNCS 1485, pages 329-344, September 16-18, 1998.

[601]
Anthony D. Joseph and M. Frans Kaashoek. Building reliable mobile-aware applications using the rover toolkit. Wireless Networks, 3(5):405-419, 1997.

[602]
Anthony D. Joseph, Joshua A. Tauber, and M. Frans Kaashoek. Mobile computing with the Rover Toolkit. IEEE Transactions on Computers., 46(3):337-352, March 1997.

[603]
Anupam Joshi, Sanjiva Weerawarana, and Elias N. Houstis. On disconnected browsing of distributed information. Proceedings of the 1997 7th International Workshop on Research Issues in Data Engineering, pages 101-107, 1997.

[604]
W.-M.W. Hwu J.P. Monks, V. Bharghavan. Transmission power control for multiple access wireless packet networks. In 25th Annual IEEE Conference on Local Computer Networks, pages 12-21, 2000.

[605]
Ari Juels and John Brainard. Client puzzles: A cryptographic countermeasure against connection depletion attacks. In Proceedings of the 1999 Network and Distributed System Security Symposium (NDSS'99), 1999.

[606]
Bongjin Jung and Wayne P. Burleson. Real-time VLSI compression for high-speed wireless local area networks. Proceedings of the Data Compression Conference, page 431, 1995.

[607]
T. Ohira K. Yang. Espar antennas-based signal processing for ds-cdma signal waveforms in ad hoc network systems. In IEEE Third Workshop on Signal Processing Advances in Wireless Communications, pages 130-133, 2001.

[608]
Richard S. Kagan. Virtual private networks - new strategies for secure enterprise networking. In Wescon Conference Record 1998, pages 267-272. IEEE, September 1998.

[609]
J.M. Kahn. Wireless infrared communications. Proceedings of the IEEE, 85(2):265-298, 1997.

[610]
A. Kalaxylos, S. Hadjiefthymiades, and L. Merakos. Mobility management and control protocol for wireless atm networks. IEEE Network, 12(4):19-27, 1998.

[611]
Alexandros Kaloxylos, Giannis Alexiou, Stathes Hadjiefthymiades, and Lazaros Merakos. Design and performance evaluation of a mobility management protocol for wireless atm networks. In IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC, volume 2, pages 728-732. IEEE, 1998.

[612]
Y. Kanaoka, T. Fukuoka, J. Sumita, and S. Shimokado. Study on wireless lan for utility application. Souken Houkoku no. 53, pages 54-60, 1997.

[613]
Chung Gu Kang, Yong Jin Kim, and Min Jae Hwang. Implicit scheduling algorithm for dynamic slot assignment in wireless atm networks. Electronics Letters, 34(24):2309-2311, 1998.

[614]
S. Kao. Speedy wireless networks. BYTE (International Edition), 23(3):IS40/15-17, 1998.

[615]
Günter Karjoth. Authorization in CORBA security. In Jean-Jacques Quisquater, Yves Deswarte, Catherine Meadows, and Dieter Gollmann, editors, 5rd European Symposium on Research in Computer Security, ESORICS'98, LNCS 1485, pages 143-158, September 16-18, 1998.

[616]
Mark J. Karol, Zhao Liu, and Kai Y. Eng. Distributed-queueing request update multiple access (dqruma) for wireless packet (atm) networks. IEEE International Conference on Communications, 2:1224-1231, 1995.

[617]
Mark J. Karol. Protocol for fast resource assignment in wireless pcs. IEEE Transactions on Vehicular Technology, 43(3):727-732, 1994.

[618]
Brad Karp and H. T. Kung. GPSR: Greedy perimeter stateless routing for wireless networks. In Proceedings of the ACM/IEEE Mobile Computing and Networking, August 2000.

[619]
Irene Katzela and Malathi Veeraraghavan. Virtual trees routing protocol for a wireless atm lan. Annual International Conference on Universal Personal Communications- Record, 1:369-374, 1996.

[620]
N. Kawaguchi, K. Toyama, and Y. Inagaki. MAGNET : ad hoc network system based on mobile agents. Computer Comunications, 23(8), April 1, 2000.

[621]
M. Kawai, K. Gyoda, and M. Nozaki. Topology optimization for wireless ad-hoc community network (WACNet). In Transactions of the Institute of Electrical Engineers of Japan, Part C., 2000.

[622]
S. Kawasaki and T. Itoh. Millimeter-wave active integrated antennas utilizing harmonics. Electronics & Communications in Japan, Part 2: Electronics (English Translation of Denshi Tsushin Gakkai Ronbunshi), 1(78):90-100, 1995.

[623]
I. Kaya. Exploiting multipath activity using low complexity equalisation techniques for high speed wireless lans. In VTC '98. 48th IEEE Vehicular Technology Conference. Pathway to a Global Wireless Revolution (Cat. No.98CH36151), volume 2, pages 1593-1597, 1997.

[624]
Keidar and Rajsbaum. On the cost of fault-tolerant consensus when there are no faults (preliminary version). SIGACTN: SIGACT News (ACM Special Interest Group on Automata and Computability Theory), 32, 2001.

[625]
R. A. Kemmerer, Catherine A. Meadows, and J. Millan. Three systems for cryptographic protocol analysis. Journal of Cryptology, 7(2):79-130, 1994.

[626]
A.J. Kennerley and I.C. Hunter. Surface mount rf and microwave filters using high dielectric constant ceramics. Conference Title : IEE Electronics Division Colloquium on Radio Frequency Design in Mobile Radio Transceivers, pages 2/1-5, 1994.

[627]
S. Kent. RFC 1422: Privacy enhancement for Internet electronic mail: Part II: Certificate-based key management, February 1993.

[628]
Angelos D. Keromytis and Jonathan M. Smith. Creating efficient fail-stop cryptographic protocols. Technical Report MS-CIS-96-32, University of Pennsylvania, December 1996.

[629]
Joep Kessels, Ad Peeters, Paul Wielage, and Suk-Jin Kim. Clock synchronization through handshake signalling. In Eighth International Symposium on Asynchronous Circuits and Systems, pages 52-61, 2002.

[630]
Volker Kessler and Heike Neumann. A sound logic for analysing electronic commerce protocols. In Jean-Jacques Quisquater, Yves Deswarte, Catherine Meadows, and Dieter Gollmann, editors, 5rd European Symposium on Research in Computer Security, ESORICS'98, LNCS 1485, pages 345-360, September 16-18, 1998.

[631]
T.J. Ketseoglou. Adaptive packet decoding in a wireless multiservice cdma environment. Conference Record - International Conference on Communications, 2:891-896, 1994.

[632]
Ellen R. Khayata, Carlos M. Puig, and Jonathan M. Zweig. Distributed medium access protocol for wireless lans. Conference Record of the Asilomar Conference on Signals, Systems & Computers, 1:238-242, 1994.

[633]
Rakesh Khetarpal and S. Krishna Dronamraju. Smart - a solution for managing the capacity, growth, and performance of wireless networks. Bell Labs Technical Journal, 2(3):182-193, Summer 1997.

[634]
Samir Khuller, Balaji Raghavachari, and Neal Young. Low-degree spanning trees of small weight. SIAM Journal on Computing, 25(2):355-368, February 1996.

[635]
Roger M. Kieckhafer, Chris J. Walter, Alan M. Finn, and Philip M. Thambidurai. The MAFT architecture for distributed fault tolerance. IEEE Transactions on Computers, 37:398-405, April 1988.

[636]
K. Kiefer. Remote sensing using wireless telecommunications. Proceedings of the SPIE - The International Society for Optical Engineering Vol: 3326, pages 396-405, 1998.

[637]
Kim Potter Kihlstrom, Louise E. Moser, and P. M. Melliar-Smith. Solving consensus in a byzantine environment using an unreliable fault detector. In Proceedings of the International Conference on Principles of Distributed Systems (OPODIS), pages 61-75, December 1997.

[638]
Kim Potter Kihlstrom, Louise E. Moser, and P. M. Melliar-Smith. The SecureRing protocols for securing group communication. In Proceedings of the 31st Annual Hawaii International Conference on System Sciences (HICSS), volume 3, pages 317-326. IEEE Computer Society Press, January 1998.

[639]
Youngsup Kim and Saewoong Bahk. Sub-block retransmission arq schemes. Computer Communications, 21(6):579-583, 1998.

[640]
Hwa-Jong Kim and Won-Young Jeong. Communication protocol for virtual cellular network (vcn). IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC, 1:343-347, 1995.

[641]
Hwa Jong Kim and Jean-Paul Linnartz. Virtual cellular network: A new wireless communications architecture with multiple access ports. Wireless Personal Communications, 10(3):287-307, 1999.

[642]
Jeong Geun Kim and Indra Widjaja. Prma/da: a new media access control protocol for wireless atm. IEEE International Conference on Communications, 1:240-244, 1996.

[643]
B.C. Kim, JS. Jang, and CK. Un. Idle-signal casting multiple access wirh collision resolution (icma/cr) protocol for wireless lan. Electronics Letters, 9(31):698-700, 1995.

[644]
B.C. Kim, J.S. Jang, and C.K. Un. Idle-signal casting multiple access with collision resolution (icma/cr) protocol for wireless lan. Electronics Letters, 31(9):698-700, 1995.

[645]
Myungchul Kim, Sungwon Kang, and Keesoo Hong. Testing of Communicating Systems Volume 10. Number ISBN 0-412-81730-6 in INTERNATIONAL FEDERATION FOR INFORMATION PROCESSING. Kluwer Academic Publishers, Boston, 1997.

[646]
Darrell Kindred and Jeannette M. Wing. Fast, automatic checking of security protocols. In 2nd USENIX Workshop on Electronic Commerce, pages 41-52, November 1996.

[647]
Darrell Kindred and Jeannette M. Wing. Theory generation for security protocols. TOPLAS, 7, 1999.

[648]
Kensaku Kinoshita, Hisao Koga, Hideo Yamamoto, Keizo Sugita, and Masaki Aida. Trends and technical issues for high speed LANs and applications. IEICE Transactions on Communications, 79(5):621-626, May 1996.

[649]
Kimberly E. Kirkpatrick. Modeling a LAN security server. In Thomas A. Berson and Thomas Beth, editors, Proceedings of the Workshop on Local Area Network Security (LANSEC'89), LNCS 396, pages 113-138, Berlin, April 1989. Springer.

[650]
Young Bae Ko and Nitin H. Vaidya. Loacation Aided Routing (LAR) in Mobile Ad Hoc Networks. In The fourth annual ACM/IEEE international conference on Mobile computing and networking, October 25-30, 1998.

[651]
Liang-Seng Koh and Ming T. Liu. Wireless multiple access control protocol for voice-data integration. Proceedings of the Internatoinal Conference on Parallel and Distributed Systems - ICPADS, pages 206-213, 1996.

[652]
Liang-Seng Koh and MT. Liu. The adaptive permission reservation protocol for wireless communications. In 1997 IEEE International Performance, Computing and Communications Conference (Cat. No.97CH36051)., pages 483-489. IEEE, 1997.

[653]
J. Kohl and C. Neuman. RFC 1510: The Kerberos Network Authentication Service (V5), September 1993. Status: PROPOSED STANDARD.

[654]
G.D. Kondylis, S.V. Krishnamurthy, S.K. Dao, and G.J. Pottie. Multicasting sustained CBR and VBR traffic in wireless ad-hoc networks. In 2000 IEEE International Conference on Communications. ICC 2000. Global Convergence Through Communications., March 2000.

[655]
Jiejun Kong, Haiyun Luo, Kaixin Xu, Daniel Lihui Gu, Mario Gerla, and Songwu Lu. Adaptive security for multi-layer ad-hoc networks. Wireless Communications and Mobile Computing, August 2002. (to be published).

[656]
Heba Koraitim, Samir Tohme, and Hasan Cakil. Mb-icbt protocol performance in star-configured vsat satellite networks. In 2nd IEEE Symposium on Computers and Communications (ISCC '97) July 1-3, 1997. IEEE, 1997.

[657]
Tanya Korelsky, Bill Dean, Carl Eichenlaub, James Hook, Carl Klapper, Marcos Lam, Daryl McCullough, Garrel Pottinger, Owen Rambow, David Rosenthal, Jonathan P. Seldin, and D. G. Weber. Security modeling in the Ulysses environment. In Proceedings of the 4th Annual Computer Security Applications Conference, 1988.

[658]
I. Koutsopoulos, D. Connors, A. Savvides, and SK. Dao. Intra-team multi-hop broadcasting (ITMB): a MAC layer protocol for efficient control signaling in wireless ad-hoc networks. In 2000 IEEE International Conference on Communications. ICC 2000. Global Convergence Through Communications., March 2000.

[659]
H.G. Kremser. Funken mit 6 chips. chipsatz zum aufbau eines drahtlosen datentransceivers. MegaLink, 4(13/14):38-40, 42, 1997.

[660]
Udo R. Krieger and Michael Savoriá. Performance evaluation of abr flow-control protocols in a wireless atm network. In WOWMOM '98. Proceedings of first ACM international workshop on Wireless mobile multimedia, pages 73-82. ACM, 1998.

[661]
Arvind Krishna and Richard O. LaMaire. Comparison of radio capture models and their effect on wireless lan protocols. Annual International Conference on Universal Personal Communications- Record, pages 666-672, 1994.

[662]
Chr. Kroell, P. Peinl, and J. Pommnitz. Extensions of the internet protocol for wireless communication. IFIP Transactions A: Computer Science and Technology, 51:95-100, 1994.

[663]
Chr. Kroell, P. Peinl, and J. Pommnitz. Extensions of the internet protocol for wireless communication. IFIP Transactions A: Computer Science and Technology, 51:95-100, 1994.

[664]
A. Kumar and J. Holtzman. Comparative performance analysis of versions of tcp in a local network with a mobile radio link. Sadhana, 23(1):113-129, 1998.

[665]
Anurag Kumar and Deepak Patil. Stability and throughput analysis of unslotted cdma-aloha with finite number of users and code sharing. Telecommunication Systems, 8(2-4):257-275, 1997.

[666]
Sharad Kumar and R. Vaman. Access protocol for supporting multiple classes of service in a local wireless environment. IEEE Transactions on Vehicular Technology, 45(2):288-302, May 1996.

[667]
Klaus Kursawe and Victor Shoup. Optimistic asynchronous atomic broadcast, March 6, 2001.

[668]
Joseph M. Kusmiss. Reassurance for the electronically insecure: Review of Network and Internetwork Security: Principles and Practices. IEEE Software, 12(3):103, May 1995.

[669]
A. Kutlu, H. Ekiz, and E.T. Powner. Performance analysis of mac protocols for wireless control area network. Proceedings of the International Symposium on Parallel Architectures, Algorithms and Networks, I-SPAN, pages 494-499, 1996.

[670]
RSA Laboratories. Answers to Frequently Asked Questions About Today's Cryptography. RSA Security Inc., version 4.1 edition, May 2000.

[671]
Jian-Jou Lai and Shie-Jue Lee. A medium access control protocol for wireless networks. In ICC '98. 1998 IEEE International Conference on Communications. Conference Record. Affiliated with SUPERCOMM'98 (Cat. No.98CH36220)., volume 1, pages 146-150. IEEE, 1998.

[672]
Xuejia Lai and James L. Massey. A proposal for a new block encryption standard. In Advances in Cryptology - Eurocrypt'90, pages 389-404. Springer-Verlag, 1991.

[673]
Xuejia Lai, James L. Massey, and Sean Murphy. Markov ciphers and differential cryptanalysis. In Advances in Cryptology - Eurocrypt'91, LNCS 547, pages 17-38. Springer-Verlag, 1991.

[674]
Sanjay Lal and Elvino Sousa. Distributed resource allocation for ds-cdma based multi-media wireless lans. In Proceedings - IEEE Military Communications Conference MILCOM, volume 2, pages 583-588. IEEE, 1998.

[675]
Lal and Sousa. Distributed resource allocation for DS-CDMA-based multimedia ad hoc wireless LANs. IEEE Journal on Selected Areas in Communications, 17(5):947 --967, 1999.

[676]
Richard O. LaMaire, Arvind Krishna, and Hamid Ahmadi. Analysis of a wireless mac protocol with client-server traffic and capture. IEEE Journal on Selected Areas in Communications, 12(8):1299-1313, 1994.

[677]
Richard O. LaMaire, Arvind Krishna, Pravin Bhagwat, and James Panian. Wireless lans and mobile networking: standards and future directions. IEEE Communications Magazine, 34(8):86-94, August 1996.

[678]
Paul A. Lambert. Architectural considerations for LAN security protocols. In Thomas A. Berson and Thomas Beth, editors, Proceedings of the Workshop on Local Area Network Security (LANSEC'89), LNCS 396, pages 5-12, Berlin, April 1989. Springer.

[679]
Leslie Lamport, Robert Shostak, and Marshall Pease. Reaching agreement in the presence of faults. Journal of the ACM, 27(2):228-234, April 1980.

[680]
Leslie Lamport, Robert Shostak, and Marshall Pease. The Byzantine generals problem. ACM Transactions on Programming Languages and Systems, 4(3):382-401, July 1982.

[681]
Leslie Lamport. The weak byzantine generals problem. Journal of the ACM, 30:668-676, July 1983.

[682]
Leslie Lamport. Using time instead of timeout for fault-tolerant distributed systems. ACM Transactions on Programming Languages and Systems, 6(2):254-280, April 1984.

[683]
Leslie Lamport. The part-time parliament. ACM Transactions on Computer Systems, 16(2):133-169, May 1998.

