• Publications
  • Influence
Secure group communications using key graphs
Many emerging network applications are based upon a group communications model. As a result, securing group communications, i.e., providing confidentiality, authenticity, and integrity of messagesExpand
  • 1,133
  • 152
Secure group communications using key graphs
Many emerging applications (e.g., teleconference, real-time information services, pay per view, distributed interactive simulation, and collaborative work) are based upon a group communicationsExpand
  • 820
  • 65
A line in the sand: a wireless sensor network for target detection, classification, and tracking
Intrusion detection is a surveillance problem of practical import that is well suited to wireless sensor networks. In this paper, we study the application of sensor networks to the intrusionExpand
  • 948
  • 38
Closure and Convergence: A Foundation of Fault-Tolerant Computing
The authors formally define what it means for a system to tolerate a class of faults. The definition consists of two conditions. The first is that if a fault occurs when the system state is withinExpand
  • 291
  • 30
Reliable bursty convergecast in wireless sensor networks
We address the challenges of bursty convergecast in multi-hop wireless sensor networks, where a large burst of packets from different locations needs to be transported reliably and in real-time to aExpand
  • 272
  • 24
Distributed Reset
A reset subsystem is designed that can be embedded in an arbitrary distributed system in order to allow the system processes to reset the system when necessary. Our design is layered, and comprisesExpand
  • 288
  • 18
Batch rekeying for secure group communications
Many emerging web and Internet applications are based on a group communications model. Thus, securing group communications is an important Internet design issue. The key graph approach has beenExpand
  • 278
  • 18
ExScal: elements of an extreme scale wireless sensor network
Project ExScal (for extreme scale) fielded a 1000+ node wireless sensor network and a 200+ node peer-to-peer ad hoc network of 802.11 devices in a 13km by 300m remote area in Florida, USA duringExpand
  • 369
  • 17
The Theory of Weak Stabilization
  • M. Gouda
  • Computer Science
  • WSS
  • 1 October 2001
We investigate a new property of computing systems called weak stabilization. Although this property is strictly weaker than the well-known property of stabilization, weak stabilization is superiorExpand
  • 71
  • 15
Firewall design: consistency, completeness, and compactness
  • M. Gouda, Alex X. Liu
  • Computer Science
  • 24th International Conference on Distributed…
  • 24 March 2004
A firewall is often placed at the entrance of each private network in the Internet. The function of a firewall is to examine each packet that passes through the entrance and decide whether to acceptExpand
  • 204
  • 14