Computer Networks 4th Ed Andrew S. Tanenbaum [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

Computer Networks 4th Ed Andrew S. Tanenbaum [Electronic resources] - نسخه متنی

Andrew s. tanenbaum

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
لیست موضوعات
توضیحات
افزودن یادداشت جدید












9.2 Alphabetical Bibliography





ABRAMSON, N.:
"Internet Access Using VSATs," IEEE Commun. Magazine, vol. 38, pp. 60-68, July 2000.



ABRAMSON,N.:
"Development of the ALOHANET," IEEE Trans. on Information Theory, vol. IT-31, pp. 119-123, March 1985.



ADAMS, M., and
DULCHINOS, D.:
"OpenCable," IEEE Commun. Magazine, vol. 39, pp. 98-105, June 2001.



ALKHATIB, H.S.,
BAILEY, C.,
GERLA, M., and
MCRAE, J.:
"Wireless Data Networks: Reaching the Extra Mile," Computer, vol. 30, pp. 59-62, Dec. 1997.



ANDERSON, R.J.:
"Free Speech Online and Office," Computer, vol. 25, pp. 28-30, June 2002.



ANDERSON, R.J.: Security Engineering,
New York:
Wiley,
2001.



ANDERSON, R.J.:
"The Eternity Service," Proc. First Int'l Conf. on Theory and Appl. of Cryptology,
CTU Publishing House, 1996.



ANDERSON, R.J.:
"Why Cryptosystems Fail," Commun. of the ACM, vol. 37, pp. 32-40, Nov. 1994.



ARTZ, D.:
"Digital Steganography," IEEE Internet Computing, vol. 5, pp. 75-80, 2001.



AZZAM, A.A., and
RANSOM, N.: Broadband Access Technologies,
New York:
McGraw-Hill,
1999.



BAKNE, A., and
BADRINATH, B.R.:
"I-TCP: Indirect TCP for Mobile Hosts," Proc. 15th Int'l Conf. on Distr. Computer Systems, IEEE, pp. 136-143, 1995.



BALAKRISHNAN, H.,
SESHAN, S., and
KATZ, R.H.:
"Improving Reliable Transport and Handoff Performance in Cellular Wireless Networks," Proc. ACM Mobile Computing and Networking Conf., ACM, pp. 2-11, 1995.



BALLARDIE, T.,
FRANCIS, P., and
CROWCROFT, J.:
"Core Based Trees (CBT)," Proc. SIGCOMM '93 Conf., ACM, pp. 85-95, 1993.



BARAKAT, C.,
ALTMAN, E., and
DABBOUS, W.:
"On TCP Performance in a Heterogeneous Network: A Survey," IEEE Commun. Magazine, vol. 38, pp. 40-46, Jan. 2000.



BELLAMY, J.: Digital Telephony, 3rd ed.,
New York:
Wiley,
2000.



BELLMAN, R.E.: Dynamic Programming,
Princeton, NJ:
Princeton University Press,
1957.



BELSNES, D.:
"Flow Control in the Packet Switching Networks," Communications Networks,
Uxbridge, England:
Online, pp. 349-361,
1975.



BENNET, C.H., and
BRASSARD, G.:
"Quantum Cryptography: Public Key Distribution and Coin Tossing," Int'l Conf. on Computer Systems and Signal Processing, pp. 175-179, 1984.



BEREZDIVIN, R.,
BREINIG, R., and
TOPP, R.:
"Next-Generation Wireless Communication Concepts and Technologies," IEEE Commun. Magazine, vol. 40, pp. 108-116, March 2002.



BERGHEL, H.L.:
"Cyber Privacy in the New Millennium," Computer, vol. 34, pp. 132-134, Jan. 2001.



BERGHOLZ, A.:
"Extending Your Markup: An XML Tutorial," IEEE Internet Computing, vol. 4, pp. 74-79, July-Aug. 2000.



BERNERS-LEE, T.,
CAILLIAU, A.,
LOUTONEN, A.,
NIELSEN, H.F., and
SECRET, A.:
"The World Wide Web," Commun. of the ACM, vol. 37, pp. 76-82, Aug. 1994.



BERTSEKAS, D., and
GALLAGER, R.: Data Networks, 2nd ed.,
Englewood Cliffs, NJ:
Prentice Hall,
1992.



BHAGWAT, P.:
"Bluetooth: Technology for Short-Range Wireless Apps," IEEE Internet Computing, vol. 5, pp. 96-103, May-June 2001.



BHARGHAVAN, V.,
DEMERS, A.,
SHENKER, S., and ZHANG, L.:
"MACAW: A Media Access Protocol for Wireless LANs," Proc. SIGCOMM '94 Conf., ACM, pp. 212-225, 1994.



BHATTI, S.N., and
CROWCROFT, J.:
"QoS Sensitive Flows: Issues in IP Packet Handling," IEEE Internet Computing, vol. 4, pp. 48-57, July-Aug. 2000.



BI, Q.,
ZYSMAN, G.I., and
MENKES, H.:
"Wireless Mobile Communications at the Start of the 21st Century," IEEE Commun. Magazine, vol. 39, pp. 110-116, Jan, 2001.



BIHAM, E., and
SHAMIR, A.:
"Differential Cryptanalysis of the Data Encryption Standard," Proc. 17th Ann. Int'l Cryptology Conf.,
Berlin:
Springer-Verlag
LNCS 1294, pp. 513-525, 1997.



BIRD, R.,
GOPAL, I.,
HERZBERG, A.,
JANSON, P.A.,
KUTTEN, S.,
MOLVA, R, and
YUNG, M.:
"Systematic Design of a Family of Attack-Resistant Authentication Protocols," IEEE J. on Selected Areas in Commun., vol. 11, pp. 679-693, June 1993.



BIRRELL, A.D., and
NELSON, B.J.:
"Implementing Remote Procedure Calls," ACM Trans. on Computer Systems, vol. 2, pp. 39-59, Feb. 1984.



BIRYUKOV, A.,
SHAMIR, A., and
WAGNER, D.:
"Real Time Cryptanalysis of A5/1 on a PC," Proc. Seventh Int'l Workshop on Fast Software Encryption,
Berlin:
Springer-Verlag
LNCS 1978, p. 1, 2000.



BISDIKIAN, C.:
"An Overview of the Bluetooth Wireless Technology," IEEE Commun. Magazine, vol. 39, pp. 86-94, Dec. 2001.



BLAZE, M.:
"Protocol Failure in the Escrowed Encryption Standard," Proc. Second ACM Conf. on Computer and Commun. Security, ACM, pp. 59-67, 1994.



BLAZE, M., and
BELLOVIN, S.:
"Tapping on My Network Door," Commun. of the ACM, vol. 43, p. 136 , Oct. 2000.



BOGINENI, K.,
SIVALINGAM, K.M., and
DOWD, P.W.:
"Low-Complexity Multiple Access Protocols for Wavelength-Division Multiplexed Photonic Networks," IEEE Journal on Selected Areas in Commun. , vol. 11, pp. 590-604, May 1993.



BOLCSKEI, H.,
PAULRAJ, A.J.,
HARI, K.V.S., and
NABAR, R.U.:
"Fixed Broadband Wireless Access: State of the Art, Challenges, and Future Directions," IEEE Commun. Magazine, vol. 39, pp. 100-108, Jan. 2001.



BORISOV, N.,
GOLDBERG, I., and
WAGNER, D.:
"Intercepting Mobile Communications: The Insecurity of 802.11," Seventh Int'l Conf. on Mobile Computing and Networking, ACM, pp. 180-188, 2001.



BRANDS, S.: Rethinking Public Key Infrastructures and Digital Certificates,
Cambridge, MA:
M.I.T. Press,
2000.



BRAY, J., and
STURMAN, C.F.: Bluetooth 1.1: Connect without Cables, 2nd ed.,
Upper Saddle River, NJ:
Prentice Hall,
2002.



BREYER, R., and
RILEY, S.: Switched, Fast, and Gigabit Ethernet,
Indianapolis, IN:
New Riders,
1999.



BROWN, S.: Implementing Virtual Private Networks,
New York:
McGraw-Hill,
1999.



BROWN, L.,
KWAN, M.,
PIEPRZYK, J., and
SEBERRY, J.:
"Improving Resistance to Differential Cryptanalysis and the Redesign of LOKI," ASIACRYPT '91 Abstracts, pp. 25-30,
1991.