[684]
Butler W. Lampson, Martín Abadi, Michael Burrows, and Edward Wobber. Authentication in distributed systems: Theory and practice. ACM Transactions on Computer Systems, 10(4):265-310, November 1992.

[685]
Butler W. Lampson. Technology to achieve secure computer systems. In Computers at Risk, pages 74-101. National Academy Press, 1991.

[686]
Gèrard Le Lann. On real-time and non real-time distributed computing. In Proceedings 9th International Workshop on Distributed Algorithms (WDAG'95), volume 972 of Lecture Notes in Computer Science, pages 51-70. Springer, September 13-15 1995.

[687]
Th.F. LaPorta, R. Ramjee, Th. Woo, and K.K. Sabnani. Experiences with network-based user agents for mobile applications. Mobile Networks and Applications, 3(2):123-141, 1998.

[688]
Mikel Larrea, Antonio Fernández, and Sergio Arévalo. Efficient algorithms to implement unreliable failure detectors in partially synchronous systems. In Proceedings of the 13th International Symposium on Distributed Computing (DISC'99), LNCS 1693, pages 34-48. Springer, September 1999.

[689]
Mikel Larrea, Antonio Fernández, and Sergio Arévalo. Optimal implementation of the weakest failure detector for sloving consensus. In Proceedings of the 19th ACM Symposium on Principles of Distributed Computing (PODC'00), page 334, 2000.

[690]
Mikel Larrea, Antonio Fernández, and Sergio Arévalo. On the impossibility of implementing perpetual failure detectors in partially synchronous systems. In Proceedings of the 10th Euromicro Workshop on Parallel, Distributed and Network-based Processing (PDP'02), January 2002.

[691]
Huy Linh Anh Le, Huub van Roosmalen, Jos Nijhof, and Ramjee Prasad. Unslotted hybrid cdma/isma protocol for indoor wireless computer communications. Proc 1995 IEEE 3 Symp Commun Vehic Technol Benelux, pages 68-75, 1995.

[692]
K.H. Le, S. Norskov, L. Dittmann, and U. Gliese. Base station mac with aprma protocol for broadband multimedia atm in micro/pico-cellular mobile networks. In IEEE Vehicular Technology Conference, volume 1, pages 234-238. IEEE, 1998.

[693]
Gérard Le Lann and Ulrich Schmid. How to implement a timer-free perfect failure detector in partially synchronous systems. Technical Report 183/1-127, Department of Automation, Technische Universität Wien, January 2003. (submitted).

[694]
Gérard Le Lann and Ulrich Schmid. How to maximize computing systems coverage. Technical Report 183/1-128, Department of Automation, Technische Universität Wien, April 2003.

[695]
Gérard Le Lann. Certifiable critical complex computing systems. In K. Duncan and K. Krueger, editors, Proceedings 13th IFIP World Computer Congress 94, volume 3, pages 287-294. Elsevier Science B.V. (North-Holland), 1994.

[696]
Gerard Le Lann. Asynchrony and real-time dependable computing. In Proceedings of the 8th IEEE Intl. Workshop on Object-Oriented Real-Time Dependable Systems (WORDS 2003), page 8p., Guadalajara, Mexico, 2003. IEEE Computer Society.

[697]
Guy Leduc, O. Bonaventure, E. Koerner, Luc Léonard, C. Pecheur, and D. Zanetti. Specification and verification of a TTP protocol for the conditional access to services. In Proceedings of 12th J. Cartier Workshop on Formal Methods and their Applications: Telecommunications, VLSI and Real-Time Computerized Control System, October 2-4, 1996.

[698]
G. Leduc. Verification of two versions of the Challenge Handshake Authentication Protocol (CHAP). Annals of Telecommunications, 1999. (to appear).

[699]
Sung Won Lee and Dong Ho Cho. Distributed reservation cdma for wireless lan. Conference Record / IEEE Global Telecommunications Conference, 1:360-364, 1996.

[700]
Jeong G. Lee and M. Scott Corson. Reservation limited sensing protocol in wireless networks. IEEE Vehicular Technology Conference, 1:531-535, 1996.

[701]
M.-Y. Lee, J.-L. Chen, and Sh. Lin. Java-based wireless network management system. IEEE International Conference on Personal Wireless Communications 1997, pages 353-356, 1997.

[702]
Kwan Soo Lee. Evolution of a futuristic rural network with mixed wireless and cable systems. Wireless Computer Communication. Emerging Business Opportunities. Papers Presented at the International Conference on Wireless Computer Communication: Emerging Business Opportunities (Infocom'94), pages 364-373, 1995.

[703]
S.W. Lee. Reservation cdma access method for central/distributed wireless lan. IEICE Transactions on Communications, E80-B(5):736-745, 1997.

[704]
Jussipekka Leiwo, Tuomas Aura, and Pekka Nikander. Towards network denial of service resistant protocols. In Proceedings of the 15th International Information Security Conference (IFIP/SEC 2000), pages 301-310, August 2000.

[705]
Michael D. Lemmon, Joydeep Ganguly, and Lucia Xia. Model-based clock synchronization in networks with drifting clocks. In Pacific Rim International Symposium on Dependable Computing, pages 177-184, 2000.

[706]
Kin Leung and Branimir Vojcic. Multiaccess, Mobility and Teletraffic for Wireless Communications, volume 3. Kluwer Academic Publishers, Boston, 1998.

[707]
K. H. Leung, K. W. Ma, W. K. Wong, and P. H. W. Leong. FPGA implementation of a microcoded elliptic curve cryptographic processor. In Proceedings of Field-Programmable Custom Computing Machines (FCCM'00), pages 68-76, 2000.

[708]
P.S.K. Leung. Asymmetric-raised-cosine frequency shift keying (arc-fsk)-a new modulation with superior anti-multipath characteristics for mobile and personal communications systems. In Conf. Title: 1995 Fourth IEEE International Conference on Universal Personal Communications., pages 117-122, 1995.

[709]
Christos Levcopoulos, Giri Narasimhan, and Michiel H. M. Smid. Improved algorithms for constructing fault-tolerant spanners. Algorithmica, 32(1):144-156, 2002.

[710]
Yalun Li and Steinar Andresen. Multimedia traffic management principles for guaranteed wireless network performance. Annual International Conference on Universal Personal Communications- Record, pages 325-329, 1994.

[711]
Meng-Che Li and Kwang-Cheng Chen. Grapo - optimized group randomly addressed polling for wireless data network. IEEE Vehicular Technology Conference, 3:1425-1429, 1994.

[712]
Meng-Che Li and Kwang-Cheng Chen. Grapo - optimized group randomly addressed polling for wireless data network. International Journal of Wireless Information Networks, 2(4):247-254, 1995.

[713]
Yifan Li and Jamil Y. Khan. Performance of atdma protocol in a microcellular environment. In IEEE Vehicular Technology Conference, volume 3, pages 1815-1819. IEEE, 1998.

[714]
Yalun Li and Victor C.M. Leung. Supporting personal mobility for nomadic computing over the internet. Mobile Computing and Communications Review, 1(1):22-31, 1997.

[715]
Xiang-Yang Li and Yu Wang. Localized construction of low weight bounded degree spanner, submitted for publication. In Submitted for Publication, 2003.

[716]
J. Li, D. Raychaudhuri, and R. Yates. Unified handoff control protocol for dynamic path rerouting in mobile atm networks. In IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC, volume 1, pages 323-329. IEEE, 1998.

[717]
Xiang-Yang Li, Gruia Calinescu, and Peng-Jun Wan. Distributed construction of a planar spanner and routing for ad hoc wireless networks. In Proceedings of the 21th Annual Joint Conference of the IEEE Computer and Communications Societies, June 2002.

[718]
Randall W. Lichota, Grace L. Hammonds, and Stephen H. Brackin. Verifying the correctness of cryptographic protocols using "Convince". In Proceedings of the 12th Annual Computer Security Applications Conference, page 12 pages, December 1996.

[719]
Armin Liebl. Authentication in distributed systems: A bibliography. ACM Operating Systems Review, 27(4):31-41, 1993.

[720]
M. Liljeberg, K. Raatikainen, M. Evans, S. Furnell, N. Maumon, E. Veldkamp, B. Wind, and S. Trigila. Using corba to support terminal mobility. Proceedings TINA '97 - Global Convergence of Telecommunications and Distributed Object Computing, pages 59-67, 1997.

[721]
Chae Hoon Lim and Pil Joong Lee. Several practical protocols for authentication and key exchange. Information Processing Letters, 53(2):91-96, January 1995.

[722]
Hung-Yu Lin and Lein Harn. Authentication protocols for personal communication systems. In Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, pages 256-261, August 1995.

[723]
Hui-Tang Lin and Herman D. Hughes. Handoff scheme for wireless atm networks. Annual International Conference on Universal Personal Communications- Record, 1:397-401, 1996.

[724]
Patrick Lincoln and John Rushby. Formal verification of an algorithm for interactive consistency under a hybrid fault model. In Courcoubetis [303], pages 292-304.

[725]
Patrick Lincoln and John Rushby. A formally verified algorithm for interactive consistency under a hybrid fault model. In Proceedings Fault Tolerant Computing Symposium 23, pages 402-411, Toulouse, France, June 1993.

[726]
J. Linn. Generic security service application program interface, version 2, January 1997. RFC 2078 (http://aurora.rg.iupui.edu/doc/rfc/rfc-html/rfc2078.html).

[727]
Jean-Paul M. G. Linnartz. Performance analysis of synchronous MC-CDMA in mobile Rayleigh channel with both delay and Doppler spreads. IEEE Transactions on Vehicular Technology, 50(6):1375 -- 1387, 2001.

[728]
George R.J. Linnenbank, Paul J.M. Havinga, Sape J. Mullender, and Gerard J.M. Smit. Request-tdma: a multiple-access protocol for wireless multimedia networks. Proc 1995 IEEE 3 Symp Commun Vehic Technol Benelux, pages 20-27, 1995.

[729]
M. Listanti, F. Mascitelli, and A. Mobilia. d2ma: a distributed access protocol for wireless atm networks. In Proceedings. IEEE INFOCOM '98, the Conference on Computer Communications. Seventeenth Annual Joint Conference of the IEEE Computer and Communications Societies. Gateway to the 21st Century (Cat. No.98CH36169)., volume 1, pages 315-321. IEEE, 1997.

[730]
C.L. Liu and J.W. Layland. Scheduling algorithms for multiprogramming in a hard real-time environment. Journal of the ACM, 20(1):46-61, January 1973.

[731]
Zhao Liu, Mark J. Karol, Magda El Zarki, and Kai Y. Eng. Demand-assignment access control for multi-code ds-cdma wireless packet (atm) networks. Proceedings - IEEE INFOCOM, 2:713-721, 1996.

[732]
Jane W. S. Liu. Real-Time Systems. Prentice Hall, 2000.

[733]
F.L. Lo, T.S. Ng, and T.I. Yuk. A model for evaluating the performance of code phase assignment cdma lan. In Conf. Title: Sixth IEEE International Symposium on Personal, Indoor and Mobile Radio Communications. PIMRC'95. Wireless: Merging onto the Information Superhighway, volume 2, pages 896-900, 1995.

[734]
F.L. Lo, T.S. Ng, and T.I. Yuk. A model for evaluating the performance of code phase assignment cdma lan. Conf. Title: Sixth IEEE International Symposium on Personal, Indoor and Mobile Radio Communications. PIMRC'95. Wireless: Merging onto the Information Superhighway, 2:896-900, 1995.

[735]
T. Mark A. Lomas, Li Gong, Jerome H. Saltzer, and Roger M. Needham. Reducing risks from poorly chosen keys. In Proceedings of the 12th ACM Symposium on Operating Systems Principles, pages 14-18, December 1989.

[736]
M.S. Lopez and P. Manzoni. A communication protocol for clouds of mobile robots. Tasks and Methods in Applied Artificial Intelligence. 11th International Conference on Industrial and Engineering Applications of Artificial Intelligence and Expert Systems IEA-98-AIE. Proceedings vol. 2, pages 310-318, 1998.

[737]
Damian Lopez-Rodriguez and Rafael Perez-Jimenez. Distributed method for channel assignment in cdma based "ad-hoc" wireless local area networks. In Digest IEEE MTT-S Symposium on Technologies for Wireless Applications, pages 11-16, Vancouver, BC, Canada, 1999.

[738]
J. Loraine. Wireless data networks: an opportunity for GaAs. Technical Digest - GaAs IC Symposium (Gallium Arsenide Integrated Circuit), pages 11-14, 1993.

[739]
Matthias Lott and Bernhard Walke. Performance of a Wireless Ad hoc Network Supporting ATM. In Proceedings of the second ACM international workshop on Wireless mobile multimedia, August 20, 1999.

[740]
Nikos H. Loukas, Christos K. Xenakis, Lazaros Merakos, and Iakovos Venieris. Signaling and mobility control for wireless intelligent atm cpns. In IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC, volume 2, pages 738-743. IEEE, 1998.

[741]
Gavin Lowe. Breaking and fixing the Needham-Schroeder public-key protocol using FDR. In Tiziana Margaria and Berhard Steffen, editors, Tools and Algorithms for the Construction and Analysis of Systems, 2nd International Workshop TACAS'96, LNCS 1055, pages 147-166. Springer Verlag, March 27-29, 1996.

[742]
Gavin Lowe. A hierarchy of authentication specification. In Proceedings of the 1997 IEEE Computer Society Symposium on Research in Security and Privacy, pages 31-43, 1997.

[743]
Gavin Lowe. Casper: A compiler for the analysis of security protocols. http://www.mcs.le.ac.uk/~glowe/Security/Casper/casper.ps, July 6, 1998.

[744]
W. P. Lu. Providing confidentiality services for a lan interconnected service. In Wireless Computer Communication. Emerging Business Opportunities., pages 18-30. International Conference on Wireless Computer Communication: Emerging Business Opportunities (Infocom'94). Tata McGraw-Hill, New Delhi, India; 1995, 1995.

[745]
Victor Luchangco, Ekrem Soylemez, Stephen Garland, and Nancy Lynch. Verifying timing properties of concurrent algorithms. In Proceedings of the 7th nternational Conference on Formal Description Techniques for Distributed Systems and Communications Protocols Distributed Computing Systems (FORTE94), pages 239-259, October 1994.

[746]
J.C.S. Lui, O.K.Y. So, and T.S. Tam. Nfs/m: an open platform mobile file system. Proceedings. 18th International Conference on Distributed Computing Systems, pages 488-495, 1998.

[747]
Marco Luise, MArco Marselli, and Ruggero Reggiannini. Clock synchronization for wavelet-based multirate transmissions. IEEE Transactions on Communications, 48(6):1047-1054, June 2000.

[748]
R. Lundberg and M. Renner. Building wireless infrastructure applications based on off-the-shelf building blocks. Real-Time Magazine no. 2, pages 19-24, 1998.

[749]
G.M. Lundy, M. Almquist, and T. Oruk. Specification, verification and simulation of a wireless lan protocol: Macaw. In Proceedings - IEEE Military Communications Conference MILCOM, volume 2, pages 565-569. IEEE, 1998.

[750]
Nancy Lynch and Frits Vaandrager. Action transducers and timed automata. Technical Report MIT/LCS/TM-480.b, Laboratory for Computer Science, Massachusetts Institute of Technology, USA, October 1994.

[751]
Nancy A. Lynch, Michael J. Fischer, and Robert J. Fowler. A simple and efficient Byzantine Generals algorithm, 1982.

[752]
Nancy Lynch. Distributed Algorithms. Morgan Kaufman, 1996.

[753]
H. Maass. Location-aware mobile applications based on directory services. Mobile Networks and Applications, 3(2):157-173, 1998.

[754]
Upamanyu Madhow and Michael L. Honig. MMSE interference suppression for direct-sequence spread-spectrum CDMA. IEEE Transactions on Communications, 42(12):3178-3188, December 1994.

[755]
Mohammad Madihian, Emmanuel Bak, Hiroshi Yoshida, Hiroshi Hirabayashi, Kyotaka Imai, Yasushi Kinoshita, Tohru Yamazaki, and Laurent Desclos. A 2-v, 1-10 ghz bicmos transceiver chip for multimode wireless communications networks. IEEE Journal of Solid-State Circuits, 32(4):521-525, April 1997.

[756]
D. Thomas Magill, Francis D. Natali, and Gwyn P. Edwards. Spread-spectrum technology for commercial applications. Proceedings of the IEEE, 82(4):572-584, April 1994.

[757]
Dimitrios Makrakis, Ranjeet S. Mander, Luis Orozco-Barbosa, and P. Papantoni-Kazakos. A spread-slotted random-access protocol with multi-priority for personal and mobile communication networks carrying integrated traffic. Mobile Networks and Applications, 2(4):325-331, 1997.

[758]
Dahlia Malkhi and Michael Reiter. Unreliable intrusion detection in distributed computations. In Proceedings of the 10th Computer Security Foundations Workshop (CSFW97), pages 116-124, June 1997.

[759]
Dahlia Malkhi and Michael Reiter. Byzantine quorum systems. Distributed Computing, 11(4):203-213, 1998.

[760]
Dahlia Malkhi, Elan Pavlov, and Yaron Sella. Optimal unconditional information diffusion. In DISC'01, 2001.

[761]
Dahlia Malkhi. Quorum systems, 1999. Chapter in The Encyclopedia of Distributed Computing, Joseph Urban and Partha Dasgupta (eds.), Kluwer Academic Publishers.

