Sciweavers

2162 search results - page 331 / 433
» A Meta-Notation for Protocol Analysis
Sort
View
ICNP
2007
IEEE
15 years 4 months ago
Location Privacy in Sensor Networks Against a Global Eavesdropper
— While many protocols for sensor network security provide confidentiality for the content of messages, contextual information usually remains exposed. Such information can be c...
K. Mehta, Donggang Liu, Matthew Wright
ICNP
2007
IEEE
15 years 4 months ago
A Game Theoretic Framework of Distributed Power and Rate Control in IEEE 802.11 WLANs
—We present a game-theoretic study on the power and rate control problem in IEEE 802.11 WLANs where network participants choose appropriate transmission power and data rate to ac...
Lin Chen, Jean Leneutre
ICNP
2007
IEEE
15 years 4 months ago
Network-based and Attack-resilient Length Signature Generation for Zero-day Polymorphic Worms
—It is crucial to detect zero-day polymorphic worms and to generate signatures at the edge network gateways or honeynets so that we can prevent the worms from propagating at thei...
Zhichun Li, Lanjia Wang, Yan Chen, Zhi Fu
ICON
2007
IEEE
15 years 4 months ago
Potential Impacts of Four-Byte AS Numbers in Partial Deployment
—Inter-domain routing is suffering from the lack of identifiers for the rapidly growing number of Autonomous Systems (AS), and therefore the 4-byte AS number has been proposed a...
Yuncheng Zhu, Junxiu Lu, Maoke Chen
ICPP
2007
IEEE
15 years 4 months ago
Towards Location-aware Topology in both Unstructured and Structured P2P Systems
A self-organizing peer-to-peer system is built upon an application level overlay, whose topology is independent of underlying physical network. A well-routed message path in such ...
Tongqing Qiu, Guihai Chen, Mao Ye, Edward Chan, Be...