BURNETT, S., and
PAINE, S.: RSA Security's Official Guide to Cryptography,
Berkeley, CA:
Osborne/McGraw-Hill,
2001.



CAPETANAKIS, J.I.:
"Tree Algorithms for Packet Broadcast Channels," IEEE Trans. on Information Theory, vol. IT-25, pp. 505-515, Sept. 1979.



CARDELLINI, V.,
CASALICCHIO, E.,
COLAJANNI, M., and
YU, P.S.:
"The State-of-the-Art in Locally Distributed Web-Server Systems," ACM Computing Surveys, vol. 34, pp. 263-311, June 2002.



CARLSON, J.: PPP Design, Implementation and Debugging, 2nd ed.,
Boston:
Addison-Wesley,
2001.



CERF, V., and
KAHN, R.:
"A Protocol for Packet Network Interconnection," IEEE Trans. on Commun., vol. COM-22, pp. 637-648, May 1974.



CHAKRABARTI, S.:
"QoS Issues in Ad Hoc Wireless Networks," IEEE Commun. Magazine, vol. 39, pp. 142-148, Feb. 2001.



CHASE, J.S.,
GALLATIN, A.J., and
YOCUM, K.G.:
"End System Optimizations for High-Speed TCP," IEEE Commun. Magazine, vol. 39, pp. 68-75, April 2001.



CHEN, B.,
JAMIESON, K.,
BALAKRISHNAN, H., and
MORRIS, R.:
"Span: An Energy-Efficient Coordination Algorithm for Topology Maintenance in Ad Hoc Wireless Networks," ACM Wireless Networks, vol. 8, Sept. 2002.



CHEN, K.-C.:
"Medium Access Control of Wireless LANs for Mobile Computing," IEEE Network Magazine, vol. 8, pp. 50-63, Sept./Oct. 1994.



CHOUDBURY, A.K.,
MAXEMCHUK, N.F.,
PAUL, S., and
SCHULZRINNE, H.G.:
"Copyright Protection for Electronic Publishing on Computer Networks," IEEE Network Magazine, vol. 9, pp. 12-20, May/June, 1995.



CHU, Y.,
RAO, S.G., and
ZHANG, H.:
"A Case for End System Multicast," Proc. Int'l Conf. on Measurements and Modeling of Computer Syst., ACM, pp. 1-12, 2000.



CLARK, D.D.:
"The Design Philosophy of the DARPA Internet Protocols," Proc. SIGCOMM '88 Conf., ACM, pp. 106-114, 1988.



CLARK, D.D.:
"Window and Acknowledgement Strategy in TCP," RFC 813, July 1982.



CLARK, D.D.,
DAVIE, B.S.,
FARBER, D.J.,
GOPAL, I.S.,
KADABA, B.K.,
SINCOSKIE, W.D.,
SMITH, J.M., and
TENNENHOUSE, D.L.:
"The Aurora Gigabit Testbed," Computer Networks and ISDN Systems, vol. 25, pp. 599-621, Jan. 1993.



CLARK, D.D.,
JACOBSON, V.,
ROMKEY, J., and
SALWEN, H.:
"An Analysis of TCP Processing Overhead," IEEE Commun. Magazine, vol. 27, pp. 23-29, June 1989.



CLARK, D.D.,
LAMBERT, M., and
ZHANG, L.:
"NETBLT: A High Throughput Transport Protocol," Proc. SIGCOMM '87 Conf., ACM, pp. 353-359, 1987.



CLARKE, A.C.:
"Extra-Terrestrial Relays," Wireless World,
1945.



CLARKE, I.,
MILLER, S.G.,
HONG, T.W.,
SANDBERG, O., and
WILEY, B.:
"Protecting Free Expression Online with Freenet," IEEE Internet Computing, vol. 6, pp. 40-49, Jan.-Feb. 2002.



COLLINS, D.: Carrier Grade Voice over IP,
New York:
McGraw-Hill,
2001.



COLLINS, D., and
SMITH, C.: 3G Wireless Networks,
New York:
McGraw-Hill,
2001.



COMER, D.E.: The Internet Book,
Englewood Cliffs, NJ:
Prentice Hall,
1995.



COMER, D.E.: Internetworking with TCP/IP, vol. 1, 4th ed.,
Englewood Cliffs, NJ:
Prentice Hall,
2000.



COSTA, L.H.M.K.,
FDIDA, S., and
DUARTE, O.C.M.B.:
"Hop by Hop Multicast Routing Protocol," Proc. 2001 Conf. on Applications, Technologies, Architectures, and Protocols for Computer Commun., ACM, pp. 249-259, 2001.



CRAVER, S.A.,
WU, M.,
LIU, B.,
STUBBLEFIELD, A.,
SWARTZLANDER, B.,
WALLACH, D.W.,
DEAN, D., and
FELTEN, E.W.:
"Reading Between the Lines: Lessons from the SDMI Challenge," Proc. 10th USENIX Security Symp., USENIX, 2001.



CRESPO, P.M.,
HONIG, M.L., and
SALEHI, J.A.:
"Spread-Time Code-Division Multiple Access," IEEE Trans. on Commun., vol. 43, pp. 2139-2148, June 1995.



CROW, B.P.,
WIDJAJA, I,
KIM, J.G., and
SAKAI, P.T.:
"IEEE 802.11 Wireless Local Area Networks," IEEE Commun. Magazine, vol. 35, pp. 116-126, Sept. 1997.



CROWCROFT, J.,
WANG, Z.,
SMITH, A., and
ADAMS, J.:
"A Rough Comparison of the IETF and ATM Service Models," IEEE Network Magazine, vol. 9, pp. 12-16, Nov./Dec. 1995.



DABEK, F.,
BRUNSKILL, E.,
KAASHOEK, M.F.,
KARGER, D.,
MORRIS, R.,
STOICA, R., and
BALAKRISHNAN, H.:
"Building Peer-to-Peer Systems With Chord, a Distributed Lookup Service," Proc. 8th Workshop on Hot Topics in Operating Systems, IEEE, pp. 71-76, 2001a.



DABEK, F.,
KAASHOEK, M.F.,
KARGER, D.,
MORRIS, R., and
STOICA, I.:
"Wide-Area Cooperative Storage with CFS," Proc. 18th Symp. on Operating Systems Prin., ACM, pp. 202-15 , 2001b.



DAEMEN, J., and
RIJMEN, V.: The Design of Rijndael,
Berlin:
Springer-Verlag,
2002.



DANTHINE, A.A.S.:
"Protocol Representation with Finite-State Models," IEEE Trans. on Commun., vol. COM-28, pp. 632-643, April 1980.



DAVIDSON, J., and
PETERS, J.: Voice over IP Fundamentals,
Indianapolis, IN:
Cisco Press,
2000.



DAVIE, B., and
REKHTER, Y.: MPLS Technology and Applications,
San Francisco:
Morgan Kaufmann,
2000.



DAVIS, P.T., and
MCGUFFIN, C.R.: Wireless Local Area Networks,
New York:
McGraw-Hill,
1995.



DAVISON, B.D.:
"A Web Caching Primer," IEEE Internet Computing, vol. 5, pp. 38-45,
July-Aug. 2001.



DAY, J.D.:
"The (Un)Revised OSI Reference Model," Computer Commun. Rev., vol. 25, pp. 39-55,
Oct. 1995.



DAY, J.D., and
ZIMMERMANN, H.:
"The OSI Reference Model," Proc. of the IEEE, vol. 71, pp. 1334-1340, Dec. 1983.



DE VRIENDT, J.,
LAINE, P.,
LEROUGE, C, and
XU, X.:
"Mobile Network Evolution: A Revolution on the Move," IEEE Commun. Magazine, vol. 40, pp. 104-111, April 2002.



DEERING, S.E.:
"SIP: Simple Internet Protocol," IEEE Network Magazine, vol. 7, pp. 16-28, May/June 1993.



DEMERS, A.,
KESHAV, S., and
SHENKER, S.:
"Analysis and Simulation of a Fair Queueing Algorithm," Internetwork: Research and Experience, vol. 1, pp. 3-26, Sept. 1990.



DENNING, D.E., and
SACCO, G.M.:
"Timestamps in Key Distribution Protocols," Commun. of the ACM, vol. 24, pp. 533-536, Aug. 1981.



DIFFIE, W., and
HELLMAN, M.E.:
"Exhaustive Cryptanalysis of the NBS Data Encryption Standard," Computer, vol. 10, pp. 74-84, June 1977.



