Sciweavers

702 search results - page 79 / 141
» An overlay approach to data security in ad-hoc networks
Sort
View
TRIDENTCOM
2008
IEEE
15 years 4 months ago
A case study in testing a network security algorithm
Several difficulties arise when testing network security algorithms. First, using network data captured at a router does not guarantee that any instances of the security event of...
Carrie Gates
CISIS
2009
IEEE
15 years 4 months ago
Integration of Shareable Containers with Distributed Hash Tables for Storage of Structured and Dynamic Data
Structured, spatial-temporal data arises in many applications areas such as transportation, sensor networks or mobile services. Peer to peer networks are the natural choice for th...
eva Kühn, Richard Mordinyi, Hannu-D. Goiss, T...
AIMS
2008
Springer
15 years 4 months ago
N2N: A Layer Two Peer-to-Peer VPN
The Internet was originally designed as a flat data network delivering a multitude of protocols and services between equal peers. Currently, after an explosive growth fostered by ...
Luca Deri, Richard Andrews
COMCOM
2004
83views more  COMCOM 2004»
14 years 9 months ago
Breaking network security based on synchronized chaos
Very recently, the use of chaos synchronization as a means of masking information data in a network has been proposed. Although it is claimed that the security breach is not possi...
Gonzalo Álvarez, Shujun Li
TON
2010
210views more  TON 2010»
14 years 4 months ago
A New Approach to Optical Networks Security: Attack-Aware Routing and Wavelength Assignment
Abstract-- Security issues and attack management in transparent WDM (Wavelength Division Multiplexing) optical networks has become of prime importance to network operators due to t...
Nina Skorin-Kapov, J. Chen, Lena Wosinska