Sciweavers

1677 search results - page 271 / 336
» A distributed security scheme for ad hoc networks
Sort
View
INFOCOM
2008
IEEE
15 years 4 months ago
A Hybrid Rogue Access Point Protection Framework for Commodity Wi-Fi Networks
—We develop a practical and comprehensive hybrid rogue access point (AP) detection framework for commodity WiFi networks. It is the first scheme that combines the distributed wi...
Liran Ma, Amin Y. Teymorian, Xiuzhen Cheng
INFOCOM
2009
IEEE
15 years 4 months ago
Dependable and Secure Sensor Data Storage with Dynamic Integrity Assurance
Abstract—Recently, distributed data storage has gained increasing popularity for efficient and robust data management in wireless sensor networks (WSNs). But the distributed arc...
Qian Wang, Kui Ren, Wenjing Lou, Yanchao Zhang
JNW
2008
182views more  JNW 2008»
14 years 10 months ago
Evaluating the Performance of Fast Handover for Hierarchical MIPv6 in Cellular Networks
Next-Generation Wireless Networks (NGWNs) present an all-IP-based architecture integrating existing cellular networks with Wireless Local Area Networks (WLANs), Wireless Metropolit...
Li Jun Zhang, Samuel Pierre
IMC
2009
ACM
15 years 4 months ago
ANTIDOTE: understanding and defending against poisoning of anomaly detectors
Statistical machine learning techniques have recently garnered increased popularity as a means to improve network design and security. For intrusion detection, such methods build ...
Benjamin I. P. Rubinstein, Blaine Nelson, Ling Hua...
ICNP
2003
IEEE
15 years 3 months ago
On the Utility of Distributed Cryptography in P2P and MANETs: The Case of Membership Control
Peer-to-peer systems enable efficient resource aggregation and are inherently scalable since they do not depend on any centralized authority. However, lack of a centralized autho...
Maithili Narasimha, Gene Tsudik, Jeong Hyun Yi