[762]
Navneet Malpani, Jennifer L. Welch, and Nitin Vaidya. Leader Election Algorithms for Mobile Ad Hoc Networks. In Proceedings of the 4th international workshop on Discrete algorithms and methods for mobile computing and communication, August 11, 2000.

[763]
Narayan B. Mandayam and Jack M. Holtzman. Analysis of a simple protocol for short message data service in an integrated voice/data cdma system. Proceedings - IEEE Military Communications Conference MILCOM, 3:1160-1164, 1995.

[764]
Bill Mangione-Smith. Low power communications protocols: paging and beyond. IEEE Symposium on Low Power Electronics, pages 8-11, 1995.

[765]
Mantel, Scully, and Mawira. Radio aspects of hybrid wireless ad-hoc networks. In Proc. IEEE 53rd Vehicular Technology Conference (VTC'01), volume 2, pages 1139 -- 1143, Rhodes, Greece, May 2001.

[766]
Pietro Manzoni, Dipak Ghosal, and Giuseppe Serazzi. Impact of mobility on tcp/ip: an integrated performance study. IEEE Journal on Selected Areas in Communications, 13(5):858-867, 1995.

[767]
W. Mao, R. Kohnoand, and H. Imai. Mfsk/fh-cdma system with two-stage address coding and error correcting coding and decoding. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E78-A(9):1117-1126, 1995.

[768]
Michael J. Markowski and Adarshpal S. Sethi. Fully distributed wireless transmission of heterogeneous real-time data. In IEEE Vehicular Technology Conference, volume 2, pages 1439-1442. IEEE, 1998.

[769]
Will Marrero, Edmund Clarke, and Somesh Jha. A model checker for authentication protocols. In DIMACS Workshop on Design and Formal Verification of Security Protocols, page 19 pages, September 3-5, 1997.

[770]
K. Maruhashi. A 60ghz-band low noise hjfet amplifier module for wireless lan applications. 1996 IEEE MTT-S Internat. Microwave Symp. Digest, 1:13-16, 1997.

[771]
T. Maruyama. Design and analysis of small multisector antenna for wireless lans based on monopole yagi-uda elements. Electronics and Communications in Japan, Part 1, 81(12):80-90, 1998.

[772]
E. Marx-Perez and J. Sole-Pareta. Accessing internet applications from wireless computers. IEE Colloquium (Digest) 063, pages 9/1-9/7, 1997.

[773]
Craig J. Mathias. New LAN gear snaps unseen desktop chains. Data Communications, 23(5):75-80, 1994.

[774]
Anish Mathuria, Reihaneh Safavi-Naini, and Peter Nickolas. Some remarks on the logic of Gong, Needham and Yahalom. In Proceedings of the International Computer Symposium 1994, volume 1, pages 303-308, December 12-14, 1994.

[775]
Yoichi Matsumoto, Kobayashi, Kiyoshi, Sakata, Tetsu, and Kazuhiko Seki. VLSI-implemented high speed digital burst modem applications for satellite video TDMA and wireless LAN. Conference Record - International Conference on Communications, 3:1472-1477, 1994.

[776]
Y. Matsunaga. A short-span optical feeder for wireless personal communication systems using multimode fibers. 21st European Conference on Optical Communication, ECOC'95, including Symposium on Photonic versus Electronic Technologies in Switching and Interconnection. Symposium on Broadband Networks for Video and Multimedia Services (IEEE Cat. No.95TH8127), 1:231-234, 1997.

[777]
Kanta Matsuura and Hideki Imai. Protection of authenticated key-agreement protocol against a denial-of-service attack. In Proceedings of International Symposium on Information Theory and Its Applications (ISITA'98), pages 466-470, October 1998.

[778]
Kanta Matsuura and Hideki Imai. Modification of Internet Key Exchange resistant against denial-of-service. In Pre-Proc. of Internet Workshop 2000 (IWS2000), pages 167-174, February 2000.

[779]
Sjouke Mauw. The formalization of Message Sequence Charts.

[780]
Sjouke Mauw. Message Sequence Charts (MSC).

[781]
N. F. Maxemchuk. Applying mstdm to packet voice and data in cellular radio systems. In Sixth International Conference on Network Protocols. IEEE, 1998.

[782]
Juergen Mayer, Johannes Schlee, and Tobias Weber. Handoff protocols in jd-cdma. In IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC, volume 1, pages 355-359. IEEE, 1998.

[783]
Patrick McDaniel, Peter Honeyman, and Atul Prakash. Lightweight secure group communication. Technical Report CITI TR 98-2, University of Michigan, Ann Arbor, MI, USA, April 1998.

[784]
Patrick D. McDaniel, Atul Prakash, and Peter Honeyman. Antigone: A flexible framework for secure group communication. Technical Report CITI TR 99-2, University of Michigan, Ann Arbor, MI, USA, September 1999.

[785]
Paul E. McKenney and Peter E. Bausbacher. Guest editorial wireless ad hoc networks. IEEE Journal on Selected Areas in Communications, 9(1):59-64, 1991.

[786]
Patrick McLaughlin. Structuring your business around secure open distributed service management systems. In IEEE Symposium Record on Network Operations and Management Symposium, volume 2, pages 370-381. IEEE, 1996.

[787]
Janise McNair, Ian F. Akyildiz, and Michael Bender. An intersystem handoff technique for IMT-2000 systems. In IEEE INFOCOM 2000, 2000.

[788]
Catherine Meadows and David Mutchler. Matching secrets in the absence of a continuously available trusted authority. IEEE Transactions on Software Engineering, 13(2):289-292, February 1987.

[789]
Catherine Meadows and Paliath Narendran. A unification algorithm for the group diffie-hellman protocol, January14-15, 2002.

[790]
Catherine A. Meadows. Applying formal methods to the analysis of a key management protocol. Journal of Computer Security, 1(1):5-36, 1992.

[791]
Catherine A. Meadows. Formal verification of cryptographic protocols: A survey. In Josef Pieprzyk and Reihanah Safavi-Naini, editors, Advances in Cryptology - ASIACRYPT'94, LNCS 917, pages 133-150. Springer Verlag, November 27-29, 1994.

[792]
Catherine A. Meadows. The NRL protocol analyzer: An overview. Journal of Logic Programming, 19/20:19 pages, 1994.

[793]
Catherine A. Meadows. Analyzing the Needham-Schroeder public key protocol: A comparison of two approaches. In Elisa Bertino, Helmut Kurth, Giancarlo Martella, and Emilio Montolivo, editors, 4rd European Symposium on Research in Computer Security, ESORICS'96, LNCS 1146, pages 351-364, September 25-27, 1996.

[794]
Catherine A. Meadows. The NRL protocol analyzer: An overview. Journal of Logic Programming, 26(2):113-131, 1996.

[795]
Catherine A. Meadows. Analysis of the Internet Key Exchange protocol using the NRL protocol analyzer. In Proceedings of the 1999 IEEE Symposium on Security and Privacy, May 1999.

[796]
Catherine A. Meadows. A formal framework and evaluation method for network denial of service. In Proceedings of the 12th IEEE Computer Security Foundation Workshop, June 1999.

[797]
Catherine Meadows. Open issues in formal methods for cryptographic protocol analysis. In Proceedings of DISCEX 2000, pages 237-250, January 2000.

[798]
Catherine Meadows. A cost-based framework for analysis of denial of service in networks. Journal of Computer Security, 9(1-2):143-164, 2001.

[799]
Jens Meggers and Georg Filios. Multicast communication in ad hoc' networks. In IEEE Vehicular Technology Conference, volume 1, pages 372-376. IEEE, 1998.

[800]
Hussein Mehdi and Kamilo Feher. Fbpsk, power and spectrally efficient modulation for pcs and satellite broadcasting applications. IEEE Transactions on Broadcasting., 42(1):27-32, March 1996.

[801]
Kathleen S. Meier-Hellstern, Gregory P. Pollini, and David J. Goodman. Network protocols for the cellular packet switch. IEEE Transactions on Communications, 42(2):1235-1244, February 1994.

[802]
V.M. Melian. 2 mb/s dpsk modem for infrared wireless lan and data communication. etaCOM 96, the 1st Annual Conf. on Emerging Technol. and Applications in Communications, pages 158-161, 1997.

[803]
A.J. Mendez, J.L. Lambert, J.M. Morookian, L.A. Bergman, and R.M. Gagliardi. Applications of optical code division multiple access (cdma) to wireless communications. Konferenz-Einzelbericht: Wireless Communications, 2556:102-106, 1995.

[804]
Teresa H. Meng and Volkan Rodoplu. Distributed network protocols for wireless communication. In Proceedings of the 1998 IEEE International Symposium on Circuits and Systems (ISCAS'98), volume 4, pages 600-603, Monterey, CA, USA, 1998.

[805]
Ralph C. Merkle. Secure communications over insecure channels. Communications of the Association for Computing Machinery, 21(4):294-299, April 1978.

[806]
Richard A. Meyer and Rajive L. Bagrodia. Improving lookahead in parallel wireless network simulation. IEEE International Workshop on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems - Proceedings 1998, pages 262-267, 1998.

[807]
Fred J. Meyer and Dhiraj K. Pradhan. Consensus with dual failure modes. In In Digest of Papers of the 17th International Symposium on Fault-Tolerant Computing, pages 48-54, Pittsburgh, July 1987.

[808]
Fred J. Meyer and Dhiraj K. Pradhan. Consensus with dual failure modes. IEEE Transactions on Parallel and Distributed Systems, 2(2):214-222, April 1991.

[809]
Robert G. Meyer, William D. Mack, and Johannes J. E. M. Hageraats. A 2.5-ghz bicmos transceiver for wireless lan's. IEEE Journal of Solid-State Circuits, 32(12):2097-2104, December 1997.

[810]
Tim Meyer. Wireless data in a dissimilar multiple network environment. Annual International Conference on Universal Personal Communications-Record, page 601, 1994.

[811]
Markus Michels, Markus Stadler, and Hung-Min Sun. On the security of some variants of the RSA signature scheme. In Jean-Jacques Quisquater, Yves Deswarte, Catherine Meadows, and Dieter Gollmann, editors, 5rd European Symposium on Research in Computer Security, ESORICS'98, LNCS 1485, pages 85-96, September 16-18, 1998.

[812]
Jouni Mikkonen and Liina Nenonen. Wireless atm mac performance evaluation, a case study: Hiperlan type 1 vs. modified mdr. Mobile Networks and Applications, 3(3):247-259, 1998.

[813]
J. Mikkonen, J. Aldis, A. Lunn, G. Awater, and D. Hutchison. The magic WAND - functional overview. IEEE Journal on Selected Areas in Communications, 16(6):953-972, 1998.

[814]
Jonathan K. Millen, Sidney C. Clark, and Sheryl B. Freedman. The Interrogator: Protocol security analysis. IEEE Transactions on Software Engineering, 13(2):274-288, February 1987.

[815]
S. P. Miller, B. C. Neuman, J. I. Schiller, and J. H. Saltzer. Kerberos authentication and authorization system. Project Athena Technical Plan, Section E.2.1.

[816]
S. P. Miller, J. I. Neumann, J. I. Schiller, and J. H. Saltzer. Kerberos authentication and authorisation system. Technical Report Project Athena Technical Plan, Sec. E.2.1, MIT, 1989.

[817]
Kenneth C. Miller. Data distribution over ip in high error rate military radio environments. In Proceedings - IEEE Military Communications Conference MILCOM, volume 3, pages 1067-1071. IEEE, 1998.

[818]
David L. Mills. NTP timescale and leap seconds. http://www.eecis.udel.edu/~ntp/ntp_spool/html/leap.htm.

[819]
D. Mills. Roaming with wireless LANs. Telecommunications [International Edition], 31(4):53-54, 1997.

[820]
Paul S. Miner. Verification of fault-tolerant clock synchronization systems. NASA Technical Paper 3349, November 1993.

[821]
Arash Mirbagheri and Young C. Yoon. A blind adaptive receiver for interference suppression and multipath reception in long-code DS-CDMA. In IEEE International Conference on Communications (ICC'02), pages 242-246, 2002.

[822]
Partho Mishra and Mani Srivastava. Effect of connection rerouting on application performance in mobile networks. IEEE Transactions on Computers, 47(4):371-390, 1998.

[823]
John C. Mitchell, Mark Mitchell, and Ulrich Stern. Automated analysis of cryptographic protocols using Mur phi . In Proceedings of the 1997 IEEE Symposium on Security and Privacy, pages 141-151, May 1997.

[824]
John C. Mitchell, Vitaly Shmatikov, and Ulrich Stern. Finite-state analysis of SSL 3.0 and related protocols. In Proceedings of the DIMACS Workshop on Design and Formal Verification of Security Protocols, Rutgers University, September 1997.

[825]
S. Miyamoto. Effect of microwave oven interference on the performance of digital radio communications systems. In 1997 IEEE International Conference on Communications. Towards the Knowledge Millennium. ICC '97. Conference Record (Cat. No.97CH36067), volume 1, pages 51-55, 1997.

[826]
M. Mizuno. A consideration on the application of spread spectrum techniques to shf and ehf mobile and indoor wireless communications. In Konferenz-Einzelbericht: VTC 1994, 1994 IEEE 44th Vehicular Technol. Conf., volume 1, pages 587-589, 1994.

[827]
Mitsuhiko Mizuno. Consideration on the application of spread spectrum techniques to shf and ehf mobile and indoor wireless communications. IEEE Vehicular Technology Conference, 1:587-589, 1994.

[828]
Michael Mock, Reiner Frings, Edgar Nett, and Spiro Trikaliotis. Clock synchronization for wireless local area networks. In 12th Euromicro Conference on Real-Time Systems, pages 183-189, 2000.

[829]
Michael Mock, Reiner Frings, Edgar Nett, and Spiro Trikaliotis. Continuous clock synchronization in wireless real-time applications. In 19th IEEE Symposium on Reliable Distributed Systems (SRDS'00), pages 125-132, 2000.

[830]
W. Melody Moh, Usha Rajgopal, and Asha Dinesh. Design, analysis, and evaluation of an improved scheme for atm burst-level admission control. Computer Communications, 20(12):1107-1122, 1997.

[831]
Refik Molva, Didier Samfat, and Gene Tsudik. Authentication protocol for mobile users. IEE Colloquium (Digest), 141:4/1-4/7, 1994.

[832]
EDS. Moreira, WS. Encinas, and ACB. Ramos. Bringing wireless video into networked multimedia systems. Displays-Technology and Applications, 17(3-4):207-215, 1997.

[833]
Kozo Morita and Hiroyuki Ohtsuka. New generation of wireless communications based on fiber-radio technologies. IEICE Transactions on Communications, 76(9):1061-1068, September 1993.

[834]
Yoram Moses and Orli Waarts. Coordinated traversal: (t+1)-round Byzantine agreement in polynomial time. In 29th Annual Symposium on Foundations of Computer Science, pages 246-255, 1988.

[835]
Yoram Moses and Orli Waarts. Coordinated traversal: (t+1)-round Byzantine agreement in polynomial time. Journal of Algorithms, 17:110-156, 1994.

[836]
J.G.O. Moss. Analysis of a ds-cdma receiver dll architecture. In 1996 IEEE 4th International Symposium on Spread Spectrum Techniques and Applications Proceedings. Technical Program. (Cat. No.96TH8210), volume 1, pages 460-464, 1997.

[837]
Anchour Mostefaoui, Eric Mourgaya, and Michel Raynal. Asynchronous implementation of failure detectors. In Proceedings of the International Conference on Dependable Systems and Networks (DSN'03), San Francisco, CA, June 22-25, 2003. (to appear).

[838]
N. Movahhedinia, G. Stamatelos, and H.M. Hafez. Slot assignment protocol for indoor wireless atm networks using the channel characteristics and the traffic parameters. Conference Record / IEEE Global Telecommunications Conference, 1:327-331, 1995.

[839]
John Muhonen and Robert C. Durst. Performance of transport protocols over satellite communication links. In Proceedings - IEEE Military Communications Conference MILCOM, volume 1, pages 263-269. IEEE, 1998.

[840]
Andrew Muir and J.J. Garcia-Luna-Aceves. An efficient packet sensing mac protocol for wireless networks. Mobile Networks and Applications, 3(2):221-234, 1998.

[841]
Sape Mullender. Distributed Systems. ACM Press/Addison Wesley, New York, 2nd ed. edition, 1993.

[842]
Jonathan P. Munson and Prasun Dewan. Sync - a java framework for mobile collaborative applications. Computer., 30(6):59ff, June 1997.

[843]
T. Murase, M. Tsukamoto, and S. Nishio. Active mobile database systems for mobile computing environments. IEICE Transactions on Information and Systems. E81D(5), pages 427-433, 1998.

[844]
Shree Murthy and J.J. Garcia-Luna-Aceves. Routing protocol for packet radio networks. Proceedings of the Annual International Conference on Mobile Computing and Networking, MOBICOM, pages 86-95, 1996.

[845]
Andrew Myles, David B. Johnson, and Charles Perkins. Mobile host protocol supporting route optimization and authentication. IEEE Journal on Selected Areas in Communications, 13(5):839-849, 1995.

[846]
Mahmoud Naghshineh and Marc Willebeek-LeMair. End-to-end qos provisioning in multimedia wireless/mobile networks using an adaptive framework. IEEE Communications Magazine., 35(11):72-81, November 1997.

[847]
Achim Nahler, Ralf Irmer, and Gerhard Fettweis. Reduced and differential parallel interference cancellation for CDMA systems. IEEE Journal on Selected Areas in Communications, 20(2):237-247, 2002.