DIFFIE, W., and
HELLMAN, M.E.:
"New Directions in Cryptography," IEEE Trans. on Information Theory, vol. IT-22, pp. 644-654, Nov. 1976.



DIJKSTRA, E.W.:
"A Note on Two Problems in Connexion with Graphs," Numer. Math., vol. 1, pp. 269-271, Oct. 1959.



DOBROWSKI, G., and
GRISE, D.: ATM and SONET Basics,
Fuquay-Varina, NC:
APDG Telecom Books,
2001.



DONALDSON, G., and
JONES, D.:
"Cable Television Broadband Network Architectures," IEEE Commun. Magazine, vol. 39, pp. 122-126, June 2001.



DORFMAN, R.: "Detection of Defective Members of a Large Population," Annals Math. Statistics, vol. 14, pp. 436-440, 1943.



DOUFEXI, A.,
ARMOUR, S.,
BUTLER, M.,
NIX, A.,
BULL, D.,
MCGEEHAN, J., and
KARLSSON, P.:
"A Comparison of the HIPERLAN/2 and IEEE 802.11A Wireless LAN Standards," IEEE Commun. Magazine, vol. 40, pp. 172-180, May 2002.



DURAND, A.:
"Deploying IPv6," IEEE Internet Computing, vol. 5, pp. 79-81, Jan.-Feb. 2001.



DUTCHER, B.: The NAT Handbook,
New York:
Wiley,
2001.



DUTTA-ROY, A.:
"An Overview of Cable Modem Technology and Market Perspectives," IEEE Commun. Magazine, vol. 39, pp. 81-88, June 2001.



EASTTOM, C.: Learn JavaScript,
Ashburton, U.K.:
Wordware Publishing,
2001.



EL GAMAL, T.:
"A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms," IEEE Trans. on Information Theory, vol. IT-31, pp. 469-472, July 1985.



ELHANANY, I.,
KAHANE, M., and
SADOT, D.:
"Packet Scheduling in Next-Generation Multiterabit Networks," Computer, vol. 34, pp. 104-106, April 2001.



ELMIRGHANI, J.M.H., and
MOUFTAH, H.T.:
"Technologies and Architectures for Scalable Dynamic Dense WDM Networks," IEEE Commun. Magazine, vol. 38, pp. 58-66, Feb. 2000.



FARSEROTU, J., and
PRASAD, R.:
"A Survey of Future Broadband Multimedia Satellite Systems, Issues, and Trends," IEEE Commun. Magazine, vol. 38, pp. 128-133, June 2000.



FIORINI, D.,
CHIANI, M.,
TRALLI, V., and
SALATI., C.:
"Can we Trust HDLC?," Computer Commun. Rev., vol. 24, pp. 61-80, Oct. 1994.



FLOYD, S., and
JACOBSON, V.:
"Random Early Detection for Congestion Avoidance," IEEE/ACM Trans. on Networking, vol. 1, pp. 397-413, Aug. 1993.



FLUHRER, S.,
MANTIN, I., and
SHAMIR, A.:
"Weakness in the Key Scheduling Algorithm of RC4," Proc. Eighth Ann. Workshop on Selected Areas in Cryptography, 2001.



FORD, L.R., Jr., and
FULKERSON, D.R.: Flows in Networks,
Princeton, NJ:
Princeton University Press,
1962.



FORD, W., and
BAUM, M.S.: Secure Electronic Commerce,
Upper Saddle River, NJ:
Prentice Hall,
2000.



FORMAN, G.H., and
ZAHORJAN, J.:
"The Challenges of Mobile Computing," Computer, vol. 27, pp. 38-47, April 1994.



FRANCIS, P.:
"A Near-Term Architecture for Deploying Pip," IEEE Network Magazine, vol. 7, pp. 30-37, May/June 1993.



FRASER, A.G.:
"Towards a Universal Data Transport System," in Advances in Local Area Networks, Kummerle, K., Tobagi, F., and Limb, J.O. (Eds.),
New York:
IEEE Press,
1987.



FRENGLE, N.: I-Mode: A Primer,
New York:
Hungry Minds,
2002.



GADECKI, C., and
HECKERT, C.: ATM for Dummies,
New York:
Hungry Minds,
1997.



GARBER, L.:
"Will 3G Really Be the Next Big Wireless Technology?," Computer, vol. 35, pp. 26-32, Jan. 2002.



GARFINKEL, S., with
SPAFFORD, G.: Web Security, Privacy, and Commerce,
Sebastopol, CA:
O'Reilly,
2002.



GEIER, J.: Wireless LANs, 2nd ed.,
Indianapolis, IN:
Sams,
2002.



GEVROS, P.,
CROWCROFT, J.,
KIRSTEIN, P., and
BHATTI, S.:
"Congestion Control Mechanisms and the Best Effort Service Model," IEEE Network Magazine, vol. 15, pp. 16-25, May-June 2001.



GHANI, N., and
DIXIT, S.:
"TCP/IP Enhancements for Satellite Networks," IEEE Commun. Magazine, vol. 37, pp. 64-72, 1999.



GINSBURG, D.: ATM: Solutions for Enterprise Networking,
Boston:
Addison-Wesley,
1996.



GOODMAN, D.J.:
"The Wireless Internet: Promises and Challenges," Computer, vol. 33, pp. 36-41, July 2000.



GORALSKI, W.J.: Optical Networking and WDM,
New York:
McGraw-Hill,
2001.



GORALSKI, W.J.: SONET, 2nd ed.,
New York:
McGraw-Hill,
2000.



GORALSKI, W.J.: Introduction to ATM Networking,
New York:
McGraw-Hill,
1995.



GOSSAIN, H.,
DE MORAIS CORDEIRO, and
AGRAWAL, D.P.:
"Multicast: Wired to Wireless," IEEE Commun. Mag., vol. 40, pp. 116-123, June 2002.



GRAVANO, S.: Introduction to Error Control Codes,
Oxford, U.K.:
Oxford University Press,
2001.



GUO, Y., and
CHASKAR, H.:
"Class-Based Quality of Service over Air Interfaces in 4G Mobile Networks," IEEE Commun. Magazine, vol. 40, pp. 132-137, March 2002.



HAARTSEN, J.:
"The Bluetooth Radio System," IEEE Personal Commun. Magazine, vol. 7, pp. 28-36, Feb. 2000.



HAC, A.:
"Wireless and Cellular Architecture and Services," IEEE Commun. Magazine, vol. 33, pp. 98-104, Nov. 1995.



HAC, A., and
GUO, L.:
"A Scalable Mobile Host Protocol for the Internet," Int'l J. of Network Mgmt, vol. 10, pp. 115-134, May-June, 2000.



HALL, E., and
CERF, V.: Internet Core Protocols: The Definitive Guide,
Sebastopol, CA:
O'Reilly,
2000.



HAMMING, R.W.:
"Error Detecting and Error Correcting Codes," Bell System Tech. J., vol. 29, pp. 147-160, April 1950.



HANEGAN, K.: Custom CGI Scripting with Perl,
New York:
Wiley,
2001.



HARRIS, A.: JavaScript Programming for the Absolute Beginner,
Premier Press,
2001.



HARTE, L.,
KELLOGG, S.,
DREHER, R., and
SCHAFFNIT, T.: The Comprehensive Guide to Wireless Technology,
Fuquay-Varina, NC:
APDG Publishing,
2000.



HARTE, L.,
LEVINE, R., and
KIKTA, R.: 3G Wireless Demystified,
New York:
McGraw-Hill,
2002.



HAWLEY, G.T.:
"Historical Perspectives on the U.S. Telephone System," IEEE Commun. Magazine, vol. 29, pp. 24-28,
March 1991.



HECHT, J.:
"Understanding Fiber Optics,"
Upper Saddle River, NJ:
Prentice Hall, 2001.



HEEGARD, C.,
COFFEY, J.T.,
GUMMADI, S.,
MURPHY, P.A.,
PROVENCIO, R.,
ROSSIN, E.J.,
SCHRUM, S., and
SHOEMAKER, M.B.:
"High-Performance Wireless Ethernet," IEEE Commun. Magazine, vol. 39, pp. 64-73, Nov. 2001.



HELD, G.: The Complete Modem Reference, 2nd ed.,
New York:
Wiley,
1994.



HELLMAN, M.E.:
"A Cryptanalytic Time-Memory Tradeoff," IEEE Trans. on Information Theory, vol. IT-26, pp. 401-406, July 1980.



