Sciweavers

263 search results - page 43 / 53
» Adaptive Defense Against Various Network Attacks
Sort
View
IWAN
2004
Springer
15 years 2 months ago
Secure, Customizable, Many-to-One Communication
Concast is a customizable many-to-one network-layer communication service. Although programmable services like concast can improve the efficiency of group applications, accompanyi...
Kenneth L. Calvert, Jim Griffioen, Billy Mullins, ...
BROADNETS
2006
IEEE
15 years 3 months ago
Securing Sensor Networks Using A Novel Multi-Channel Architecture
— In many applications of sensor networks, security is a very important issue. To be resistant against the various attacks, nodes in a sensor network can establish pairwise secre...
Chao Gui, Ashima Gupta, Prasant Mohapatra
SEMWEB
2004
Springer
15 years 2 months ago
Personalized Reputation Management in P2P Networks
P2P networks have become increasingly popular in the recent years. However, their open, distributed and anonymous nature makes them very vulnerable against malicious users who prov...
Paul-Alexandru Chirita, Wolfgang Nejdl, Mario T. S...
BIOWIRE
2007
Springer
15 years 3 months ago
The Topological Fortress of Termites
Abstract. Termites are known for building some of the most elaborate architectures observed in the animal world. We here analyse some topological properties of three dimensional ne...
Andrea Perna, Christian Jost, Sergi Valverde, Jacq...
SCN
2008
Springer
147views Communications» more  SCN 2008»
14 years 9 months ago
Privacy-preserving secure relative localization in vehicular networks
Relative location information helps build vehicle topology maps. Such maps provide location information of nearby vehicles to drivers. In building a vehicle topology, one must cons...
Lei Tang, Xiaoyan Hong, Phillip G. Bradford