[848]
Masao Nakagawa. Consumer communications based on spread spectrum techniques. IEEE International Symposium on Spread Spectrum Techniques and Applications, 1:138-145, 1994.

[849]
Tatsuo Nakajima and Akihiro Hokimoto. Adaptive continuous media applications in mobile computing environments. International Conference on Multimedia Computing and Systems-Proceedings 1997., pages 152-160, 1997.

[850]
A. Nakasuji, Y. Kitajima, T. Yoshioka, N. Hatada, and T. Watanabe. Inventory management system using wireless handy terminal. National Technical Report, 43(1):100-105, 1997.

[851]
Sanjiv Nanda, Richard Ejzak, and Bharat T. Doshi. Retransmission scheme for circuit-mode data on wireless links. IEEE Journal on Selected Areas in Communications, 12(8):1338-1352, 1994.

[852]
Sanjiv Nanda, Richard P. Ejzak, and Bharat T. Doshi. Proceedings of the 1994 ieee international conference on communications. Conference Record - International Conference on Communications, 1:587-592, 1994.

[853]
J. Naylon. Low-latency handover in a wireless atm lan. IEEE Journal on Selected Areas in Communications, 16(6):909-921, 1998.

[854]
Michael L. Needham and Kenneth J. Crisler. Qcra-a packet data multiple access protocol for esmr systems. IEEE Vehicular Technology Conference, 1:336-340, 1995.

[855]
Roger Needham and M. D. Schroeder. Authentication revisited. ACM Operating Systems Review, 21(1):7, January 1987.

[856]
Roger M. Needham. Denial of service: An example. Communications of the ACM, 37(11):42-46, November 1994.

[857]
G.J. Nelson. User interaction with machines on the move: location aware computing. Computers in Industry, 29:63-70, 1996.

[858]
B. Clifford Neuman and Stuart G. Stubblebine. A note on the use of timestamps as nonces. ACM Operating Systems Review, 27(2):10-14, April 1993.

[859]
Clifford Neuman, John Kohl, and Theodore T'so. The Kerberos network authentication service (V5), March 10, 2000. INTERNET-DRAFT, Expires September 10, 2000.

[860]
B. Clifford Neuman. Protection and security issues for future systems. In Arthur Karshmer and J. Nehmer, editors, Workshop on Operating Systems of the 90s and Beyond, LNCS 563, pages 184-201. Springer Verlag, July 8-12, 1991.

[861]
Peter G. Neumann. Inside risks: Denial-of-service attacks. Communications of the ACM, 43(4):136, 2000.

[862]
Nuno Neves and W. Kent Fuchs. Adaptive recovery for mobile environments. Communications of the ACM, 40(1):68-74, January 1997.

[863]
David Newman and Kevin Tolly. Wireless LANs: How far? how fast? Data Communications, 24(4):77-86, 1995.

[864]
Kevin Newman, David; Tolly. Mobile and personal communications research in the acts programme. IEE Colloquium (Digest) ISSN: 0963-3308, 188:5/1-3, 1994.

[865]
Sze Yao Ni, Yu Chee Tseng, Yuh Shyan Chen, and Jang Ping Sheu. The Broadcast Storm Problem in a Mobile Ad Hoc Network. In Proceedings of the fifth annual ACM/IEEE international conference on Mobile computing and networking, August 15-19, 1999.

[866]
S. E. Nikoletseas and P. G. Spirakis. Expander properties in random regular graphs with edge faults. In 12th Annual Symposium on Theoretical Aspects of Computer Science (STACS'95), pages 421 -- 432, Munich, Germany, 1995.

[867]
T. Ninomiya. 60-ghz transceiver for high-speed wireless lan system. 1996 IEEE MTT-S Internat. Microwave Symp. Digest, 2:1171-1174, 1997.

[868]
Eugene Nishinaga, John A. Evans, and Gregory L. Mayhew. Wireless advanced automatic train control. 1994 ASME/IEEE Joint Railroad Conference Proc 1994 ASME IEEE Jt Railroad Conf 1994, pages 31-46, 1994.

[869]
B.D. Noble, M. Price, and M. Satyanarayanan. A programming interface for application-aware adaptation in mobile computing. Proceedings of the Second USENIX Symposium on Mobile and Location-Independent Computing, pages 57-66, 1995.

[870]
Anthony R. Noerpel, Li Fung Chang, and Daniel J. Harasty. Radio link access procedure for a wireless access communications system. Conference Record - International Conference on Communications, 2:1111-1115, 1994.

[871]
Anthony R. Noerpel, Li Fung Chang, and Yi-Bing Lin. Polling deregistration for unlicensed pcs. IEEE Journal on Selected Areas in Communications, 14(4):728-734, 1996.

[872]
F. Nolot and V. Villain. Universal self-stabilizing phase clock protocol with bounded memory. In IEEE International Conference on Performance, Computing, and Communications, pages 228-235, 2001.

[873]
Sulaiman Mohd Nor, Ishak Ismail, and Jalan Semarak. Performance of csma-ca mac protocol for distributed radio local area networks. IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC, 2:912-914, 1995.

[874]
Masaya Norifusa. Internet security: Difficulties and solutions. International Journal of Medical Informatics, 49(1):69-74, March 1998.

[875]
Dalma Novak, Zaheer Ahmed, Rodney B. Waterhouse, and Rodney S. Tucker. Signal generation using pulsed semiconductor lasers for application in millimeter-wave wireless links. IEEE Transactions on Microwave Theory and Techniques, 43(9):2257-2262, September 1995.

[876]
Akiyoshi Ochi, Toru Atsumi, and Keiji Michine. Network applications for mobile computing. Fujitsu Scientific and Technical Journal, 34(1):41-49, September 1998.

[877]
K. Ohata. Sixty-ghz-band ultra-miniature monolithic t/r modules for multimedia wireless communication systems. 1996 IEEE MTT-S Internat. Microwave Symp. Digest, 44(2):2354-2360, 1997.

[878]
Tomoki Ohsawa and Gerald Q. Jr. Maguire. Capacity effect of bridging functionality applied to wireless packet datalink. IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC, 3:1073-1077, 1995.

[879]
K. Ohta, T. Watanabe, and T. Mizuno. Selective multimedia access protocol for wireless multimedia communication. In 1997 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing, PACRIM. 10 Years Networking the Pacific Rim, 1987-1997 (Cat. No.97CH36060)., volume 1, pages 81-84. IEEE, 1997.

[880]
T. Okada. Vj25 system: 19-ghz high-speed wireless lan system. NTT Review, 9(1):86-92, 1997.

[881]
G. Okamoto and Xu. Guanghan. Multimedia communications over wireless lans via the swl protocol. Proceedings of the Thirtieth Hawaii International Conference on System Sciences, 5:54-63, 1997.

[882]
N. Okazaki, Rang-Park Mi, A. Watanabe, S. Seno, T. Ideguchi, and M. Yabe. Realization method of flexible private network system. Transactions of the Institute of Electrical Engineers of Japan, Part C, 120:1242-1249, August 2000.

[883]
Alan Olson and Kang G. Shin. Fault-tolerant clock synchronization in large multicomputer systems. IEEE Transactions on Parallel and Distributed Systems, 5(9):912-923, September 1994.

[884]
Alan Olson and Kang G. Shin. Probabilistic clock synchronization in large distributed systems. IEEE Transactions on Computers, 43(9):1106-1112, September 1994.

[885]
Alan Olson, Kang G. Shin, and Bruno J. Jambor. Fault-tolerant clock synchronization for distributed systems using continuous synchronization messages. In 25th International Symposium on Fault-Tolerant Computing, pages 154-163, 1995.

[886]
PE. Omiyi and T. O'Farrell. Throughput analysis of novel cdma-based mac protocol for wireless lans. Electronics Letters, 34(12):1201-1202, 1998.

[887]
Peter E. Omiyi and Timothy O'Farrell. Throughput and delay analysis of a novel slotted cdma mac protocol for multimedia communication in wireless lans. In IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC, volume 2, pages 570-574. IEEE, 1998.

[888]
Keith K. Onodera and Paul R. Gray. A 75 mw 128 mhz ds-cdma baseband correlator for high-speed wireless applications. 1997 Symposium on VLSI Circuits. Digest of Papers (IEEE Cat. No.97CH36115), pages 117-118, 1997.

[889]
Keith K. Onodera and Paul R. Gray. A 75-mw 128-mhz ds-cdma baseband demodulator for high-speed wireless applications [lans]. IEEE Journal of Solid-State Circuits, 33(5):753-761, May 1998.

[890]
F. Owen and C. Geoffray. DECT standard in local loop access applications. IEE Conference Publication, 386, 1993.

[891]
S. Owre, S. Rajan, J.M. Rushby, N. Shankar, and M.K. Srivas. PVS: Combining specification, proof checking, and model checking. In Alur and Henzinger [27], pages 411-414.

[892]
S. Pagliaro and R. Winkler. Design of a medium access control protocol for wireless atm access networks. In Proceedings of UCSD WC '98 1st Annual UCSD Conference on Wireless Communications. San Diego, CA, USA. 8-10 March 1998, pages 103-109, 1998.

[893]
Kaveh Pahlavan and Aram Falsafi. Trends in local wireless data networks. IEEE Vehicular Technology Conference, 1:21-25, 1996.

[894]
Kaveh Pahlavan and Prashant Krishnamurthy. Principles of Wireless Networks. Prentice Hall PTR, 2002.

[895]
Kaveh Pahlavan and Prashant Krishnamurthy. Principles of Wireless Networks: A Unified Approach. Prentice Hall PTR, Upper Saddle River, New Jersey, 2002.

[896]
Kaveh Pahlavan, Thomas H. Probert, and Mitchell E. Chase. Trends in local wireless networks. IEEE Communications Magazine, pages 88-95, March 1995.

[897]
Algirdas Pak v stas and Sonata Pak v stiene. Standards: NSK: A Norwegian cryptochip for supersafe communications. Computer, 29(2):78-79, February 1996.

[898]
Kuang Hung Pan, Hsiao Kuang Wu, Rung Ji Shang, and Feipei Lai. Performance analysis of broadcast in mobile ad hoc networks with synchronized and non-synchronized reception. Computer Communications, 23(5-6), March 1, 2000.

[899]
Titsa Papantoni-Kazakos, Nikolay B. Likhanov, and Boris S. Tsybakov. Protocol for random multiple access of packets with mixed priorities in wireless networks. IEEE Journal on Selected Areas in Communications, 13(7):1324-1331, 1995.

[900]
Marina Papatriantafilou and Philippas Tsigas. Self-stabilizing wait-free clock synchronization. Technical Report CS-R9421, Centrum voor Wiskunde and Informatica, Netherlands, 1994.

[901]
A.J. Parfitt, D.W. Griffin, and P.H. Cole. Monolithic integrated antenna design for millimetre-wave wireless local area network systems. ournal of Electrical and Electronics Engineering, Australia, 15(2):137-144, 1995.

[902]
Vincent D. Park and M. Scott Corson. A highly adaptive distributed routing algorithm for mobile wireless networks. In IEEE Infocom '97 - 16th Conference on Computer Communications. IEEE, 1997.

[903]
Se Hyun Park, Aura Ganz, and Zvi Ganz. Security protocol for ieee 802.11 wireless local area network. Mobile Networks and Applications, 3(3):237-246, 1998.

[904]
Se Hyun Park, Aura Ganz, and Zvi Ganz. Security protocol for IEEE 802.11 wireless local area network. Mobile Networks and Applications, 3(3):237-246, 1998.

[905]
DongGook Park, JungJoon Kim, Colin Boyd, and Ed Dawson. Cryptographic salt: A countermeasure against denial-of-service attacks. In 6th Australasian Conference on Information Security and Privacy (ACISP'01), LNCS 2119, pages 344-343, July11-13, 2001.

[906]
Jaegwan Park, Jaeseung Go, and Kwangjo Kim. Wireless authentication protocol preserving user anonymity. In 4th International Symposium on Wireless Personal Multimedia Communications (WPMC'01), pages 1153-1158, September 9-12, 2001.

[907]
Alberto Partida and Diego Andina. Applied cryptography in java. In IEEE Annual International Carnahan Conference on Security Technology, Proceedings 1999, pages 345-348. IEEE, October 1999.

[908]
Subodh S. Parulekar. A simulation approach to the performance evaluation of a broadband indoor wireless network. MAI 36/02 p. 601, 36(2):601, 1998.

[909]
N. Passas, L. Merakos, and D. Skyrianoglou. Traffic scheduling in wireless atm networks. In IEEE ATM '97 Workshop Proceedings (Cat. No.97TH8316)., pages 391-400. IEEE, 1997.

[910]
Nikos Passas, Lazaros Merakos, Dimitris Skyrianoglou, Frédéric Bauchot, Gérard Marmigère, and Stéphane Decrauzat. Mac protocol and traffic scheduling for wireless atm networks. Mobile Networks and Applications, 3(3):275-292, 1998.

[911]
G. Passiopoulos. Integrated endfire sectored antennas for microwave and millimeter wave lans. In Tenth International Conference on Antennas and Propagation, volume 1, pages 394-398, 1997.

[912]
D. Patiyoot and S.J. Shepherd. Techniques for authentication protocols and key distribution on wireless atm networks. Operating Systems Review, 32(4):25-32, 1998.

[913]
S. Paul, E. Ayanoglu, T.F. La Porta, K.-W.H. Chen, K.K. Sabnani, and R.D. Gitlin. Asymmetric protocol for digital cellular communications. Proceedings - IEEE INFOCOM, 3:1053-1062, 1995.

[914]
Lawrence C. Paulson. Inductive analysis of the internet protocol TLS. Technical Report 440, Computer Laboratory, University of Cambridge, England, December 16, 1997.

[915]
Lawrence C. Paulson. On two formal analyses of the Yahalom protocol. Technical Report 432, Computer Laboratory, Cambridge University, July 1997.

[916]
Lawrence C. Paulson. The inductive approach to verifying cryptographic protocols. Journal of Computer Security, 6:85-128, 1998.

[917]
Cem Paya. A framework for world wide web client-authentication protocols. Technical Report PCS-TR98-328, Dartmouth College, Computer Science, Hanover, NH, USA, March 1998.

[918]
M. Pease, R. Shostak, and L. Lamport. Reaching agreement in the presence of faults. Journal of the ACM, 27(2):228-234, April 1980.

[919]
David Peleg. Distributed Computing: A Locality-Sensitive Approach. SIAM Society for Industrial and Applied Mathematics Monographs on Discrete Mathematics ans Applications, Philadelphia, 2000.

[920]
David Pensak and Mike Grandinetti. Internet and beyond: security data across the enterprise. International Journal of Network Management, 5(6):305-312, November 1995.

[921]
R. Perez-Jimenez. 2mbit/s fqpsk-2 modem for infrared wireless lan. Electronics Letters, 32(20):1848-1849, 1996.

[922]
R. Perezjimenez, MJ. Betancor, and VM. Melian. Improved ppm schemes for ir-wireless lan. Electronics Letters., 10(32):885-887, 1996.

[923]
R. Perezjimenez, JA. Rabadan, and MJ. Betancor. 2mbit/s fqpsk-2 modem for infrared wireless lan. Electronics Letters., 20(32):1848-1849, 1996.

[924]
Charles E. Perkins and Tangirala Jagannadh. Dhcp for mobile networking with tcp/ip. IEEE Symposium on Computers and Communications - Proceedings, pages 255-261, 1995.

[925]
Charles E. Perkins. Mobile networking in the internet. Mobile Networks and Applications, 3(4):319-334, 1998.

[926]
Charles E. Perkins. Service location protocol for mobile users. In IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC, volume 1, pages 141-146. IEEE, 1998.

[927]
H.-C. Perle. Fairness of a decentralized rlan based on asynchronous ds/cdma. In Seventh IEEE International Symposium on Personal, Indoor and Mobile Radio Communications. PIMRC'96 (Cat. No.96TH8240), volume 2, pages 653-657, 1997.

[928]
Adrian Perrig and Dawn Xiaodong Song. A first step on automatic protocol generation. In Proceedings of Network and Distributed System Security, February 2000.

[929]
Adrian Perrig and Dawn Xiaodong Song. Looking for diamonds in the dessert --- extending automatic protocol generation to three-party authentication and key distribution. In Proc. of IEEE Computer Security Foundation Workshop, July 2000.

[930]
Y. Kim. A. Perrig and G. Tsudik. Simple and fault-tolerant key agreement for dynamic collaborative groups. In ACM CCS'2000, November 2000.

[931]
Y. Kim. A. Perrig and G. Tsudik. Communication-efficient group key agreement. In IFIP-SEC 2001, June 2001.

[932]
Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, and J. Doug Tygar. SPINS: Security suite for sensor networks. In Conference on Mobile Computing and Networking (MOBICOM'01), July16-21, 2001.

[933]
Kenneth J. Perry and Sam Toueg. Distributed agreement in the presence of processor and communication faults. IEEE Transactions on Software Engineering, SE-12(3):477-482, March 1986.

[934]
Holger Pfeifer, Detlef Schwier, and Friedrich W. von Henke. Formal verification for time-triggered clock synchronization. Dependable Computing for Critical Applications, 7:207-226, 1999.

[935]
M. J. Pfluegl and D. M. Blough. Evaluation of a new algorithm for fault-tolerant clock synchronization. In Proceedings Pacific Rim Internation Symposium on Fault Tolerant Systems, pages 38-43, Kawasaki, Japan, September 1991.