HILLS, A.:
"Large-Scale Wireless LAN Design," IEEE Commun. Magazine, vol. 39, pp. 98-104, Nov. 2001.



HOLZMANN, G.J.: Design and Validation of Computer Protocols,
Englewood Cliffs, NJ:
Prentice Hall,
1991.



HU, Y., and
LI, V.O.K.:
"Satellite-Based Internet Access," IEEE Commun. Magazine, vol. 39, pp. 155-162,
March 2001.



HU, Y.-C., and
JOHNSON, D.B.:
"Implicit Source Routes for On-Demand Ad Hoc Network Routing," Proc. ACM Int'l Symp. on Mobile Ad Hoc Networking & Computing, ACM, pp. 1-10, 2001.



HUANG, V., and
ZHUANG, W.:
"QoS-Oriented Access Control for 4G Mobile Multimedia CDMA Communications," IEEE Commun. Magazine, vol. 40, pp. 118-125, March 2002.



HUBER, J.F.,
WEILER, D., and
BRAND, H.:
"UMTS, the Mobile Multimedia Vision for IMT-2000: A Focus on Standardization," IEEE Commun. Magazine, vol. 38, pp. 129-136, Sept. 2000. nr u 0



HUI, J.:
"A Broadband Packet Switch for Multi-rate Services," Proc. Int'l Conf. on Commun., IEEE, pp. 782-788, 1987.



HUITEMA, C.: Routing in the Internet,
Englewood Cliffs, NJ:
Prentice Hall,
1995.



HULL, S.: Content Delivery Networks,
Berkeley, CA:
Osborne/McGraw-Hill,
2002.



HUMBLET, P.A.,
RAMASWAMI, R., and
SIVARAJAN, K.N.:
"An Efficient Communication Protocol for High-Speed Packet-Switched Multichannel Networks," Proc. SIGCOMM '92 Conf., ACM, pp. 2-13, 1992.



HUNTER, D.K., and
ANDONOVIC, I.:
"Approaches to Optical Internet Packet Switching," IEEE Commun. Magazine, vol. 38, pp. 116-122, Sept. 2000.



HUSTON, G.:
"TCP in a Wireless World," IEEE Internet Computing, vol. 5, pp. 82-84, March-April, 2001.



IBE, O.C.: Essentials of ATM Networks and Services,
Boston:
Addison-Wesley,
1997.



IRMER, T.:
"Shaping Future Telecommunications: The Challenge of Global Standardization," IEEE Commun. Magazine, vol. 32, pp. 20-28, Jan. 1994.



IZZO, P.: Gigabit Networks,
New York:
Wiley,
2000.



JACOBSON, V.:
"Congestion Avoidance and Control," Proc. SIGCOMM '88 Conf., ACM, pp. 314-329, 1988.



JAIN, R.:
"Congestion Control and Traffic Management in ATM Networks: Recent Advances and a Survey," Computer Networks and ISDN Systems, vol. 27, Nov. 1995.



JAIN, R.: FDDI HandbookHigh-Speed Networking Using Fiber and Other Media,
Boston:
Addison-Wesley,
1994.



JAIN, R.:
"Congestion Control in Computer Networks: Issues and Trends," IEEE Network Magazine, vol. 4, pp. 24-30, May/June 1990.



JAKOBSSON, M., and
WETZEL, S.:
"Security Weaknesses in Bluetooth," Topics in Cryptology: CT-RSA 2001,
Berlin:
Springer-Verlag LNCS 2020, pp. 176-191,
2001.



JOEL, A.:
"Telecommunications and the IEEE Communications Society," IEEE Commun. Magazine,
50th Anniversary Issue, pp. 6-14 and 162-167, May 2002.



JOHANSSON, P.,
KAZANTZIDIS, M.,
KAPOOR, R., and
GERLA, M.:
"Bluetooth: An Enabler for Personal Area Networking," IEEE Network Magazine, vol. 15, pp. 28-37, Sept.-Oct 2001.



JOHNSON, D.B.:
"Scalable Support for Transparent Mobile Host Internetworking," Wireless Networks, vol. 1, pp. 311-321, Oct. 1995.



JOHNSON, H.W.: Fast EthernetDawn of a New Network,
Englewood Cliffs, NJ:
Prentice Hall,
1996.



JOHNSON, N.F., and
JAJODA, S.:
"Exploring Steganography: Seeing the Unseen," Computer, vol. 31, pp. 26-34, Feb. 1998.



KAHN, D.:
"Cryptology Goes Public," IEEE Commun. Magazine, vol. 18, pp. 19-28, March 1980.



KAHN, D.: The Codebreakers, 2nd ed.,
New York:
Macmillan,
1995.



KAMOUN, F., and
KLEINROCK, L.:
"Stochastic Performance Evaluation of Hierarchical Routing for Large Networks," Computer Networks, vol. 3, pp. 337-353, Nov. 1979.



KAPP, S.:
"802.11: Leaving the Wire Behind," IEEE Internet Computing, vol. 6, pp. 82-85, Jan.-Feb. 2002.



KARN, P.:
"MACAA New Channel Access Protocol for Packet Radio," ARRL/CRRL Amateur Radio Ninth Computer Networking Conf., pp. 134-140, 1990.



KARTALOPOULOS, S.: Introduction to DWDM Technology: Data in a Rainbow,
New York, NY:
IEEE Communications Society,
1999.



KASERA, S.K.,
HJALMTYSSON, G.,
TOWLSEY, D.F., and
KUROSE, J.F.:
"Scalable Reliable Multicast Using Multiple Multicast Channels," IEEE/ACM Trans. on Networking, vol. 8, pp. 294-310, 2000.



KATZ, D., and
FORD, P.S.:
"TUBA: Replacing IP with CLNP," IEEE Network Magazine, vol. 7, pp. 38-47, May/June 1993.



KATZENBEISSER, S., and
PETITCOLAS, F.A.P.: Information Hiding Techniques for Steganography and Digital Watermarking,
London,
Artech House,
2000.



KAUFMAN, C.,
PERLMAN, R., and
SPECINER, M.: Network Security, 2nd ed.,
Englewood Cliffs, NJ:
Prentice Hall,
2002.



KELLERER, W.,
VOGEL, H.-J., and
STEINBERG, K.-E.:
"A Communication Gateway for Infrastructure-Independent 4G Wireless Access," IEEE Commun. Magazine, vol. 40, pp. 126-131, March 2002.



KERCKHOFF, A.:
"La Cryptographie Militaire," J. des Sciences Militaires, vol. 9, pp. 5-38, Jan. 1883 and pp. 161-191, Feb. 1883.



KIM, J.B.,
SUDA, T., and
YOSHIMURA, M.:
"International Standardization of B-ISDN," Computer Networks and ISDN Systems, vol. 27, pp. 5-27, Oct. 1994.



KIPNIS, J.:
"Beating the System: Abuses of the Standards Adoptions Process," IEEE Commun. Magazine, vol. 38, pp. 102-105, July 2000.



KLEINROCK, L.:
"On Some Principles of Nomadic Computing and Multi-Access Communications," IEEE Commun. Magazine, vol. 38, pp. 46-50, July 2000.



KLEINROCK, L., and
TOBAGI, F.:
"Random Access Techniques for Data Transmission over Packet-Switched Radio Channels," Proc. Nat. Computer Conf., pp. 187-201, 1975.



KRISHNAMURTHY, B., and
REXFORD, J.: Web Protocols and Practice,
Boston:
Addison-Wesley,
2001.



KUMAR, V.,
KORPI, M., and
SENGODAN, S.: IP Telephony with H.323,
New York:
Wiley,
2001.



KUROSE, J.F., and
ROSS, K.W.: Computer Networking: A Top-Down Approach Featuring the Internet,
Boston:
Addison-Wesley,
2001.



KWOK, T.:
"A Vision for Residential Broadband Service: ATM to the Home," IEEE Network Magazine, vol. 9, pp. 14-28, Sept./Oct. 1995.



KYAS, O., and
CRAWFORD, G.: ATM Networks,
Upper Saddle River, NJ:
Prentice Hall,
2002.



LAM, C.K.M., and
TAN, B.C.Y.:
"The Internet Is Changing the Music Industry," Commun. of the ACM, vol. 44, pp. 62-66, Aug. 2001.



LANSFORD, J.,
STEPHENS, A, and
NEVO, R.:
"Wi-Fi (802.11b) and Bluetooth: Enabling Coexistence," IEEE Network Magazine, vol. 15, pp. 20-27, Sept.-Oct 2001.



