Sciweavers

350 search results - page 70 / 70
» Accelerating Key Establishment Protocols for Mobile Communic...
Sort
View
INFOCOM
2008
IEEE
14 years 5 days ago
Sensor-Aided Overlay Deployment and Relocation for Vast-Scale Sensor Networks
—The overlay-based network architecture has been recognized as an effective way to deal with the funneling effect in sensor networks, where sensors closer to the sink are usually...
Guanqun Yang, Bin Tong, Daji Qiao, Wensheng Zhang
SASN
2003
ACM
13 years 11 months ago
Admission control in Peer-to-Peer: design and performance evaluation
Peer-to-Peer (P2P) applications and services are very common in today’s computing. The popularity of the P2P paradigm prompts the need for specialized security services which ma...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
ICNP
2007
IEEE
14 years 2 days ago
Design and Implementation of Cross-Domain Cooperative Firewall
Security and privacy are two major concerns in supporting roaming users across administrative domains. In current practices, a roaming user often uses encrypted tunnels, e.g., Virt...
Jerry Cheng, Hao Yang, Starsky H. Y. Wong, Petros ...
TON
2008
108views more  TON 2008»
13 years 5 months ago
Impact of denial of service attacks on ad hoc networks
Significant progress has been made towards making ad hoc networks secure and DoS resilient. However, little attention has been focused on quantifying DoS resilience: Do ad hoc netw...
Imad Aad, Jean-Pierre Hubaux, Edward W. Knightly
MTA
2011
220views Hardware» more  MTA 2011»
13 years 21 days ago
Modeling, simulation, and practice of floor control for synchronous and ubiquitous collaboration
: With the advances in a variety of software/hardware technologies and wireless networking, there is coming a need for ubiquitous collaboration which allows people to access inform...
Kangseok Kim, Geoffrey C. Fox