[936]
L. Philipsand, I. Bolsens, and H. De Man. A programmable cdma if transceiver asic for wireless communications. Conf. Title: Proceedings of the IEEE 1995 Custom Integrated Circuits Conference, pages 307-310, 1995.

[937]
Roman Pichna and Qiang Wang. Mac protocol for the integrated wireless access network. IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC, 1:248-252, 1995.

[938]
Roman Pichna, Qiang Wang, and Vijay K. Bhargava. Performance of cellular packet cdma carrying two types of traffic. IEEE Pacific RIM Conference on Communications, Computers, and Signal Processing - Proceedings 1995, pages 453-456, 1995.

[939]
S. S. Pinter and I. Shinahr. Distributed agreement in the presence of communication and process failures. In Proceedings of the 14th IEEE Convention of Electrical & Electronics Engineers in Israel. IEEE, March 1985.

[940]
E. Pitoura and B. Bhargava. Revising transaction concepts for mobile computing. Proceedings. Workshop on Mobile Computing Systems and Applications, pages 164-168, 1995.

[941]
Stephen Ponzio and Ray Strong. Semisynchrony and real time. In Proceedings of the 6th International Workshop on Distributed Algorithms (WDAG'92), pages 120-135, November 1992.

[942]
S. Ponzio. The real-time cost of timing uncertainty: Consensus and failure detection. Master's thesis, Massachusetts Institute of Technology, May 1991.

[943]
S. Pope. Application migration for mobile computers. Proceedings. Third International Workshop on Services in Distributed and Networked Environments, pages 20-26, 1996.

[944]
Guido Post and Oliver Mauss. Control and data flow aspects in the design of a wireless data radio modem: A case study. ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings, 6:3201-3204, 1996.

[945]
David Powell, André Adelsbach, and Christian Cachin. MAFTIA (malicious- and accidental-fault tolerance for Internet applications). In International Conference on Dependable Systems and Networks (DSN'01), pages D-32 -- D-35, July 1-4, 2001.

[946]
David Powell. Failure mode assumptions and assumption coverage. In Proc. 22nd IEEE Int. Symp. on Fault-Tolerant Computing (FTCS-22), pages 386-395, Boston, MA, USA, 1992. (Revised version available as LAAS-CNRS Research Report 91462, 1995).

[947]
P. Pradhan and Tzi-Cker Chiueh. Real-time performance guarantees over wired/wireless lans. Proceedings. Fourth IEEE Real-Time Technology and Applications Symposium, pages 29-38, 1998.

[948]
R. Prasad, H.R.R. van Roosmalen, and J.A.M. Nijhof. Cdma, isma and hybrid cdma/isma for iwcc. IEE Colloquium (Digest), 098:11/1-7, 1994.

[949]
Francesco Delli Priscoli. Mac and interworking layers for an atm wireless system. Wireless Personal Communications, 9(2):113-147, 1999.

[950]
Michael O. Rabin. Randomized Byzantine Generals. In Proceedings of the 24th Annual IEEE Symposium on Foundations of Computer Science, pages 403-409, 1983.

[951]
Lawrence R. Rabiner. Applications of voice processing to telecommunications. Proceedings of the IEEE, 82(2):199-228, February 1994.

[952]
L. Rademacher and B. Tunstall. Virtual private networks: building secure data tunnels through the internet. EDPACS, 26(1):1-6, July 1998.

[953]
Safa Rahimi-Movaghar. Comparison of protocol frameworks. Diplomarbeit, Technische Universität Wien, September 2002.

[954]
Sudhir Ramakrishna and Jack M. Holtzman. Interaction of tcp and data access control in an integrated voice/data cdma system. Mobile Networks and Applications, 3(4):409-417, 1998.

[955]
Ram Ramanathan and Regina Hain. Topology control of multihop wireless networks using transmit power adjustment. In Proceedings IEEE (INFOCOM'02), volume 2, pages 404-413, 2000.

[956]
Parameswaran Ramanathan and Kuang-Ching Wang. Multiuser receiver aware multicast protocols for wireless ad-hoc networks. In Proceedings of the 2001 ACM International Symposium on Mobile ad hoc networking & computing, pages 291-294. ACM Press, 2001.

[957]
P.B. Rapajic. Performance analysis of slotted aloha/cdma system with adaptive mmse receivers. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E80-A(12):2485-2492, 1997.

[958]
Theodore S. Rappaport, Brian D. Woerner, Jeffrey H. Reed, and William H. Tranter, editors. Wireless Personal Communications -- Improving Capacity, Services, and Reliability. Number ISBN 0-7923-8017-7 in The Kluwer International Series in Engineering and Computer Science Volume 424. Kluwer Academic Publishers, Boston, 1997.

[959]
Dipankar Raychaudhuri and Newman D. Wilson. Atm-based transport architectures for multiservices wireless personal communication networks. IEEE Journal on Selected Areas in Communications, 12(8):1401-1414, 1994.

[960]
Dipankar Raychaudhuri, Leslie J. French, Robert J. Siracusa, Subir K. Biswas, Ruixi Yuan, Parthasarathy Narasimhan, and Cesar A. Johnston. Watmnet - a prototype wireless atm system for multimedia personal communication. IEEE Journal on Selected Areas in Communications, 15(1):83-95, January 1997.

[961]
Michel Raynal. A case study of agreement problems in distributed systems: non-blocking atomic commitment. In Proceedings of High-Assurance Systems Engineering Workshop, pages 209-214, Aug 1997.

[962]
Ola Redell and Martin Sanfridson. Exact best-case response time analysis of fixed priority scheduled tasks. In Proceedings of the 14th Euromicro Workshop on Real-Time Systems, pages 165-172, June 2002.

[963]
Rüdiger Reischuk. A new solution for the Byzantine generals problem. Information and Control, 64(1-3):23-42, January-March 1985.

[964]
M. Reiter and A. Rubin. Crowds: Anonymity for web transactions. In ACM TISSEC, June 1999.

[965]
Michael K. Reiter, Kenneth P. Birman, and Li Gong. Integrating security in a group oriented distributed system. Technical Report TR92-1269, Cornell University, Computer Science, February 1992.

[966]
Michael K. Reiter. A security architecture for fault-tolerant systems. Master's thesis, Cornell University, Computer Science, July 1993. available as Technical Report TR93-1367.

[967]
Michael K. Reiter. Secure agreement protocols: Reliable and atomic group multicast in Rampart. In Proceedings of the 2nd ACM Conference on Computer and Communications Security, pages 68-80, November 2-4, 1994.

[968]
Michael K. Reiter. A secure group membership protocol. IEEE Transactions on Software Engineering, 22(1):31-42, January 1996.

[969]
Livio Ricciulli, Patrick Lincoln, and Pankaj Kakkar. TCP SYN flooding defense. In Simulation Multiconference CNDS'99, January 17-20 1999.

[970]
T. Riley. Modeling of licensed PCS self-interference. In Military Communications Conference (MILCOM'01), pages 408-412, October 28-31, 2001.

[971]
Tapani Ristaniemi and Jyrki Joutsensalo. Iterative algorithms for blind interference suppression in CDMA. In 2nd IEEE Workshop on Signal Processing Advances in Wireless Communications (SPAWC'99), pages 203-206, 1999.

[972]
G. Riva. Characterization of mm-wave indoor propagation with directive antennas. In 27th European Microwave 97 Conference and Exhibition. Bridging the Gap Between Industry and Academia., volume 1, pages 130-134, 1997.

[973]
Ronald L. Rivest and Butler Lampson. SDSI -- A simple distributed security infrastructure. In Presented at CRYPTO'96 Rumpsession, 1996.

[974]
Ronald L. Rivest, A. Shamir, and L. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(12):120-126, February 1978.

[975]
Ronald L. Rivest. RFC 1321: The MD5 message-digest algorithm, April 1992.

[976]
Ohad Rodeh, Ken Birman, Mark Hayden, and Danny Dolev. Dynamic virtual private networks. Technical Report TR98-1695, Cornell University, Computer Science, August 1998.

[977]
Volkan Rodoplu and Teresa H. Meng. Position based CDMA with multiuser detection (P-CDMA/MUD) for wireless ad hoc networks. In Proc. IEEE Sixth International Symposium on Spread Spectrum Techniques and Applications, pages 336-340, Parsippany, NJ, USA, 2000.

[978]
Luis Rodrigues, Mário Guimarães, and José Rufino. Fault-tolerant clock synchronization in CAN. In 19th IEEE Real-Time Systems Symposium, pages 420-429, 1998.

[979]
Chris Romans and Jean Tourrilhes. Medium access protocol for wireless lans which supports isochronous and asynchronous traffic. In IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC, volume 1, pages 147-152. IEEE, 1998.

[980]
Kay Römer. Time synchronization in ad hoc networks. In Proceedings of MobiHoc 2001, October 2001.

[981]
A. W. Roscoe and M. H. Goldsmith. The perfect ``spy'' for model-checking cryptoprotocols. In Proceedings of the DIMACS Workshop on Design and Formal Verification of Security Protocols, Rutgers University, September 1997.

[982]
A. W. Roscoe. Intensional specifications of security protocols. In 9th IEEE Computer Security Foundation Workshop, pages 28-38, 1996.

[983]
Eric Carl Rosen. Evaluating digital video stream transmission via packetized wireless channels (compression, codecs, image processing). DAI-B 57/11, p. 7052, 1997.

[984]
A.H.M. Ross. Cdma for wireless local loop. Conf. Title: Wireless Computer Communication. Emerging Business Opportunities. Papers Presented at the International Conference on Wireless Computer Communication: Emerging Business Opportunities (Infocom'94), pages 72-86, 1994.

[985]
Anirban Roy and Pallapa Venkataram. A multiple access scheme for vbr traffic in broadband wireless local communication. Computer Communications, 22(4):353-360, 1999.

[986]
Elisabeth M. Royer and Charles E. Perkins. Multicast Operation of the Ad-hoc On-Demand Distance Vector Routing Protocol. In Proceedings of the fifth annual ACM/IEEE international conference on Mobile computing and networking, August 15-19, 1999.

[987]
A. Royo, J. Moron, and J. López. Design and implementation of a coprocessor for cryptography applications. In Proceedings of European Design & Test Conference, 1997.

[988]
A. D. Rubin and Peter Honeyman. Formal methods for the analysis of authentication protocols. Technical Report CITI TR 93-7, University of Michigan, Ann Arbor, MI, USA, October 1993.

[989]
A. D. Rubin and Peter Honeyman. Long running jobs in an authenticated environment. In Proceedings of the Fourth USENIX UNIX Security Symposium, September 1993.

[990]
A. D. Rubin and Peter Honeyman. Long running jobs in an authenticated environment. Technical Report CITI TR 93-1, University of Michigan, Ann Arbor, MI, USA, March 1993. (appeared in Proc. Fourth USENIX UNIX Security Symp.).

[991]
A. D. Rubin. Nonmonotonic cryptographic protocols. Technical Report CITI TR 93-9, University of Michigan, Ann Arbor, MI, USA, November 1993. (appeared in Proc. IEEE Comp. Security Foundations Workshop VII).

[992]
A. D. Rubin. Nonmonotonic cryptographic protocols. In Proceedings of the 7th IEEE Computer Security Foundation Workshop, June 1994.

[993]
Aviel D. Rubin. Extending ncp for protocols using public keys. Mobile Networks and Applications, 2(3):227-241, 1997.

[994]
M. Rude, T. Rupp, K. Matsumoto, S. Sutedjo, and S. Yuta. Iron: An inter robot network and three examples on multiple mobile robots' motion coordination. IEEE International Conference on Intelligent Robots and Systems, 3:1437-1444, 1997.

[995]
Ekkart Rudolph, Peter Graubmann, and Jens Grabowski. Tutorial on Message Sequence Charts.

[996]
John Rushby and Friedrich von Henke. Formal verification of algorithms for critical systems. In Proceedings of the ACM SIGSOFT '91 Conference on Software for Critical Systems, pages 1-15, 1991.

[997]
John M. Rushby and Friedrich von Henke. Formal verification of algorithms for critical systems. IEEE Transactions on Software Engineering, 19(1):13-23, January 1993. Special Issue on Software for Critical Systems.

[998]
John Rushby. Formal verification of an oral messages algorithm for interactive consistency. Technical Report CSL-92-01, Computer Science Laboratory, SRI International, Menlo Park, CA, July 1992.

[999]
John Rushby. Systematic formal verification for fault-tolerant time-triggered algorithms. IEEE Transactions on Software Engineering, 25(5):651-660, September 1999.

[1000]
John Rushby. Formal verification of hybrid Byzantine agreement under link faults. Technical report, Computer Science Laboratory, SRI International, Menlo Park, CA, 2001. Available at http://www.csl.sri.com/~rushby/abstracts/byzlinks01.html.

[1001]
Peter Ryan and Irfan Zakiuddin. Modelling and analysis of security protocols. In DIMACS Workshop on Design and Formal Verification of Security Protocols, page 22 pages, September 3-5, 1997.

[1002]
C.A. Rypinski. Motivation for centralized wireless lan functions. PIMRC '92. The Third IEEE International Symposium on Personal, Indoor and Mobile Radio Communications Proceedings, pages 153-158, 1994.

[1003]
Jung Hee Ryu and Dong Ho Cho. A new routing scheme concerning power-saving in mobile ad-hoc networks. In 2000 IEEE International Conference on Communications. ICC 2000. Global Convergence Through Communications., 2000.

[1004]
S.V. Krishnamurthy S. Agarwal, R.H. Katz and S.K. Dao. Distributed power control in ad-hoc wireless networks. In IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, volume 2, pages 59-66, 2001.

[1005]
Hassen Saïdi. The Invariant Checker: Automated deductive verification of reactive systems. In Orna Grumberg, editor, Computer-Aided Verification, CAV'97, volume 1254, pages 436-439, Haifa, Israel, June 1997. Springer-Verlag.

[1006]
A.K. Salkintzis, J.E. Plevridis, C.S. Koukourlis, and C. Chamzas. Design and implementation of a low-cost wireless network for remote control and monitoring applications. Microprocessors and Microsystems, 21(2):79-88, 1997.

[1007]
Karri-Tuomas Salli, Timo Hamalainen, Jarno Knuutila, and Jukka Saarinen. Security design for a new wireless local area network tutwlan. In IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC, volume 3, pages 1540-1544. IEEE, 1998.

[1008]
Yukitoshi Sanada and Masao Nakagawa. Power control techniques in a multihop CDMA packet radio network. In Spread Spectrum Techniques and Applications Proceedings, volume 3, pages 1162-1166, 1996.

[1009]
Y. Sanada, K. Seki, Q. Wang, S. Kato, M. Nakagawa, and V.K. Bhargava. A transmission power control technique on a tdd-cdma/tdma system for wireless multimedia networks. Zeitschriftenaufsatz: IEICE Transactions on Communications, E78-B(8):1095-1104, 1995.

[1010]
Janche Sang, C.-H.M. Lin, S. Varadaraja, and Mu-Cheng Wang. Distributed network computing over wireless links. Proceedings. 1997 International Conference on Parallel and Distributed Systems, pages 252-259, 1997.

[1011]
Chandrasekar Sankaran and Anthony Ephremides. Multicasting with multiuser detection in ad-hoc wireless networks. In Proc. International Zurich Seminar on Broadband Communications, pages 47-54, Zurich, Switzerland, 2000.

[1012]
Chandrasekar Sankaran and Anthony Ephremides. Multicasting with multiuser detection in ad-hoc wireless networks. In International Zurich Seminar on Broadband Communications, pages 47-54, 2000.

[1013]
GJ. Santivanez and JR. Boisson de Marca. D-rama: a new deterministic mac protocol for wireless multimedia communications. In Waves of the Year 2000+ PIMRC '97. The 8th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications. Technical Program, Proceedings (Cat. No.97TH8271)., volume 3, pages 1043-1048. IEEE, 1997.

[1014]
N. Santoro and P. Widmayer. Time is not a healer. In Proc. 6th Annual Symposium on Theor. Aspects of Computer Science (STACS'89), LNCS 349, pages 304-313, Paderborn, Germany, February 1989. Springer-Verlag.

[1015]
Hikmet Sari. Broadband radio access to homes and businesses: Mmds and lmds. Computer Networks, 31(4):379-393, 1999.

[1016]
D. V. Sarwate and M. B. Pursley. Crosscorrelation properties of pseudorandom and related sequences. In Proceedings of the IEEE, volume 68, pages 593-619, May 1980.

[1017]
Elton Saul and Andrew Hutchison. SPEAR II. In South African Telecommunications, Networks and Applications Conference (SATNAC'99), September 6-8, 1999.

[1018]
E. Saul and A.C.M. Hutchison. An environment to facilitate the teaching of GNY-based security protocol analysis techniques. In Proceedings of the Second World Conference in Information Security Education, pages 285-305, July 2001.

[1019]
E. Saul and A.C.M. Hutchison. Using GYPSIE, GYNGER and Visual GNY to analyze cryptographic protocols in SPEAR II. In Proceedings of the Eighth Annual Working Conference on Information Security Management and Small Systems Security, September 2001.

[1020]
Hasan M. Sayeed, Marwan Abu-Amara, and Hosame Abu-Amara. Optimal asynchronous agreement and leader election algorithm for complete networks with Byzantine faulty links. Distributed Computing, 9(3):147-156, 1995.

[1021]
A. Schill, B. Bellmann, W. Bohmak, and S. Kummel. Infrastructure support for cooperative mobile environments. Proceedings of the Fourth Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises. WET ICE '95, pages 171-178, 1995.