LASH, D.A.: The Web Wizard's Guide to Perl and CGI,
Boston:
Addison-Wesley,
2002.



LAUBACH, M.E.,
FARBER, D.J., and
DUKES, S.D.: Delivering Internet Connections over Cable,
New York:
Wiley,
2001.



LEE, J.S., and
MILLER, L.E.: CDMA Systems Engineering Handbook,
London:
Artech House,
1998.



LEEPER, D.G.:
"A Long-Term View of Short-Range Wireless," Computer, vol. 34, pp. 39-44, June 2001.



LEINER, B.M.,
COLE, R.,
POSTEL, J., and
MILLS, D.:
"The DARPA Internet Protocol Suite," IEEE Commun. Magazine, vol. 23, pp. 29-34, March 1985.



LEVINE, D.A., and
AKYILDIZ, I.A.:
"PROTON: A Media Access Control Protocol for Optical Networks with Star Topology," IEEE/ACM Trans. on Networking, vol. 3, pp. 158-168, April 1995.



LEVY, S.:
"Crypto Rebels," Wired, pp. 54-61,
May/June 1993.



LI, J.,
BLAKE, C.,
DE COUTO, D.S.J.,
LEE, H.I., and
MORRIS, R.:
"Capacity of Ad Hoc Wireless Networks," Proc. 7th Int'l Conf. on Mobile Computing and Networking, ACM, pp. 61-69, 2001.



LIN, F.,
CHU, P., and
LIU, M.:
"Protocol Verification Using Reachability Analysis: The State Space Explosion Problem and Relief Strategies," Proc. SIGCOMM '87 Conf., ACM, pp. 126-135, 1987.



LIN, Y.-D.,
HSU, N.-B., and
HWANG, R.-H.:
"QoS Routing Granularity in MPLS Networks" , IEEE Commun. Magazine, vol. 40, pp. 58-65, June 2002.



LISTANI, M.,
ERAMO, V., and
SABELLA, R.:
"Architectural and Technological Issues for Future Optical Internet Networks," IEEE Commun. Magazine, vol. 38, pp. 82-92, Sept. 2000.



LIU, C.L., and
LAYLAND, J.W.:
"Scheduling Algorithms for Multiprogramming in a Hard Real-Time Environment," Journal of the ACM, vol. 20, pp. 46-61, Jan. 1973.



LIVINGSTON, D.: Essential XML for Web Professionals,
Upper Saddle River, NJ:
Prentice Hall,
2002.



LOSHIN, P.: IPv6 Clearly Explained,
San Francisco:
Morgan Kaufmann,
1999.



LOUIS, P.J.: Broadband Crash Course,
New York:
McGraw-Hill,
2002.



LU, W.: Broadband Wireless Mobile: 3G and Beyond,
New York:
Wiley,
2002.



MACEDONIA, M.R.:
"Distributed File Sharing," Computer, vol. 33, pp. 99-101,
2000.



MADRUGA, E.L., and
GARCIA-LUNA-ACEVES, J.J.:
"Scalable Multicasting: the Core-Assisted Mesh Protocol," Mobile Networks and Applications, vol. 6, pp. 151-165, April 2001.



MALHOTRA, R.: IP Routing,
Sebastopol, CA:
O'Reilly,
2002.



MATSUI, M.:
"Linear Cryptanalysis Method for DES Cipher," Advances in Cryptology Eurocrypt '93 Proceedings,
Berlin:
Springer-Verlag LNCS 765, pp. 386-397, 1994.



MAUFER, T.A.: IP Fundamentals,
Upper Saddle River, NJ:
Prentice Hall,
1999.



MAZIERES, D., and
KAASHOEK, M.F.:
"The Design, Implementation, and Operation of an Email Pseudonym Server," Proc. Fifth Conf. on Computer and Commun. Security, ACM, pp. 27-36, 1998.



MAZIERES, D.,
KAMINSKY, M.,
KAASHOEK, M.F., and
WITCHEL, E.:
"Separating Key Management from File System Security," Proc. 17th Symp. on Operating Systems Prin., ACM, pp. 124-139, Dec. 1999.



MCFEDRIES, P: Using JavaScript,
Indianapolis, IN:
Que,
2001.



MCKENNEY, P.E., and
DOVE, K.F.:
"Efficient Demultiplexing of Incoming TCP Packets," Proc. SIGCOMM '92 Conf., ACM, pp. 269-279, 1992.



MELTZER, K., and
MICHALSKI, B.: Writing CGI Applications with Perl,
Boston:
Addison-Wesley,
2001.



MENEZES, A.J., and
VANSTONE, S.A.:
"Elliptic Curve Cryptosystems and Their Implementation," Journal of Cryptology, vol. 6, pp. 209-224, 1993.



MERKLE, R.C.:
"Fast Software Encryption Functions," Advances in Cryptology CRYPTO '90 Proceedings,
Berlin:
Springer-Verlag LNCS 473, pp. 476-501, 1991.



MERKLE, R.C., and
HELLMAN, M.:
"On the Security of Multiple Encryption," Commun. of the ACM, vol. 24, pp. 465-467,
July 1981.



MERKLE, R.C., and
HELLMAN, M.:
"Hiding and Signatures in Trapdoor Knapsacks," IEEE Trans. on Information Theory, vol. IT-24, pp. 525-530, Sept. 1978.



METCALFE, R.M.:
"On Mobile Computing," Byte, vol. 20, p. 110, Sept. 1995.



METCALFE, R.M.:
"Computer/Network Interface Design: Lessons from Arpanet and Ethernet," IEEE Journal on Selected Areas in Commun., vol. 11, pp. 173-179, Feb. 1993.



METCALFE, R.M., and
BOGGS, D.R.:
"Ethernet: Distributed Packet Switching for Local Computer Networks," Commun. of the ACM, vol. 19, pp. 395-404, July 1976.



METZ, C:
"Interconnecting ISP Networks," IEEE Internet Computing, vol. 5, pp. 74-80, March-April 2001.



METZ, C.:
"Differentiated Services," IEEE Multimedia Magazine, vol. 7, pp. 84-90, July-Sept. 2000.



METZ, C.:
"IP Routers: New Tool for Gigabit Networking," IEEE Internet Computing, vol. 2,
pp. 14-18, Nov.-Dec. 1998.



MILLER, B.A., and
BISDIKIAN, C.,: Bluetooth Revealed,
Upper Saddle River, NJ:
Prentice Hall,
2001.



MILLER, P., and
CUMMINS, M.: LAN Technologies Explained,
Woburn, MA:
Butterworth-Heinemann,
2000.



MINOLI, D.: Video Dialtone Technology,
New York:
McGraw-Hill,
1995.



MINOLI, D., and
VITELLA, M.: ATM & Cell Relay for Corporate Environments,
New York:
McGraw-Hill,
1994.



MISHRA, P.P., and
KANAKIA, H.:
"A Hop by Hop Rate-Based Congestion Control Scheme," Proc. SIGCOMM '92 Conf., ACM, pp. 112-123, 1992.



MISRA, A.,
DAS, S.,
DUTTA, A.,
MCAULEY, A., and
DAS, S.:
"IDMP-Based Fast Handoffs and Paging in IP-Based 4G Mobile Networks," IEEE Commun. Magazine, vol. 40, pp. 138-145, March 2002.



MOGUL, J.C.:
"IP Network Performance," in Internet System Handbook, Lynch, D.C. and Rose, M.T. (eds.),
Boston:
Addison-Wesley, pp. 575-675,
1993.



MOK, A.K., and
WARD, S.A.:
"Distributed Broadcast Channel Access," Computer Networks, vol. 3, pp. 327-335, Nov. 1979.



MOY, J.:
"Multicast Routing Extensions," Commun. of the ACM, vol. 37, pp. 61-66, AUg. 1994.



MULLINS, J.:
"Making Unbreakable Code," IEEE Spectrum, pp. 40-45,
May 2002.



NAGLE, J.:
"On Packet Switches with Infinite Storage," IEEE Trans. on Commun., vol. COM-35, pp. 435-438, April 1987.



NAGLE, J.:
"Congestion Control in TCP/IP Internetworks," Computer Commun. Rev., vol. 14, pp. 11-17, Oct. 1984.



