Sciweavers

828 search results - page 86 / 166
» A Network Coding Approach to Secret Key Distribution
Sort
View
IWCMC
2006
ACM
15 years 9 months ago
Resolving islands of security problem for DNSSEC
The DNS Security Extensions (DNSSEC) were developed to add origin authentication and integrity. DNSSEC defined a public key infrastructure over DNS tree hierarchy for the public ...
Eunjong Kim, Ashish Gupta, Batsukh Tsendjav, Danie...
COMCOM
2006
194views more  COMCOM 2006»
15 years 3 months ago
INSENS: Intrusion-tolerant routing for wireless sensor networks
This paper describes an INtrusion-tolerant routing protocol for wireless SEnsor NetworkS (INSENS). INSENS securely and efficiently constructs tree-structured routing for wireless ...
Jing Deng, Richard Han, Shivakant Mishra
IWDC
2004
Springer
156views Communications» more  IWDC 2004»
15 years 8 months ago
Agent-Based Distributed Intrusion Alert System
Intrusion detection for computer systems is a key problem in today’s networked society. Current distributed intrusion detection systems (IDSs) are not fully distributed as most o...
Arjita Ghosh, Sandip Sen
ICDCS
1999
IEEE
15 years 7 months ago
HiFi: A New Monitoring Architecture for Distributed Systems Management
With the increasing complexity of large-scale distributed (LSD) systems, an efficient monitoring mechanism has become an essential service for improving the performance and reliab...
Ehab S. Al-Shaer, Hussein M. Abdel-Wahab, Kurt Mal...
ICDCS
2006
IEEE
15 years 9 months ago
Utility Optimization for Event-Driven Distributed Infrastructures
Event-driven distributed infrastructures are becoming increasingly important for information dissemination and application integration. We examine the problem of optimal resource ...
Cristian Lumezanu, Sumeer Bhola, Mark Astley