[1022]
M. Schinke. A new generation of 3 v front end solutions for wireless communication based on silicon and gaas mmics. ITG-Fachberichte, pages 163-171, 1997.

[1023]
Ulrich Schmid and Christof Fetzer. Randomized asynchronous consensus with imperfect communications. Technical Report 183/1-120, Department of Automation, Technische Universität Wien, January 2002.

[1024]
Ulrich Schmid and Christof Fetzer. Randomized asynchronous consensus with imperfect communications. In 22nd Symposium on Reliable Distributed Systems (SRDS'03), October 6-8, 2003. (to appear).

[1025]
Ulrich Schmid and Bettina Weiss. Consensus with oral/written messages: Link faults revisited. Technical Report 183/1-110, Department of Automation, Technische Universität Wien, February 2001. (obsolete, replaced by TR 183/1-124).

[1026]
Ulrich Schmid and Bettina Weiss. Synchronous Byzantine agreement under hybrid process and link failures. Technical Report 183/1-124, Department of Automation, Technische Universität Wien, November 2002. (submitted; replaces TR 183/1-110).

[1027]
Ulrich Schmid and Bettina Weiss. Impossibility results and lower bounds for consensus under link failures. Technical Report 183/1-129, Department of Automation, Technische Universität Wien, April 2003. (submitted).

[1028]
Ulrich Schmid, Bettina Weiss, and John Rushby. Formally verified byzantine agreement in presence of link faults. In 22nd International Conference on Distributed Computing Systems (ICDCS'02), pages 608-616, July 2-5, 2002.

[1029]
Ulrich Schmid. Basic features of the wireline/wireless factory/facility fieldbus. Technical Report 183/1-95, Department of Automation, Technische Universität Wien, August 1999.

[1030]
Ulrich Schmid. A perception-based fault model for single-round agreement algorithms. Technical Report 183/1-108, Technische Universität Wien, Department of Automation, October 2000.

[1031]
Ulrich Schmid. Report on 3 years of START-project Y41-MAT. Technical Report 183/1-100, Department of Automation, Technische Universität Wien, February 2000.

[1032]
Ulrich Schmid. How to model link failures: A perception-based fault model. In Proceedings of the International Conference on Dependable Systems and Networks (DSN'01), pages 57-66, Göteborg, Sweden, July 1-4, 2001.

[1033]
Steve Schneider. Verifying authentication protocols with CSP. In 10th IEEE Computer Security Foundation Workshop, pages 3-17, 1997.

[1034]
Bruce Schneier and John Kelsey. Remote auditing of software outputs using a trusted coprocessor. Future Generation Computer Systems, 13(1):9-18, 1997.

[1035]
Bruce Schneier and Mudge. Cryptanalysis of Microsoft's point-to-point tunneling protocol (PPTP). In Proceedings of the 5th ACM Conference on Computer and Communications Security, pages 132-141, San Francisco, CA, USA, November 2-5, 1998.

[1036]
Bruce Schneier. Applied Cryptography. John Wiley & Sons, second edition, 1996.

[1037]
Bruce Schneier. Applied Cryptography: Protocols, Algorithms, and Source Code in C. John Wiley & Sons, second edition, 1996.

[1038]
Robert Schober, Wolfgang H. Gerstacker, and Alexander Lampe. Noncoherent MMSE interference suppression for DS-CDMA. IEEE Transactions on Communications, 50(4):577-587, April 2002.

[1039]
Gregory D. Schumacher. Multimedia conversion and storage in the pcs environment. Proceedings of SPIE - The International Society for Optical Engineering, 2602:255-262, 1996.

[1040]
Keith Scott and Nicholas Bambos. Self-organizing wireless network (swan) protocol for communication among mobile users. Conference Record / IEEE Global Telecommunications Conference, 1:355-359, 1996.

[1041]
Peter Seidenberg and Matthias Lott. Analysis of the inter-system-interference with respect to the required minimum frequency separation. In Papers presented at the 4th Cost259 Meeting, 1998.

[1042]
K. Seki, Y. Sanada, Q. Wang, S. Kato, and V.K. Bhargava. A wireless multimedia network on time division duplex cdma/tdma. In Conf. Title: IEEE Pacific Rim Conference on Communications, Computers, and Signal Processing., pages 441-444, 1995.

[1043]
Gisbert W. Selke. Kryptographie: Verfahren, Ziele, Einsatzmöglichkeiten. O'Reilly Verlag, 2000. (german).

[1044]
A.B. Sesay and M.R. Gibbard. Asymmetric signal processing for indoor wireless lans. IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC, 1:6-10, 1995.

[1045]
Peter Sewell and Jan Vitek. Secure composition of insecure components. In Proceedings of the 12th IEEE Computer Security Foundation Workshop, June 1999.

[1046]
Peter Sewell and Jan Vitek. Secure composition of insecure components. Technical Report 463, Computer Laboratory, University of Cambridge, April 1999.

[1047]
Mehul Shah and Paul G. Flikkema. Power conserving centralized organization of ad hoc wireless networks. International Journal of Communication Systems, 12, 1999.

[1048]
A. Shamir. How to share a secret. Communications of the ACM, 22:612-613, 1979.

[1049]
M. Shand and J. Vuillemin. Fast implementations of RSA cryptography. In Proceedings of the 11th IEEE Symposium on Computer Arithmetic, pages 252-259, 1993.

[1050]
George She. Gps-based mobile information service over mobitex networks. Proceedings of ION GPS, 2:1375-1383, 1997.

[1051]
Vitaly Shmatikov and John C. Mitchell. Analysis of a fair exchange protocol. In Proceedings of the 1999 FLoC Workshop on Formal Methods and Security Protocols, Trento, Italy, 1999.

[1052]
Victor Shoup. Practical threshold signatures. In Proc. Eurocrypt 2000, 1999.

[1053]
Isaac Shpantzer, Larry Schoenfeld, Merv Grindahl, and Vladimir Kelman. Keyware: an open wireless distributed computing environment. Proceedings of SPIE - The International Society for Optical Engineering, 2601:23-112, 1995.

[1054]
Rolf Sigle and Thomas Renger. Fair queueing wireless atm mac protocols. In IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC, volume 1, pages 55-59. IEEE, 1998.

[1055]
B. Simons, Jennifer L. Welch, and Nancy Lynch. An overview of clock synchronization. In Fault-Tolerant Distributed Computing, LNCS 448, pages 84-96, 1990.

[1056]
Suresh Singh and C.S. Raghavendra. Power efficient mac protocol for multihop radio networks. In IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC, volume 1, pages 153-157. IEEE, 1998.

[1057]
Gurdip Singh. Leader election in the presence of link failures. IEEE Transactions on Parallel and Distributed Systems, 7(3):231-236, March 1996.

[1058]
P. Sinha, N. Venkitaraman, T. Nandagopal, R. Sivakumar, and V. Bharghavan. A wireless transmission control protocol for CDPD. In IEEE Wireless Communications and Networking Conference, September 1999.

[1059]
P. Sinha, N. Venkitaraman, R. Sivakumar, and V. Bharghavan. WTCP: A reliable transport protocol for wireless wide-area networks. In ACM Mobicom '99, August 1999.

[1060]
Hin-Sing Siu, Yeh-Hao Chin, and Wei-Pang Yang. Byzantine agreement in the presence of mixed faults on processors and links. IEEE Transactions on Parallel and Distributed Systems, 9(4):335-345, April 1998.

[1061]
Sean W. Smith and Steve Weingart. Building a high-performance, programmable secure coprocessor. Computer Networks, 31:831-860, 1999.

[1062]
Sean W. Smith, Ron Perez, Steve H. Weingart, and Vernon Austel. Validating a high-performance, programmable secure coprocessor. In 22nd National Information Systems Security Conference, October 1999.

[1063]
Jeffrey C. Smolinske, Phieu M. Tran, Christopher L. Clanton, and Robert C. Jr. Scheibel. 512 kbps high capacity packet mode data protocol for the broadband pcs spectrum. IEEE Vehicular Technology Conference, 1:536-540, 1996.

[1064]
Alan J. Snyder, Richard A. Nazarian, and William J. Weiss. Secure communications and status reporting protocol for implanted devices. IEEE Symposium on Computer-Based Medical Systems, pages 253-257, 1993.

[1065]
J.L. Sobrinho and J.M. Brazio. Analysis of a multiple access protocol for wireless data networks with bi- directional traffic. IEEE International Symposium on Information Theory - Proceedings, page 412pp, 1994.

[1066]
Dawn X. Song and Adrian Perrig. Advanced and authenticated marking schemes for IP traceback. Technical Report UCB/CSD-00-1107, Computer Science Division (EECS), University of California, Berkeley, USA, June 2000.

[1067]
Dawn X. Song and Adrian Perrig. Advanced and authenticated marking schemes for IP traceback. In Proceedings IEEE Infocom 2001, April 22-26, 2001.

[1068]
Dawn Xiaodong Song. Athena: An automatic checker for security protocol analysis. In Proceedings of the 12th IEEE Computer Security Foundations Workshop, June 1999.

[1069]
Jiang Songchar. Performance improvement of integrated services on cdma wireless lans using a novel protocol. 1996 IEEE Internat. Conf on Communications, 1:250-254, 1996.

[1070]
Michael Souryal, Branimir Vojcic, and Raymond Pickholtz. Ad hoc, multihop cdma networks with route diversity a rayleigh fading channel. In Proc. Military Communications Conference (MILCOM'01). Communications for Network-Centric Operations: Creating the Information Force, volume 2, pages 1003 --1007, 2001.

[1071]
Elvino S. Sousa and John A. Silvester. Optimum transmission ranges in a direct-sequence spread-spectrum multihop packet radio network. IEEE Journal on Selected Areas in Communications, 8(5):762-771, 1990.

[1072]
O. Spaniol, A. Fasbender, S. Hoff, J. Kaltwasser, and J. Kassubek. Challenges for wireless networks and osi. Applied Microwave and Wireless, 8(1):13pp, 1996.

[1073]
T.K. Srikanth and Sam Toueg. Simulating authenticated broadcasts to derive simple fault-tolerant algorithms. Distributed Computing, 2:80-94, 1987.

[1074]
Kotikalapudi Sriram and Peter D. Magill. Enhanced throughput efficiency by use of dynamically variable request minislots in mac protocols for hfc and wireless access networks. Telecommunication Systems, 9(3,4):315-333, 1998.

[1075]
M. Srivastava and P.P. Mishra. On quality of service in mobile wireless networks. Proceeding of the IEEE 7th International Workshop on Network and Operating Systems Support for Digital Audio and Video, pages 147-158, 1997.

[1076]
Mani Srivastava, Partho Mishra, Prathima Agrawal, and Giao Nguyen. Ethersim: a simulator for application-level performance modeling of wireless and mobile ATM networks. Computer Networks and ISDN Systems, 29(17-18):2067-2090, 1998.

[1077]
Saurabh Srivastava, Sachee Tripathi, Dheeraj Sanghi, and Ajit Kumar Chaturvedi. Resource optimization in CDMA based wireless ad hoc networks. Technical report, Project Report Department of Computer Science and Engineering, Indian Instiute of Technology, Kanpur, 2002.

[1078]
J. Scott Stadler and Jay Gelman. Performance enhancement for tcp/ip on a satellite channel. In Proceedings - IEEE Military Communications Conference MILCOM, volume 1, pages 270-276. IEEE, 1998.

[1079]
G.M. Stamatelos and V.N. Koukoulidis. Reservation-based bandwidth allocation in a radio atm lan. Conf. Title: 1995 IEEE International Conference on Communications. Converging Technologies for Tomorrow's Applications. ICC '96. Conference Record, 3:1247-1253, 1996.

[1080]
M. Stangel and V. Bharghavan. Improving TCP performance in mobile computing environments. In International Conference on Communications '98, June 1998.

[1081]
John A. Stankovic, Marco Spuri, Krithi Ramamritham, and Giorgo C. Buttazzo. Deadline Scheduling for Real-Time Systems. Kluwer Academic Publishers, 1998.

[1082]
Wilfried Steiner and Michael Paulitsch. The transition from asynchronous to synchronous system operation: An approach for distributed fault-tolerant systems. Proceedings of the The 22nd International Conference on Distributed Computing Systems, July 2002.

[1083]
Jennifer G. Steiner, Clifford Neuman, and Jeffrey I. Schiller. Kerberos: An authentication service for open network systems. In USENIX Association, editor, USENIX Conference Proceedings (Dallas, TX, USA), pages 191-202, Berkeley, CA, USA, Winter 1988. USENIX Association.

[1084]
Michael Steiner, Gene Tsudik, and Michael Waidner. Diffie-Hellman key distribution extended to group communication. In Proceedings of the 3rd ACM Conference on Computer and Communications Security, CCS'96, pages 31-37, March 14-15, 1996.

[1085]
Michael Steiner, Gene Tsudik, and Michael Waidner. CLIQUES: A new approach to group key agreement. In Proceedings of the ICDCS, May 1998.

[1086]
Mark Stemm and Randy H. Katz. Vertical handoffs in wireless overlay networks. Mobile Networks and Applications, 3(4):335-350, 1998.

[1087]
M. Stemm. Measuring and reducing energy consumption of network interfaces in hand-held devices. IIEICE Transactions on Communications, E80-B(8):1125-1131, 1997.

[1088]
M. Stern. Extend your net with VPNs, November 1997.

[1089]
Frank A. Stevenson. Cryptanalysis of Contents Scrambling System, 1999.

[1090]
Doug R. Stinson and Tran van Trung. Some new results on key distribution patterns and broadcast encryption. Designs, Codes and Cryptography, 14(3):261-279, September 1998.

[1091]
Ivan Stojmenovic, Mahtab Seddigh, and Jovisa Zunic. Dominating sets and neighbor elimination-based broadcasting algorithms in wireless networks. IEEE Transactions on Parallel and Distributed Systems, 13(1):14-25, January 2002.

[1092]
W. Storz and G. Beling. Transmitting time-critical data over heterogeneous subnetworks using standardized protocols. Mobile Networks and Applications, 2(3):243-249, 1997.

[1093]
Hannes Stratil. Topology management and routing in wireless networks - an overview. Diplomarbeit, Technische Universität Wien, Department of Automation, February 2002.

[1094]
Stuart G. Stubblebine and Rebecca N. Wright. An authentication logic supporting synchronization, revocation, and recency. In Proceedings of the 3rd ACM Conference on Computer and Communications Security, CCS'96, pages 95-105, March 14-15, 1996.

[1095]
S. Subramanian. Performance of a multiple-antenna-multiple-equalizer system for a cdma indoor wireless system. In 18th Biennial Symposium on Communication. Symposium Proceedings, pages 211-215, 1997.

[1096]
T. Sugiyama, M. Mizoguchi, S. Kubota, and S. Kato. A high efficient and interference resistant half-chip offset qpsk-cdma scheme for wireless lan systems. In Conf. Title: GLOBECOM '95. Communications for Global Harmony. IEEE Global Telecommunications Conference., volume 3, pages 2166-2170, 1995.

[1097]
T. Sugiyama, M. Mizoguchi, and S. Kubota. A half-chip offset qpsk modulation cdma scheme employing differential detection for advanced wireless lan systems. IEICE Transactions on Communications, pages 693-700, 1996.

[1098]
Ya-Ku Sun and Kwang-Cheng Chen. A multi-layer collision resolution multiple access protocol for wireless networks. Wireless Networks, 4(5):353-364, 1998.

[1099]
Ya-Ku Sun and Kwang-Cheng Chen. Optimization of generalized tree protocols with capture. In IEEE Vehicular Technology Conference, volume 2, pages 801-805. IEEE, 1998.

[1100]
Hung-Min Sun and Shiuh-Pyng Shieh. Cryptanalysis of private-key encryption schemes based on burst-error-correcting codes. In Proceedings of the 3rd ACM Conference on Computer and Communications Security, CCS'96, pages 153-156, March 14-15, 1996.

[1101]
Y. Sun, A. Nix, and J.P. McGeehan. Hiperlan performance analysis with dual antenna diversity and decision feedback equalisation. IEEE Vehicular Technology Conference, 3:1549-1553, 1996.

[1102]
Won Lee. Sung and Ho Cho Dong. Distributed reservation cdma for wireless lan. Conf. Title: GLOBECOM '95. Communications for Global Harmony. IEEE Global Telecommunications Conference., 1:360-364, 1995.

[1103]
Edmond Sung and Arkady Zaslavsky. Software assisted handover of mobile clients in heterogeneous wireless computing environments. Proceedings of the Asia-Pacific Software Engineering Conference and International Computer Science Conference, APSEC and ICSC 1997, pages 527-528, 1997.

[1104]
Lee Sung-Won. Reservation cdma for distributed wireless lan. Journal of KISS[A] [Computer Systems and Theory], 23:1211-1224, 1997.

[1105]
P. Syverson and Catherine Meadows. A logical language for specifying cryptographic protocol requirements. In Proceedings of the 1993 IEEE Computer Society Symposium on Research in Security and Privacy, pages 165-177, 1993.

[1106]
P. Syverson and Catherine Meadows. Formal requirements for key distribution protocols. In Advances in Cryptology - Eurocrypt'94, pages 320-331, 1995.

[1107]
P. Syverson and Catherine Meadows. A formal language for cryptographic protocol requirements. Designs, Codes, and Cryptography, 7(1/2):27-59, 1996.

[1108]
P. Syverson and P. van Oorschot. On unifying some cryptographic protocol logics. In Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy, pages 14-28, 1994.

[1109]
P. Syverson. On key distribution protocols for repeated authentication. ACM Operating Systems Review, 27(4):24-30, October 1993.