NARAYANASWAMI, C.,
KAMIJOH, N.,
RAGHUNATH, M.,
INOUE, T.,
CIPOLLA, T.,
SANFORD, J.,
SCHLIG, E.,
VENTKITESWARAN, S.,
GUNIGUNTALA, D.,
KULKARNI, V., and
YAMAZAKI, K.:
"IBM's Linux Watch: The Challenge of Miniaturization," Computer, vol. 35, pp. 33-41, Jan. 2002.



NAUGHTON, J.:
"A Brief History of the Future,"
Woodstock, NY:
Overlook Press, 2000.



NEEDHAM, R.M., and
SCHROEDER, M.D.:
"Authentication Revisited," Operating Systems Rev., vol. 21, p. 7, Jan. 1987.



NEEDHAM, R.M., and
SCHROEDER, M.D.:
"Using Encryption for Authentication in Large Networks of Computers," Commun. of the ACM, vol. 21, pp. 993-999, Dec. 1978.



NELAKUDITI, S., and
ZHANG, Z.-L.:
"A Localized Adaptive Proportioning Approach to QoS Routing," IEEE Commun. Magazine vol. 40, pp. 66-71, June 2002.



NEMETH, E.,
SNYDER, G.,
SEEBASS, S., and
HEIN, T.R.: UNIX System Administration Handbook, 3rd ed.,
Englewood Cliffs, NJ:
Prentice Hall,
2000.



NICHOLS, R.K., and
LEKKAS, P.C.: Wireless Security,
New York:
McGraw-Hill,
2002.



NIST:
"Secure Hash Algorithm,"
U.S. Government Federal Information Processing Standard 180, 1993.



O'HARA, B., and
PETRICK, A.: 802.11 Handbook: A Designer's Companion,
New York:
IEEE Press,
1999.



OTWAY, D., and
REES, O.:
"Efficient and Timely Mutual Authentication," Operating Systems Rev., pp. 8-10,
Jan. 1987.



OVADIA, S.: Broadband Cable TV Access Networks: from Technologies to Applications,
Upper Saddle River, NJ:
Prentice Hall,
2001.



PALAIS, J.C.: Fiber Optic Commun., 3rd ed.,
Englewood Cliffs, NJ:
Prentice Hall,
1992.



PAN, D.:
"A Tutorial on MPEG/Audio Compression," IEEE Multimedia Magazine, vol. 2, pp.60-74, Summer 1995.



PANDYA, R.:
"Emerging Mobile and Personal Communication Systems," IEEE Commun. Magazine, vol. 33, pp. 44-52, June 1995.



PARAMESWARAN, M.,
SUSARLA, A., and
WHINSTON, A.B.:
"P2P Networking: An Information-Sharing Alternative," Computer, vol. 34, pp. 31-38, July 2001.



PARK, J.S., and
SANDHU, R.:
"Secure Cookies on the Web," IEEE Internet Computing, vol. 4, pp. 36-44, July-Aug. 2000.



PARTRIDGE, C.,
HUGHES, J., and
STONE, J.:
"Performance of Checksums and CRCs over Real Data," Proc. SIGCOMM '95 Conf., ACM, pp. 68-76, 1995.



PAXSON, V.:
"Growth Trends in Wide-Area TCP Connections," IEEE Network Magazine, vol. 8, pp. 8-17, July/Aug. 1994.



PAXSON, V., and
FLOYD, S.:
"Wide-Area Traffic: The Failure of Poisson Modeling," Proc. SIGCOMM '94 Conf., ACM, pp. 257-268, 1995.



PEPELNJAK, I., and
GUICHARD, J.: MPLS and VPN Architectures,
Indianapolis, IN:
Cisco Press,
2001.



PERKINS, C.E.: RTP: Audio and Video for the Internet,
Boston:
Addison-Wesley,
2002.


PERKINS, C.E. (ed.): Ad Hoc Networking,
Boston:
Addison-Wesley,
2001.



PERKINS, C.E.: Mobile IP Design Principles and Practices,
Upper Saddle River, NJ:
Prentice Hall,
1998a.



PERKINS, C.E.:
"Mobile Networking in the Internet," Mobile Networks and Applications, vol. 3, pp. 319-334,
1998b.



PERKINS, C.E.:
"Mobile Networking through Mobile IP," IEEE Internet Computing, vol. 2, pp. 58-69,
Jan.-Feb. 1998c.



PERKINS, C.E., and
ROYER, E.:
"The Ad Hoc On-Demand Distance-Vector Protocol," in Ad Hoc Networking, edited by C. Perkins,
Boston:
Addison-Wesley,
2001.



PERKINS, C.E., and
ROYER, E.:
"Ad-hoc On-Demand Distance Vector Routing," Proc. Second Ann. IEEE Workshop on Mobile Computing Systems and Applications, IEEE, pp. 90-100, 1999.



PERLMAN, R.: Interconnections, 2nd ed.,
Boston:
Addison-Wesley,
2000.



PERLMAN, R.: Network Layer Protocols with Byzantine Robustness, Ph.D. thesis, M.I.T.,
1988.



PERLMAN, R., and
KAUFMAN, C.:
"Key Exchange in IPsec," IEEE Internet Computing, vol. 4, pp. 50-56,
Nov.-Dec. 2000.



PETERSON, L.L., and
DAVIE, B.S.: Computer Networks: A Systems Approach,
San Francisco:
Morgan Kaufmann,
2000.



PETERSON, W.W., and
BROWN, D.T.:
"Cyclic Codes for Error Detection," Proc. IRE, vol. 49, pp. 228-235, Jan. 1961.



PICKHOLTZ, R.L.,
SCHILLING, D.L., and
MILSTEIN, L.B.:
"Theory of Spread Spectrum CommunicationA Tutorial," IEEE Trans. on Commun., vol. COM-30, pp. 855-884, May 1982.



PIERRE, G.,
KUZ, I.,
VAN STEEN, M.,
TANENBAUM, A.S.:
"Differentiated Strategies for Replicating Web Documents," Computer Commun., vol. 24, pp. 232-240,
Feb. 2001.



PIERRE, G.,
VAN STEEN, M., and
TANENBAUM, A.S.:
"Dynamically Selecting Optimal Distribution Strategies for Web Documents," IEEE Trans. on Computers, vol. 51, pp., June 2002.



PISCITELLO, D.M., and
CHAPIN, A.L.: Open Systems Networking: TCP/IP and OSI,
Boston:
Addison-Wesley,
1993.



PITT, D.A.:
"BridgingThe Double Standard," IEEE Network Magazine, vol. 2, pp. 94-95,
Jan. 1988.



PIVA, A.,
BARTOLINI, F., and
BARNI, M.:
"Managing Copyrights in Open Networks," IEEE Internet Computing, vol. 6, pp. 18-26,
May-June 2002.



POHLMANN, N.: Firewall Systems,
Bonn, Germany:
MITP-Verlag,
2001.



PUZMANOVA, R.: Routing and Switching: Time of Convergence?,
London:
AddisonWesley,
2002.



RABINOVICH, M., and
SPATSCHECK, O,: Web Caching and Replication,
Boston:
Addison-Wesley,
2002.



RAJU, J., and
GARCIA-LUNA-ACEVES, J.J.:
"Scenario-based Comparison of Source-Tracing and Dynamic Source Routing Protocols for Ad-Hoc Networks," ACM Computer Communications Review, vol. 31, October 2001.



RAMANATHAN, R., and
REDI, J.:
"A Brief Overview of Ad Hoc Networks: Challenges and Directions," IEEE Commun. Magazine,
50th Anniversary Issue, pp. 20-22,
May 2002.



RATNASAMY, S.,
FRANCIS, P.,
HANDLEY, M.,
KARP, R., and
SHENKER, S.:
"A Scalable Content-Addressable Network," Proc. SIGCOMM '01 Conf., ACM, pp. 1161-172, 2001.



RIVEST, R.L.:
"The MD5 Message-Digest Algorithm," RFC 1320, April 1992.



RIVEST, R.L., and
SHAMIR, A.:
"How to Expose an Eavesdropper," Commun. of the ACM, vol. 27, pp. 393-395, April 1984.



RIVEST, R.L.,
SHAMIR, A., and
ADLEMAN, L.:
"On a Method for Obtaining Digital Signatures and Public Key Cryptosystems," Commun. of the ACM, vol. 21, pp. 120-126,
Feb. 1978.



ROBERTS, L.G.:
"Dynamic Allocation of Satellite Capacity through Packet Reservation," Proc. NCC, AFIPS, pp. 711-716, 1973.



