Proceedings of the 2001 American Control Conference. (Cat. No.01CH37148) 2001
DOI: 10.1109/acc.2001.946017
|View full text |Cite
|
Sign up to set email alerts
|

Preliminary results in routing games

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
35
0

Year Published

2005
2005
2013
2013

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 26 publications
(35 citation statements)
references
References 9 publications
0
35
0
Order By: Relevance
“…The most related results presented in the literature are [5,17,19,20]. In [17], users send their request either to the server or to the other users rather than directly to the server.…”
Section: Literature Reviewmentioning
confidence: 99%
See 2 more Smart Citations
“…The most related results presented in the literature are [5,17,19,20]. In [17], users send their request either to the server or to the other users rather than directly to the server.…”
Section: Literature Reviewmentioning
confidence: 99%
“…In [17], users send their request either to the server or to the other users rather than directly to the server. In [5], the author first proposed SSR (Security Stochastic Routing), which takes multiple paths with some probability instead of single path routing. In [19,20], the author extends the result in [5] by considering more general attacks.…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…Finding the least-cost path in their problem is analogous to finding a best defense strategy. Hespanha & Bohacek in [30] discussed routing games in which an adversary tries to intersect data packets in a computer network. The designer of the network has to find routing policies that avoid links that are under the attacker's surveillance.…”
Section: Related Workmentioning
confidence: 99%
“…The distributed solution enhances traditional centralized solutions for secure multipath routing such as [4], [6], [18] in different ways. First, it does not require any network node to have full knowledge of the entire network topology.…”
Section: Introductionmentioning
confidence: 99%