Sciweavers

702 search results - page 49 / 141
» An overlay approach to data security in ad-hoc networks
Sort
View
MOBILITY
2009
ACM
15 years 4 months ago
A membership management protocol for mobile P2P networks
MANETs are self-organizing networks composed of mobile wireless nodes with often scarce resources. Distributed applications based on the P2P paradigm are by nature good candidates...
Mohamed Karim Sbai, Emna Salhi, Chadi Barakat
ICDE
2010
IEEE
258views Database» more  ICDE 2010»
15 years 4 months ago
Anonymized Data: Generation, models, usage
Data anonymization techniques have been the subject of intense investigation in recent years, for many kinds of structured data, including tabular, item set and graph data. They e...
Graham Cormode, Divesh Srivastava
CSREASAM
2006
14 years 11 months ago
Agent-based Distributed Intrusion Detection Methodology for MANETs
Intrusion detection, as a complementary mechanism to intrusion prevention, is necessary to secure wireless Mobile Ad hoc Networks (MANETs). In this paper we propose a practical age...
Hongmei Deng, Roger Xu, Frank Zhang, Chiman Kwan, ...
WORDS
2005
IEEE
15 years 3 months ago
An Adaptable Security Framework for Service-based Systems
A major advantage of service-based computing technology is the ability to enable rapid formation of large-scale distributed systems by composing massively available services to ac...
Stephen S. Yau, Yisheng Yao, Zhaoji Chen, Luping Z...
MINENET
2006
ACM
15 years 3 months ago
Diagnosis of TCP overlay connection failures using bayesian networks
When failures occur in Internet overlay connections today, it is difficult for users to determine the root cause of failure. An overlay connection may require TCP connections bet...
George J. Lee, Lindsey Poole