ROBERTS, L.G.:
"Extensions of Packet Communication Technology to a Hand Held Personal Terminal," Proc. Spring Joint Computer Conference, AFIPS, pp. 295-298, 1972.



ROBERTS, L.G.:
"Multiple Computer Networks and Intercomputer Communication," Proc. First Symp. on Operating Systems Prin., ACM, 1967.



ROSE, M.T.: The Simple Book,
Englewood Cliffs, NJ:
Prentice Hall,
1994.



ROSE, M.T.: The Internet Message,
Englewood Cliffs, NJ:
Prentice Hall,
1993.



ROSE, M.T., and
MCCLOGHRIE, K.: How to Manage Your Network Using SNMP,
Englewood Cliffs, NJ:
Prentice Hall,
1995.



ROWSTRON, A., and
DRUSCHEL, P.:
"Storage Management and Caching in PAST, a Large-Scale, Persistent Peer-to-Peer Storage Utility," Proc. 18th Symp. on Operating Systems Prin., ACM, pp. 188-201, 2001a.



ROWSTRON, A., and
DRUSCHEL, P.:
"Pastry: Scalable, Distributed Object Location and Routing for Large-Scale Peer-to-Peer Storage Utility," Proc. 18th Int'l Conf. on Distributed Systems Platforms, ACM/IFIP, 2001b.



ROYER, E.M., and
TOH, C.-K.:
"A Review of Current Routing Protocols for Ad-Hoc Mobile Wireless Networks," IEEE Personal Commun. Magazine, vol. 6, pp. 46-55, April 1999.



RUIZ-SANCHEZ, M.A.,
BIERSACK, E.W., and
DABBOUS, W.:
"Survey and Taxonomy of IP Address Lookup Algorithms," IEEE Network Magazine, vol. 15, pp. 8-23, March-April 2001.



SAIRAM, K.V.S.S.S.S.,
GUNASEKARAN, N., and
REDDY, S.R.:
"Bluetooth in Wireless Communication," IEEE Commun. Mag., vol. 40, pp. 90-96, June 2002.



SALTZER, J.H.,
REED, D.P., and
CLARK, D.D.:
"End-to-End Arguments in System Design," ACM Trans. on Computer Systems, vol. 2, pp. 277-288, Nov. 1984.



SANDERSON, D.W., and
DOUGHERTY, D.: Smileys,
Sebastopol, CA:
O'Reilly,
1993.



SARI, H.,
VANHAVERBEKE, F., and
MOENECLAEY, M.:
"Extending the Capacity of Multiple Access Channels," IEEE Commun. Magazine, vol. 38, pp. 74-82, Jan. 2000.



SARIKAYA, B.:
"Packet Mode in Wireless Networks: Overview of Transition to Third Generation," IEEE Commun. Magazine, vol. 38, pp. 164-172, Sept. 2000.



SCHNEIER, B.: Secrets and Lies,
New York:
Wiley,
2000.



SCHNEIER, B.: Applied Cryptography, 2nd ed.,
New York:
Wiley,
1996.



SCHNEIER, B.: E-Mail Security,
New York:
Wiley,
1995.



SCHNEIER, B.:
"Description of a New Variable-Length Key, 64-Bit Block Cipher [Blowfish]," Proc. of the Cambridge Security Workshop,
Berlin:
Springer-Verlag LNCS 809, pp. 191-204, 1994.



SCHNORR, C.P.:
"Efficient Signature Generation for Smart Cards," Journal of Cryptology, vol. 4, pp. 161-174, 1991.



SCHOLTZ, R.A.:
"The Origins of Spread-Spectrum Communications," IEEE Trans. on Commun., vol. COM-30, pp. 822-854, May 1982.



SCOTT, R.:
"Wide Open Encryption Design Offers Flexible Implementations," Cryptologia, vol. 9, pp. 75-90,
Jan. 1985.



SEIFERT, R.: The Switch Book,
Boston:
Addison-Wesley,
2000.



SEIFERT, R.: Gigabit Ethernet,
Boston:
Addison-Wesley,
1998.



SENN, J.A.:
"The Emergence of M-Commerce," Computer, vol. 33, pp. 148-150,
Dec. 2000.



SERJANTOV, A.:
"Anonymizing Censorship Resistant Systems," Proc. First Int'l Workshop on Peer-to-Peer Systems,
Berlin:
Springer-Verlag LNCS, 2002.



SEVERANCE, C.:
"IEEE 802.11: Wireless Is Coming Home," Computer, vol. 32, pp. 126-127, Nov. 1999.



SHAHABI, C.,
ZIMMERMANN, R.,
FU, K., and
YAO, S.-Y.D.:
"YIMA: A Second-Generation Continuous Media Server," Computer, vol. 35, pp. 56-64, June 2002.



SHANNON, C.:
"A Mathematical Theory of Communication," Bell System Tech. J., vol. 27, pp. 379-423, July 1948; and pp. 623-656, Oct. 1948.



SHEPARD, S.: SONET/SDH Demystified,
New York:
McGraw-Hill,
2001.



SHREEDHAR, M., and
VARGHESE, G.:
"Efficient Fair Queueing Using Deficit Round Robin," Proc. SIGCOMM '95 Conf., ACM, pp. 231-243, 1995.



SKOUDIS, E.: Counter Hack,
Upper Saddle River, NJ:
Prentice Hall,
2002.



SMITH, D.K., and
ALEXANDER, R.C.: Fumbling the Future,
New York:
William Morrow,
1988.



SMITH, R.W.: Broadband Internet Connections,
Boston:
Addison Wesley,
2002.



SNOEREN, A.C., and
BALAKRISHNAN, H.:
"An End-to-End Approach to Host Mobility," Int'l Conf. on Mobile Computing and Networking , ACM, pp. 155-166, 2000.



SOBEL, D.L.:
"Will Carnivore Devour Online Privacy," Computer, vol. 34, pp. 87-88,
May 2001.



SOLOMON, J.D.: Mobile IP: The Internet Unplugged,
Upper Saddle River, NJ:
Prentice Hall,
1998.



SPOHN, M., and
GARCIA-LUNA-ACEVES, J.J.:
"Neighborhood Aware Source Routing," Proc. ACM MobiHoc 2001, ACM, pp. 2001.



SPURGEON, C.E.: Ethernet: The Definitive Guide,
Sebastopol, CA:
O'Reilly,
2000.



STALLINGS, W.: Data and Computer Communications, 6th ed.,
Upper Saddle River, NJ:
Prentice Hall,
2000.



STEINMETZ, R., and
NAHRSTEDT, K.: Multimedia Fundamentals. Vol. 1: Media Coding and Content Processing,
Upper Saddle River, NJ:
Prentice Hall,
2002.



STEINMETZ, R., and
NAHRSTEDT, K.: Multimedia Fundamentals. Vol. 2: Media Processing and Communications,
Upper Saddle River, NJ:
Prentice Hall,
2003a.



STEINMETZ, R., and
NAHRSTEDT, K.: Multimedia Fundamentals. Vol. 3: Documents, Security, and Applications,
Upper Saddle River, NJ:
Prentice Hall,
2003b.



STEINER, J.G.,
NEUMAN, B.C., and
SCHILLER, J.I.:
"Kerberos: An Authentication Service for Open Network Systems," Proc. Winter USENIX Conf., USENIX, pp. 191-201, 1988.



STEVENS, W.R.: UNIX Network Programming, Volume 1: Networking APIs - Sockets and XTI,
Upper Saddle River, NJ:
Prentice Hall,
1997.



STEVENS, W.R.: TCP/IP Illustrated, Vol. 1,
Boston:
Addison-Wesley,
1994.



STEWART, R., and
METZ, C.:
"SCTP: New Transport Protocol for TCP/IP," IEEE Internet Computing, vol. 5, pp. 64-69, Nov.-Dec. 2001.



STINSON, D.R.: Cryptography Theory and Practice, 2nd ed.,
Boca Raton, FL:
CRC Press,
2002.



STOICA, I.,
MORRIS, R.,
KARGER, D.,
KAASHOEK, M.F., and
BALAKRISHNAN, H.:
"Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications," Proc. SIGCOMM '01 Conf., ACM, pp. 149-160, 2001.



STRIEGEL, A., and
MANIMARAN, G.:
"A Survey of QoS Multicasting Issues," IEEE Commun. Mag., vol. 40, pp. 82-87, June 2002.