[1110]
P. Syverson. A taxonomy of replay attacks. In Proceedings of the 7th IEEE Computer Security Foundations Workshop, 1994.

[1111]
P. Syverson. Limitations on design principles for public key protocols. In Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy, pages 62-73, 1996.

[1112]
Yukio Takimoto and Minoru Kotaki. Recent development of mm-wave applications in japan. Microwave Journal, 39(5):214, 216, 218, 220, 222-224, 226, May 1996.

[1113]
Y. Takimoto. 60 ghz short range transceivers and applications for minimum delay spread lan. 1996 IEEE MTT-S Internat. Microwave Symp. Digest, 2:509-512, 1997.

[1114]
F. Talucci, M. Gerla, and L. Fratta. Maca-bi (maca by invitation)-a receiver oriented access protocol for wireless multihop networks. In Waves of the Year 2000+ PIMRC '97. The 8th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications. Technical Program, Proceedings (Cat. No.97TH8271)., volume 2, pages 435-439. IEEE, 1997.

[1115]
Anup Kumar Talukdar and B. R. Badrinath. On accommodating mobile hosts in an integrated services packet network. In IEEE Infocom '97 - 16th Conference on Computer Communications. IEEE, 1997.

[1116]
Y. Tamura, Y. Tobe, and H. Tokuda. Efr: a retransmit scheme for tcp in wireless lans. In Proceedings 23rd Annual Conference on Local Computer Networks. LCN'98 (Cat. No.98TB100260), pages 2-11. IEEE, 1998.

[1117]
Y. Tamura, Y. Tobe, and H. Tokuda. Efr: efficient fast retransmit scheme for tcp in a wireless multiple access. Transactions of the Information Processing Society of Japan, 40(1):46-56, 1999.

[1118]
Y. Tanaka and M. Nakagawa. Optical parallel transmission with multi-wavelength for high speed communications on indoor channels. IEICE Transactions on Communications, E81-B(4):729-736, 1998.

[1119]
Zhenyu Tang and Garcia Luna Aceves JJ. Collision-avoidance transmission scheduling for ad-hoc networks. In 2000 IEEE International Conference on Communications. ICC 2000. Global Convergence Through Communications., 2000.

[1120]
W. Tang, A.R. Kaye, and S.A. Mahmoud. Network architecture and signaling for wireless access to an atm lan. IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC, 2:901-904, 1995.

[1121]
Zhongping Tao, Gregor v. Bochmann, and Rachida Dssouli. A formal method for synthesizing optimized protocol converters and its application to mobile data networks. Mobile Networks and Applications, 2(3):259-269, 1997.

[1122]
S. Tasaka and Y. Ishibashi. Stored media synchronization schemes in atm and wireless networks: a performance comparison. 1997 IEEE 6th International Conference on Universal Person Communications Record., 2:766-772, 1997.

[1123]
Gerard Tel. Introduction to Distributed Algorithms. Cambridge University Press, 1994.

[1124]
M. Terada, Y. Murayama, and G. Mansfield. Access control for inter-organizational computer network environment. In Worldwide Computing and Its Applications. International Conference, WWCA'97. Proceedings., pages 394-409. Springer-Verlag, Berlin, Germany, 1997.

[1125]
Bernd Thallner and Günther Gridling. Simulation of a wireless CDMA ad hoc network. In Proc. IASTED International Conference on Communications and Computer Networks (CCN'02), pages 354-359, Boston, Massachusetts, USA, November 4-6, 2002.

[1126]
Bernd Thallner and Günther Gridling. Simulation of a wireless cdma ad hoc network. In Processings of the IASTED International conference on Communications and Computer Networks, November 2002.

[1127]
Pavlos Theodorou, Jaafar M.H. Elmirghani, and Robert A. Cryan. Atm infrared wireless lans: A proposed architecture. IEEE Communications Magazine, 36(12):118-123, 1998.

[1128]
Alexander Tiountchik and Elena Trichina. RSA acceleration with field programmable gate arrays. Lecture Notes in Computer Science, 1587:164-176, 1999.

[1129]
A.Z. Tirkel, C.F. Osborne, N. Mee, G.A. Rankin, and A. McAndrew. Maximal connected sets - application to microcell CDMA. International Journal of Communication Systems, 7(1):29-32, 1994.

[1130]
Tim Titheridge, Rob Collingridge, and Graham Shorrock. Bt intranet complete service. British Telecommunications Engineering, 17(1):42-48, April 1998.

[1131]
Chai-Keong Toh. Design & implementation of a hybrid handover protocol for multi-media wireless lans. Proceedings of the Annual International Conference on Mobile Computing and Networking, MOBICOM, pages 49-61, 1995.

[1132]
Chai-Keong Toh. Novel distributed routing protocol to support ad-hoc mobile computing. Conference Proceedings - International Phoenix Conference on Computers and Communications, pages 480-486, 1996.

[1133]
Chai-Keong Toh. Performance evaluation of crossover switch discovery algorithms for wireless atm lans. Proceedings - IEEE INFOCOM, 3:1380-1387, 1996.

[1134]
Chai-Keong Toh. Performance evaluation of crossover switch discovery algorithms for wireless atm lans. Proceedings - IEEE INFOCOM, 3:1380-1387, 1996.

[1135]
Martin Tompa and Heather Woll. How to share a secret with cheaters. Journal Of Cryptology, 1:133-138, 1988.

[1136]
M. Toro. Simulation of ip mobility support: an experiment in mobile protocol specification with sdl. In SDL '97 Time for Testing SDL, MSC and Trends. Proceedings of the Eighth SDL Forum., pages 119-134. Elsevier, 1997.

[1137]
Sam Toueg, Kenneth J. Perry, and T. K. Srikanth. Fast distributed agreement. SIAM Journal on Computing, 16(3):445-457, 1987.

[1138]
Sam Toueg. Randomized byzantine agreements. In Proceedings of the 3rd Symposium on Principles of Distributed Computing (PODC'84), pages 163-178, 1984.

[1139]
Chokri Trabelsi. Access protocol for broadband multimedia centralized wireless local area networks. In 2nd IEEE Symposium on Computers and Communications (ISCC '97) July 1-3, 1997. IEEE, 1997.

[1140]
Bill Travis. Ease file transfers with irda-protocol wireless infrared. EDN, 40(7):8pp, 1995.

[1141]
Bill Travis. Irda-protocol ir links make 35-fold leap in data-transfer speed. EDN, 41(8):7pp, 1996.

[1142]
Yu-Chee Tseng, Sze-Yao Ni, Yuh-Shyan Chen, and Jang-Ping Sheu. The broadcast storm problem in a mobile ad hoc network. Wireless Networks, 8(2/3):153-167, March-May 2002.

[1143]
Gene Tsudik. Message authentication with one-way hash functions. ACM SIGCOMM Computer Communication Review, 22(5):29-38, October 1992.

[1144]
Masato Tsuru, Tetsuya Takine, and Yuji Oie. Estimation of clock offset from one-way delay measurement on asymmetric paths. In Symposium on Applications and the Internet (SAINT) Workshops, pages 126-133, 2002.

[1145]
L.-L. Tung and E. Turban. Information technology as an enabler of telecommuting. International Journal of Information Management, 16(2):103-117, 1995.

[1146]
R. Turpin and A. B. Coan. Extending binary byzantine agreement to multivalued byzantine agreement. Information Processing Letters, 18(2):73-6, February 1984.

[1147]
K. Uehara. A planar sector antenna for indoor high-speed wireless communication systems. IEICE Transactions on Communications, E79-B(12):1773-1777, 1997.

[1148]
Okechukwu C. Ugweje. Narrowband interference suppression in multipath CDMA system. In Wireless Communications and Networking Conference (WCNC'02), pages 728-733, 2002.

[1149]
Nitin H. Vaidya and Dhiraj K. Pradhan. Degradable agreement in the presence of Byzantine faults. In International Conference on Distributed Computing Systems, pages 237-244, 1993.

[1150]
Nitin H. Vaidya. Degradable agreement in the presence of Byzantine faults. Technical Report 92-020, Computer Science Department, Texas A&M University, College Station, 1992.

[1151]
Nitin H. Vaidya. Degradable agreement in the presence of Byzantine faults. Technical Report 93-037, Computer Science Department, Texas A&M University, College Station, 1993.

[1152]
Casper van den Broek and Jean-Paul M.G. Linnartz. Simulation study of space and time reservation multiple access. IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC, 2:527-531, 1995.

[1153]
Marten van Dijk, Christian Gehrmann, and Ben Smeets. Unconditionally secure group authentication. Designs, Codes and Cryptography, 14(3):281-296, September 1998.

[1154]
H.R.R. van Roosmalen, J.A.M. Nijhof, and R. Prasad. Performance of a hybrid cdma/isma protocol with multiple return channels and buffering. Conference Title: Performance of a hybrid CDMA/ISMA protocol with multiple return channels and buffering, 3:1024-1028, 1994.

[1155]
Huub van Roosmalen, Jos Nijhof, and Ramjee Prasad. Performance analysis of a hybrid CDMA/ISMA protocol for indoor wireless computer communications. IEEE Journal on Selected Areas in Communications, 12(5):909-916, June 1994.

[1156]
Huub van Roosmalen, Jos Nijhof, and Ramjee Prasad. Performance analysis of a hybrid cdma/isma protocol for indoor wireless computer communications. IEEE Journal on Selected Areas in Communications, 12(5):909-916, 1994.

[1157]
André M. van Tilborg and Gary M. Koob, editors. Foundations of Real-Time Computing: Scheduling and Resource Management. Kluwer Academic Publishers, 1991.

[1158]
George Varghese and Nancy A. Lynch. A tradeoff between safety and liveness for randomized coordinated attack protocols. In Proceedings of the 11th Annual ACM Symposium on Pprinciples of Distributed Computing, pages 241-250, Vancouver, British Columbia, Canada, August 1992.

[1159]
Vijay K. Varma, Anthony R. Noerpel, and Daniel J. Harasty. Integrated alerting and system broadcast channel for a wireless access system. IEEE Transactions on Vehicular Technology, 45(1):157-163, February 1996.

[1160]
Upkar Varshney. Supporting mobility with wireless ATM. Computer, 30(1):131-133, January 1997.

[1161]
Serge Vaudenay. An experiment on DES statistical cryptanalysis. In Proceedings of the 3rd ACM Conference on Computer and Communications Security, CCS'96, pages 139-147, March 14-15, 1996.

[1162]
Klaus Vedder. Security aspects of mobile communications. In Bart Preneel, René Govaerts, and Joos Vandewalle, editors, Computer Security and Industrial Cryptography, ESAT Course'91, LNCS 741, pages 193-210, May 21-23, 1991.

[1163]
M. Veeraraghavan, M. Karol, and K.Y. Eng. Mobility management in a wireless atm lan. Conference Record / IEEE Global Telecommunications Conference, 1:316-321, 1995.

[1164]
John George Venious. Coding schemes for asynchronous and synchronous fiber optic code division multiple access local area networks (cdma, lans). Dissertation, page 2776, 1996.

[1165]
Véronique Vèque and Jalel Ben-Othman. Mrap: A multiservices resource allocation policy for wireless atm network. Computer Networks And ISDN Systems, 29(17-18):2187-2200, 1998.

[1166]
S. Verdu. Multiuser Detection. Cambridge University Press, 1998.

[1167]
J.P.C. Verhoosel and P.H.W.M. Oude-Luttighuis. Mobile data applications in industry, trade, transport and distribution. 1997 IEEE International Conference on Personal Wireless Communications, pages 494-498, 1997.

[1168]
Paulo Veríssimo, Antonio Casimiro, and Christof Fetzer. The timely computing base: Timely actions in the presence of uncertain timeliness. In Proceedings IEEE International Conference on Dependable Systems and Networks (DSN'01 / FTCS'30), pages 533-542, 2000.

[1169]
Jan Vitek, Manuel Serrano, and Dimitris Thanos. Security and communication in mobile object systems. In Jan Vitek and Christian Tschudin, editors, Mobile Object Systems: Towards the Programmable Internet (MOS'96), LNCS 1222, pages 177-200. Springer Verlag, April 1997.

[1170]
Ivan Vukovic. Hiperlan type 1: Performance analysis of the channel access control protocol. In IEEE Vehicular Technology Conference, volume 1, pages 377-381. IEEE, 1998.

[1171]
D. Wake, D. Johansson, and D.G. Moodie. Passive picocell: a new concept in wireless network infrastructure. Electronics Letters, 33(5):404-406, 1997.

[1172]
B. Walker, S. Bohmer, and M. Lott. Protocols for a wireless-atm multihop network. In 1998 International Zurich Seminar on Broadband Communications. Accessing, Transmission, Networking. Proceedings (Cat. No.98TH8277), pages 75-82. IEEE, 1998.

[1173]
Peng-Jun Wan, Khaled M. Alzoubi, and Ophir Frieder. Distributed construction of connected dominating set in wireless ad hoc networks. In Proceedings of the 21th Annual Joint Conference of the IEEE Computer and Communications Societies, pages 1597-1604, June 2002.

[1174]
Yu Wang and Xiang-Yang Li. Distributed spanner with bounded degree for wireless ad hoc networks. In International Parallel and Distributed Processing Symposium, April 2002.

[1175]
Yu Wang and Xiang-Yang Li. Geometric spanners for wireless ad hoc networks. In Proceedings of the 22nd International Conference on Distributed Computing Systems, pages 171-178, July 2002.

[1176]
Lixin Wang, Mounir Hamdi, and Khaled Ben Letaief. Wireless channel access for multimedia personal communication systems. In VTC '98. 48th IEEE Vehicular Technology Conference. Pathway to a Global Wireless Revolution (Cat. No.98CH36151), volume 3, pages 2062-6. IEEE, 1998.

[1177]
Tsan-Pin Wang, Chien-Chao Tseng, and Shu-Yuen Hwang. A fair protocol for fast resource assignment in wireless pcs networks. Wireless Networks, 5(1):33-40, 1999.

[1178]
Haining Wang, Danlu Zhang, and Kang G. Shin. Detecting SYN flooding attacks. In IEEE Infocom 2002, June 23-27, 2002.

[1179]
Roy Want, Bill N. Schilit, Norman I. Adams, Rich Gold, Karin Petersen, David Goldberg, John R. Ellis, and Mark Weiser. An overview of the ParcTab ubiquitous computing experiment. IEEE Personal Communications, pages 28-43, December 1995.

[1180]
Richard Ward. OSI network security and the NTCB. In Thomas A. Berson and Thomas Beth, editors, Proceedings of the Workshop on Local Area Network Security (LANSEC'89), LNCS 396, pages 67-74, Berlin, April 1989. Springer.

[1181]
C. Ware, J. Judge, J. Chicharo, and E. Dutkiewicz. Unfairness and capture behaviour in 802.11 adhoc networks. In 2000 IEEE International Conference on Communications. ICC 2000. Global Convergence Through Communications., 2000.

[1182]
Akira Watanabe, Toru Inada, Tetsuo Ideguchi, and Iwao Sasase. Proposal of group search protocol making secure communication groups for intranet. In IEEE International Conference on Communications, volume 2, pages 877-881. IEEE, Piscataway, NJ, USA, June 2000.

[1183]
Horst F. Wedde and Wolfgang Freund. Harmonious internal clock synchronization. In 12th Euromicro Conference on Real-Time Systems, pages 175-182, 2000.

[1184]
Gabriele Wedel and Volker Kessler. Formal semantics for authentication logics. In Elisa Bertino, Helmut Kurth, Giancarlo Martella, and Emilio Montolivo, editors, 4rd European Symposium on Research in Computer Security, ESORICS'96, LNCS 1146, pages 219-240, September 25-27, 1996.

[1185]
D.J. Wedge. heoretical evaluation of range limitations in hiperlan receivers. Electronics Letters, 32(8):717-718, April 1996.

[1186]
Vijitha Weerackody and William Zeng. Arq schemes with switched antenna diversity and their applications in jpeg image transmission. Conference Record / IEEE Global Telecommunications Conference, 3:1915-1919, 1995.

[1187]
DSL. Wei and K. Naik. An efficient multicast protocol using de bruijn structure for mobile computing. Computer Communication Review, 27(3):14-35, 1997.

[1188]
Jost Weinmiller, Hagen Woesner, and Adam Wolisz. Analyzing and improving the ieee 802.11-mac protocol for wireless lans. IEEE International Workshop on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems - Proceedings, pages 200-206, 1996.

[1189]
Jost Weinmiller, Morten Schläger, Andreas Festag, and Adam Wolisz. Performance study of access control in wireless lans -- ieee 802.11 dfwmac and etsi res 10 hiperlan. Mobile Networks and Applications, 2(1):69-87, 1997.

[1190]
Bettina Weiss and Ulrich Schmid. Consensus with written messages under link faults. Technical Report 183/1-114, Department of Automation, Technische Universität Wien, March 2001.

[1191]
Bettina Weiss and Ulrich Schmid. Consensus with written messages under link faults. In 20th Symposium on Reliable Distributed Systems (SRDS'01), pages 194-197, October 28-31, 2001.

[1192]
Bettina Weiss. Formal methods in security. Technical Report 183/1-112, Department of Automation, Technische Universität Wien, November 2000. (unfinished).

[1193]
Bettina Weiss. Security in distributed systems - a survey. Technical Report 183/1-99, Department of Automation, Technische Universität Wien, February 2000.

[1194]
Bettina Weiss. Security issues in W2F. Technical Report 183/1-111, Department of Automation, Technische Universität Wien, July 2000.