STUBBLEFIELD, A.,
IOANNIDIS, J., and
RUBIN, A.D.:
"Using the Fluhrer, Mantin, and Shamir Attack to Break WEP," Proc Network and Distributed Systems Security Symp., ISOC, pp. 1-11, 2002.



SUMMERS, C.K.: ADSL: Standards, Implementation, and Architecture,
Boca Raton, FL:
CRC Press,
1999.



SUNSHINE, C.A., and
DALAL, Y.K.:
"Connection Management in Transport Protocols," Computer Networks, vol. 2, pp. 454-473, 1978.



TANENBAUM, A.S.: Modern Operating Systems,
Upper Saddle River, NJ:
Prentice Hall,
2001.



TANENBAUM, A.S., and
VAN STEEN, M.: Distributed Systems: Principles and Paradigms,
Upper Saddle River, NJ:
Prentice Hall,
2002.



TEGER, S., and
WAKS, D.J.:
"End-User Perspectives on Home Networking," IEEE Commun. Magazine, vol. 40, pp. 114-119, April 2002.



THYAGARAJAN, A.S., and
DEERING, S.E.:
"Hierarchical Distance-Vector Multicast Routing for the MBone," Proc. SIGCOMM '95 Conf., ACM, pp. 60-66, 1995.



TITTEL, E.,
VALENTINE, C.,
BURMEISTER, M., and
DYKES, L.: Mastering XHTML,
Alameda, CA:
Sybex,
2001.



TOKORO, M., and
TAMARU, K.:
"Acknowledging Ethernet," Compcon, IEEE, pp. 320-325, Fall
1977.



TOMLINSON, R.S.:
"Selecting Sequence Numbers," Proc. SIGCOMM/SIGOPS Inter-process Commun. Workshop, ACM, pp. 11-23, 1975.



TSENG, Y.-C.,
WU, S.-L.,
LIAO, W.-H., and
CHAO, C.-M.:
"Location Awareness in Ad Hoc Wireless Mobile Networks," Computer, vol. 34, pp. 46-51,
2001.



TUCHMAN, W.:
"Hellman Presents No Shortcut Solutions to DES," IEEE Spectrum, vol. 16, pp. 40-41, July 1979.



TURNER, J.S.:
"New Directions in Communications (or Which Way to the Information Age)," IEEE Commun. Magazine, vol. 24, pp. 8-15, Oct. 1986.



VACCA, J.R.: I-Mode Crash Course,
New York:
McGraw-Hill,
2002.



VALADE, J.,: PHP & MySQL for Dummies,
New York:
Hungry Minds,
2002.



VARGHESE, G., and
LAUCK, T.:
"Hashed and Hierarchical Timing Wheels: Data Structures for the Efficient Implementation of a Timer Facility," Proc. 11th Symp. on Operating Systems Prin., ACM, pp. 25-38, 1987.



VARSHNEY, U.,
SNOW, A.,
MCGIVERN, M., and
HOWARD, C.:
"Voice over IP," Commun. of the ACM, vol. 45, pp. 89-96, 2002.



VARSHNEY, U., and
VETTER, R.:
"Emerging Mobile and Wireless Networks," Commun. of the ACM, vol. 43, pp. 73-81, June 2000.



VETTER, P.,
GODERIS, D.,
VERPOOTEN, L., and
GRANGER, A.:
"Systems Aspects of APON/VDSL Deployment," IEEE Commun. Magazine, vol. 38, pp. 66-72, May 2000.



WADDINGTON, D.G., and
CHANG, F.:
"Realizing the Transition to IPv6," IEEE Commun. Mag., vol. 40, pp. 138-148, June 2002.



WALDMAN, M.,
RUBIN, A.D., and
CRANOR, L.F.:
"Publius: A Robust, Tamper-Evident, Censorship-Resistant, Web Publishing System," Proc. Ninth USENIX Security Symp., USENIX, pp. 59-72, 2000.



WANG, Y., and
CHEN, W.:
"Supporting IP Multicast for Mobile Hosts," Mobile Networks and Applications, vol. 6, pp. 57-66, Jan.-Feb. 2001.



WANG, Z.: Internet QoS,
San Francisco:
Morgan Kaufmann,
2001.



WARNEKE, B.,
LAST, M.,
LIEBOWITZ, B., and
PISTER, K.S.J.:
"Smart Dust: Communicating with a Cubic Millimeter Computer," Computer, vol. 34, pp. 44-51,
Jan. 2001.



WAYNER, P.: Disappearing Cryptography: Information Hiding, Steganography, and Watermarking, 2nd ed.,
San Francisco:
Morgan Kaufmann,
2002.



WEBB, W.:
"Broadband Fixed Wireless Access as a Key Component of the Future Integrated Communications Environment," IEEE Commun. Magazine, vol. 39, pp. 115-121, Sept. 2001.



WEISER, M.:
"Whatever Happened to the Next Generation Internet?," Commun. of the ACM, vol. 44, pp. 61-68, Sept. 2001.



WELTMAN, R., and
DAHBURA, T.: LDAP Programming with Java,
Boston:
AddisonWesley,
2000.



WESSELS, D.: Web Caching,
Sebastopol, CA:
O'Reilly,
2001.



WETTEROTH, D.: OSI Reference Model for Telecommunications,
New York:
McGraw-Hill,
2001.



WILJAKKA, J.:
"Transition to Ipv6 in GPRS and WCDMA Mobile Networks," IEEE Commun. Magazine, vol. 40, pp. 134-140, April 2002.



WILLIAMSON, H.: XML: The Complete Reference,
New York:
McGraw-Hill,
2001.



WILLINGER, W.,
TAQQU, M.S.,
SHERMAN, R., and
WILSON, D.V.:
"Self-Similarity through High Variability: Statistical Analysis of Ethernet LAN Traffic at the Source Level," Proc. SIGCOMM '95 Conf., ACM, pp. 100-113, 1995.



WRIGHT, D.J.: Voice over Packet Networks,
New York:
Wiley,
2001.



WYLIE, J.,
BIGRIGG, M.W.,
STRUNK, J.D.,
GANGER, G.R.,
KILICCOTE, H., and
KHOSLA, P.K.:
"Survivable Information Storage Systems," Computer, vol. 33, pp. 61-68, Aug. 2000.



XYLOMENOS, G.,
POLYZOS, G.C.,
MAHONEN, P., and
SAARANEN, M.:
"TCP Performance Issues over Wireless Links" , IEEE Commun. Magazine, vol. 39, pp. 52-58, April 2001.



YANG, C.-Q., and
REDDY, A.V.S.:
"A Taxonomy for Congestion Control Algorithms in Packet Switching Networks," IEEE Network Magazine, vol. 9, pp. 34-45, July/Aug. 1995.



YUVAL, G.:
"How to Swindle Rabin," Cryptologia, vol. 3, pp. 187-190, July 1979.



ZACKS, M.:
"Antiterrorist Legislation Expands Electronic Snooping," IEEE Internet Computing, vol. 5, pp. 8-9, Nov.-Dec. 2001.



ZADEH, A.N.,
JABBARI, B.,
PICKHOLTZ, R., and
VOJCIC, B.:
"Self-Organizing Packet Radio Ad Hoc Networks with Overlay (SOPRANO)," IEEE Commun. Mag., vol. 40, pp. 149-157, June 2002.



ZHANG, L.:
"Comparison of Two Bridge Routing Approaches," IEEE Network Magazine, vol. 2, pp. 44-48, Jan./Feb. 1988.



ZHANG, L.:
"RSVP: A New Resource ReSerVation Protocol," IEEE Network Magazine, vol. 7, pp. 8-18, Sept./Oct. 1993.



ZHANG, Y., and
RYU, B.:
"Mobile and Multicast IP Services in PACS: System Architecture, Prototype, and Performance," Mobile Networks and Applications, vol. 6, pp. 81-94, Jan.-Feb. 2001.



ZIMMERMANN, P.R.: The Official PGP User's Guide,
Cambridge, MA:
M.I.T. Press,
1995a.



ZIMMERMANN, P.R.: PGP: Source Code and Internals,
Cambridge, MA:
M.I.T. Press,
1995b.



ZIPF, G.K.: Human Behavior and the Principle of Least Effort: An Introduction to Human Ecology,
Boston:
Addison-Wesley,
1949.



ZIV, J., and
LEMPEL, Z.:
"A Universal Algorithm for Sequential Data Compression," IEEE Trans. on Information Theory, vol. IT-23, pp. 337-343, May 1977.


/ 81