[1195]
Bettina Weiss. Service specification of W2F. Technical Report 183/1-113, Department of Automation, Technische Universität Wien, 2001. (obsolete).

[1196]
Bettina Weiss. Authenticated Consensus. PhD thesis, Technische Universität Wien, Fakultät für Technische Naturwissenschaften und Informatik, October 2002.

[1197]
Bettina Weiss. Authentication under denial-of-service attacks. Technical Report 183/1-122, Department of Automation, Technische Universität Wien, July 2002.

[1198]
Bettina Weiss. Authentication under denial-of-service attacks. In Proc. IASTED International Conference on Communications and Computer Networks (CCN'02), pages 134-139, Boston, Massachusetts, USA, November 4-6, 2002.

[1199]
G. Welling and B.R. Badrinath. A framework for environment aware mobile applications. Proceedings of the 17th International Conference on Distributed Computing Systems, pages 384-391, 1997.

[1200]
Bob Welsh, Norm Rehn, Bob Vincent, Joseph Weinstein, and Susan Wood. Multicasting with the near term digital radio (ntdr) in the tactical internet. In Proceedings - IEEE Military Communications Conference MILCOM, volume 2, pages 452-456. IEEE, 1998.

[1201]
Jyh-Horng Wen and Jee-Wey Wang. New protocol for wireless voice communications - non-collision packet reservation multiple access. IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC, 2:638-642, 1995.

[1202]
Jyh-Horng Wen and Jee-Wey Wang. Non-collision prma protocol for integrated voice and standard wireless networks. Annual International Conference on Universal Personal Communications- Record, pages 462-466, 1995.

[1203]
Jyh-Horng Wen and Jee-Wey Wang. Throughput analysis of packet reservation multiple access protocol for wireless communications. Proceedings of the National Science Council Republic of China Part a Physical Science & Engineering, 22(4):497-503, 1998.

[1204]
V. Werbus, A. Veloso, and A. Villanueva. DECT. cordless functionality in new generation Alcatel PABXs. Electrical Communication, 2:172-180, 1993.

[1205]
E.T. Whittaker and G.N. Watson. A Course of Modern Analysis. Cambridge University Press, Cambridge, 1927.

[1206]
Josef Widder and Ulrich Schmid. Booting clock synchronization in partially synchronous systems with hybrid node and link failures. Technical Report 183/1-126, Department of Automation, Technische Universität Wien, January 2003. (submitted).

[1207]
Josef Widder, Gérard Le Lann, and Ulrich Schmid. A new timer-free perfect failure detector for partially synchronous systems. Technical report, Technische Universität Wien, Institute of Computer Engineering, July 2003. (manuscript submitted).

[1208]
Josef Widder. Switching On. How processes initialize for consistent broadcast. Diplomarbeit, Technische Universität Wien, Department of Automation, October 2002.

[1209]
Josef Widder. Switching On: How to boot clock synchronization in partially synchronous systems. Technical Report 183/1-125, Department of Automation, Technische Universität Wien, December 2002.

[1210]
Josef Widder. Booting clock synchronization in partially synchronous systems. In Proceedings of the 17th International Symposium on Distributed Computing (DISC'03), October 2003. (to appear).

[1211]
Michael J. Wiener. Performance comparison of public-key cryptosystems. CryptoBytes Technical Newsletter, 4(1):1-5, Summer 1998. ftp://ftp.rsasecurity.com/pub/cryptobytes/crypto4n1.pdf.

[1212]
Jeffrey E. Wieselthier and Anthony Ephremides. Fixed- and movable-boundary channel-access schemes for integrated voice/data wireless networks. IEEE Transactions on Communications, 43(1):64-74, January 1995.

[1213]
Jeffrey E. Wieselthier, Gam D. Nguyen, and Anthony Ephremides. Multicasting in energy-limited ad-hoc wireless networks. In Proceedings - IEEE Military Communications Conference MILCOM, volume 3, pages 723-729. IEEE, 1998.

[1214]
Steve R. Wilbur, Jon Crowcroft, and Yuko Muroyama. MAC layer security measures in local area networks. In Thomas A. Berson and Thomas Beth, editors, Proceedings of the Workshop on Local Area Network Security (LANSEC'89), LNCS 396, pages 53-66, Berlin, April 1989. Springer.

[1215]
Uwe G. Wilhelm, Sebastian Staamann, and Levente Buttyán. Introducing trusted third parties to the mobile agent paradigm. In Jan Vitek and Christian Jensen, editors, Secure Internet Programming: Security Issues for Mobile and Distributed Objects, LNCS 1603. Springer Verlag, 1999.

[1216]
Tim Wilkinson. High data rate radio lans. IEE Colloquium (Digest), 224:3/1-3/8, 1995.

[1217]
Carey L. Williamson, Tim G. Harrison, Wayne L. Mackrell, and Richard B. Bunt. Performance evaluation of the mom mobile multicast protocol. Mobile Networks and Applications, 3(2):189-201, 1998.

[1218]
Moe Z. Win and Robert A. Scholtz. Impulse radio: How it works. IEEE Communications Letters, 2(1), January 1998.

[1219]
A. Wittneben. On the potential of adaptive antenna combining for intersymbol interference reduction in high speed wireless lans. In IEEE 47th Vehicular Technology Conference. Technology in Motion (Cat. No.97CH36003, volume 2, pages 627-631, 1997.

[1220]
Manfred Wolf. Covert channels in LAN protocols. In Thomas A. Berson and Thomas Beth, editors, Proceedings of the Workshop on Local Area Network Security (LANSEC'89), LNCS 396, pages 91-102, Berlin, April 1989. Springer.

[1221]
O. Wolfson. Mobile computing in a reservation application. Information and Communication Technologies in Tourism. Proceedings of the International Conference, pages 43-45, 1995.

[1222]
Eric W.M. Wong and Tak-Shing Peter Yum. Delay bounds for packet satellite protocols. Telecommunication Systems, 8(2-4):277-291, 1997.

[1223]
Thomas Y. C. Woo and Simon S. Lam. Authentication for distributed systems. Computer, 25(1):39-52, January 1992.

[1224]
Thomas Y. C. Woo and Simon S. Lam. A semantic model for authentication protocols. In Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy, pages 178-194, 1993.

[1225]
Thomas Y. C. Woo and Simon S. Lam. A lesson on authentication protocol design. ACM Operating Systems Review, 28(3):24-37, July 1994.

[1226]
Anthony A. Wood and John A. Stankovic. Denial of service in sensor networks. IEEE Computer, 35(10):54-62, October 2002.

[1227]
Jozef Wozniak. Performance analysis of ieee 802.11 networks in presence of hidden stations. In Proceedings of the International Conference on Systems Science, volume 3, pages 159-166, 1998.

[1228]
M. A. Wright. Virtual private network security. Network-Security, pages 11-14, July 2000.

[1229]
Jianming Wu and Ryuji Kohno. A wireless multimedia CDMA system based on transmission power control. IEEE Journal on Selected Areas in Communications, 14(4):683-691, May 1996.

[1230]
Jie Wu and Hailan Li. On calculating connected dominating set for efficient routing in ad hoc wireless networks. In Proceedings of the 3rd International Workshop on Discrete algorithms and methods for mobile computing and communications, pages 7-14, 1999.

[1231]
Chiung-Shien Wu and Gin-Kou Ma. Performance of packet reservation mac protocols for wireless networks. In IEEE Vehicular Technology Conference, volume 3, pages 2537-2541. IEEE, 1998.

[1232]
Gang Wu, Kaiji Mukumoto, and Akira Fukuda. Analysis of an integrated voice and data transmission system using packet reservation multiple access. IEEE Transactions on Vehicular Technology, 43(2):289-297, May 1994.

[1233]
Gang Wu, Mitsuhiko Mizuno, Kazumasa Taira, Kaiji Mukumoto, and Akira Fukuda. Mixed channel access and hybrid arq method for wireless communication networks. Annual International Conference on Universal Personal Communications- Record, pages 707-712, 1995.

[1234]
Gang Wu, T. Okazaki, and Y. Hase. Performance analysis of a hybrid wireless lan using r-isma. IEICE Transactions on Fundamentals of Electronics Communications & Computer Sciences, E80-A(7):1272-1280, 1997.

[1235]
Xiaowen Wu, Shiqi Wu, Hairong Sun, and Lemin Li. Dynamic slot allocation multiple access protocol for wireless atm networks. In 1997 IEEE International Conference on Communications. Towards the Knowledge Millennium. ICC '97. Conference Record (Cat. No.97CH36067)., volume 3, pages 1560-1565. IEEE, 1997.

[1236]
Shih-Lin Wu, Chih-Yu Lin, Yu-Chee Tseng, and Jang-Ping Sheu. A new multi-channel MAC protocol with on-demand channel assignment for multi-hop mobile ad hoc networks. In International Symposium on Parallel Architectures, Algorithms and Networks, pages 232-237, 2000.

[1237]
Yunnan Wu, Qian Zhang, Wenwu Zhu, and S. Y. Kung. Spreading code assignment in an ad hoc DS-CDMA wireless network. In Proc. IEEE International Conference on Communications (ICC'02), volume 5, pages 3055 -- 3060, New York City, USA, 2002.

[1238]
B.J. Wysocki. Power spectra of signal formats for ds-ss cdma wireless lans. In 1996 IEEE TENCON Digital Signal Processing Applications Proceedings (Cat. No.96CH36007), volume 1, pages 329-332, 1997.

[1239]
H. Xie, P. Narasimhan, R. Yuan, and D. Raychaudhuri. Data link control protocols for wireless atm access channels. Annual International Conference on Universal Personal Communications- Record, pages 753-757, 1996.

[1240]
Guanghan Xu and San-qi Li. Throughput multiplication of wireless lans for multimedia services: Sdma protocol design. IEEE Global Telecommunications Conference, 3:1326-1332, 1994.

[1241]
Weiping Xu, A. Chockalingam, and Laurence B. Milstein. Performance analysis of multichannel wireless access protocol in the presence of bursty packet losses. In Proceedings - IEEE Military Communications Conference MILCOM, volume 1, pages 233-237. IEEE, 1998.

[1242]
Jun Xu. A unified proof of minimum time complexity for reaching consensus and uniform consensus -- an oracle-based approach. Technical Report GIT-CC-01-27, Georgia Institute of Technology, November 2001.

[1243]
George Xylomenos and George Polyzos. Ip multicasting for point-to-point local distribution. In IEEE Infocom '97 - 16th Conference on Computer Communications. IEEE, 1997.

[1244]
George Xylomenos and G. C. Polyzos. Ip multicast group management for point-to-point local distribution. Computer Communications, 21(18):1645-1654, 1998.

[1245]
R. Yahalom, B. Klein, and T. Beth. Trust relations in secure systems -- a distributed authentication perspective. In Proceedings of the 1993 IEEE Computer Society Symposium on Security and Privacy (SSP'93), pages 150-164, 1993.

[1246]
K. Yamaguchi. Lan-current status and future vision. Journal of the Japan Society for Simulation Technology, 13:190-196, 1994.

[1247]
M. Yamamoto, S. Machida, and H. Ikeda. Access control scheme for multimedia wireless atm local area networks. In Proceedings APCC'97. Third Asia-Pacific Conference on Communications., volume 1, pages 137-141. IEEE, 1997.

[1248]
M. Yamamoto, S. Machida, and H. Ikeda. Access control scheme for multimedia atm wireless local area networks. IEICE Transactions on Communications, E81-B(11):2048-2055, 1998.

[1249]
T. Yamashita and S. Ono. A statistical method for time synchronization of computer clocks with precisely frequency-synchronized oscillators. In 18th International Conference on Distributed Computing Systems, pages 32-39, 1998.

[1250]
G. Yang and K. Pahlavan. Performance analysis of multicarrier modems in an office environment using 3d ray tracing. IEEE Global Telecommunications Conference, 1:42-46, 1994.

[1251]
Raj Yavatkar and Namrata Bhagawat. Improving end-to-end performance of tcp over mobile internetworks. Mobile Computing Systems and Applications - Workshop Proceedings, pages 146-152, 1995.

[1252]
Yi Ye, Chao-Ju Hou, and Ching-Chih Han. Qgma: A new mac protocol for supporting qos in wireless local area networks. In Sixth International Conference on Network Protocols. IEEE, 1998.

[1253]
Bennet S. Yee and J. Doug Tygar. Secure coprocessors in electronic commerce applications. In Proceedings 1995 USENIX Electronic Commerce Workshop, 1995.

[1254]
Bennet S. Yee. Using Secure Coprocessors. PhD thesis, Carnegie Mellon University, May 1994.

[1255]
Li-Hsing Yen, Ting-Lu Huang, and Shu-Yuen Hwang. A protocol for causally ordered message delivery in mobile computing systems. Mobile Networks and Applications, 2(4):365-372, 1997.

[1256]
Zhong Jun Yin and Kah-Seng Chung. Multiple access protocol for an underground wireless communication network. In IEEE Vehicular Technology Conference, volume 2, pages 1528-1532. IEEE, 1998.

[1257]
Yonggang-Du. Wireless atm lan with and without infrastructure. IEEE Communications Magazine, 36(4):90-95, 1998.

[1258]
Young C. Yoon. Linear MMSE interference suppression in asynchronous Random-CDMA. In 51st Vehicular Technology Conference, pages 1465-1469, 2000.

[1259]
P.A. Young, P.J. Smith, R.B. Mouldin, and M.T. Rafter. Dynamic resource allocation for wireless lan interconnect. IEEE MILCOM, 1:144-148, 1994.

[1260]
P.A. Young, P.J. Smith, R.B. Mouldin, and M.T. Rafter. Dynamic resource allocation for wireless lan interconnect. Conference Title: Proceedings of the 1994 IEEE MILCOM, 1:144-148, 1994.

[1261]
S. Zdonik, R. Alonso, N. Franklin, and S. Acharya. Workshop on mobile computing systems and applications. Workshop on Mobile Computing Systems and Applications, 1994.

[1262]
Yongguang Zhang and Wenke Lee. Intrusion detection in wireless ad-hoc networks. In Proceedings of the 6th Conference on Mobile Computing and Networking, pages 275-283, August 6-11, 2000.

[1263]
Qian Zhang, Tan F. Wong, and James S. Lehnert. Buffered type-ii hybrid arq protocol for ds-ssma packet radio systems. International Journal of Wireless Information Networks, 5(3):203-217, 1998.

[1264]
Li Zhang, Zhen Liu, and Cathy Xia. Clock synchronization algorithms for network measurements. In IEEE INFOCOM 2002, June 23-27, 2002.

[1265]
Qing Zhao and Deva K. Borah. Adaptive iterative cdma multiuser detection in unknown multipath channels. In Proc. IEEE International Conference on Communications (ICC'02), volume 1, pages 361-365, April-May 2002.

[1266]
Qing Zhao and Lang Tong. Semi-blind collision resolution in random access wireless ad hoc networks. IEEE Transactions on Signal Processing, 48(10):2910-2920, October 2000.

[1267]
Qun Zhong. Providing secure environments for untrusted network applications: with case studies using virtualvault and trusted sendmail proxy. Technical report, HP Lab Bristol, Bristol, UK, 1997.

[1268]
Zhang Zhongping, F. Seifert, and R. Weigel. Time code division multiple access: a multiple access technology for indoor wireless communications. Konferenz-Einzelbericht: Broadband Networks: Strategies and Technologies, 2450:624-631, 1995.

[1269]
Lidong Zhou and Zygmunt J. Haas. Securing ad hoc networks. IEEE Network, 13(6):24-30, 1999.

[1270]
Lidong Zhou, Fred B. Schneider, and Robbert van Renesse. COCA: A secure distributed on-line certification authority. Technical Report TR2000-1828, Computer Science Department, Cornell University, December 2000.

[1271]
Lidong Zhou. Towards Fault-Tolerant and Secure On-Line Services. PhD thesis, Department of Computer Science, Cornell University, Ithaca, NY USA, May 2001.

[1272]
Weihua Zhuang. Medium access control protocol for multimedia wireless networks. IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC, 3:1094-1098, 1995.

[1273]
Reto Zimmermann, Andreas Curiger, Heinz Bonnenberg, Hubert Kaeslin, Norbert Felber, and Wolfgang Fichtner. A 177 Mbit/s VLSI implementation of the International Data Encryption Algorithm. IEEE Journal of Solid-State Circuits, 29(3):303-307, March 1994.

[1274]
Michele Zorzi and Silvano Pupolin. Optimum transmission ranges in multihop packet radio networks in the presence of fading. IEEE Transactions on Communications, 43(7):2201-2205, July 1995.

[1275]
M. Zorzi and RR. Rao. Energy management in wireless communications. In Sixth WINLAB Workshop on Third Generation Wireless Information Networks., pages 189-201, 1997.

[1276]
Michele Zorzi and Ramesh R. Rao. Performance of arq go-back-n protocol in markov channels with unreliable feedback. Mobile Networks and Applications, 2(2):183-193, 1997.

[1277]
M. Zorzi. Packet dropping statistics of a data-link protocol for wireless local communications. In 1997 IEEE 6th International Conference on Universal Person Communications Record. Bridging the Way to the 21st Century, ICUPC '97. Conference Record (Cat. No.97TH8255)., volume 2, pages 536-540. IEEE, 1997.

[1278]
André Zúquete and Paulo Guedes. Transparent authentication and confidentiality for stream sockets -- ensuring private network communications for Unix and Windows systems. IEEE Micro, 16(3):34-41, June 1996.