Sciweavers

286 search results - page 27 / 58
» Analyzing the vulnerability of superpeer networks against at...
Sort
View
ICDCS
2006
IEEE
15 years 7 months ago
Robust Accounting in Decentralized P2P Storage Systems
A peer-to-peer (P2P) storage system allows a network of peer computers to increase the availability of their data by replicating it on other peers in the network. In such networks...
Ivan Osipkov, Peng Wang, Nicholas Hopper
MOBISYS
2009
ACM
16 years 1 months ago
Attacks on public WLAN-based positioning systems
In this work, we study the security of public WLAN-based positioning systems. Specifically, we investigate the Skyhook positioning system, available on PCs and used on a number of...
Nils Ole Tippenhauer, Kasper Bonne Rasmussen, Chri...
JSAC
2006
121views more  JSAC 2006»
15 years 1 months ago
Secure localization and authentication in ultra-wideband sensor networks
The recent Federal Communications Commission regulations for ultra-wideband (UWB) transmission systems have sparked a surge of research interests in the UWB technology. One of the ...
Yanchao Zhang, Wei Liu, Yuguang Fang, Dapeng Wu
ICC
2007
IEEE
115views Communications» more  ICC 2007»
15 years 7 months ago
Security Analysis of IEEE 802.16
— This paper analyzes some critical security issues in the family of IEEE 802.16 standard that has not been addressed so far. In particular two of the key features of the standar...
Leonardo Maccari, Matteo Paoli, Romano Fantacci
CCS
2008
ACM
15 years 3 months ago
A look in the mirror: attacks on package managers
This work studies the security of ten popular package managers. These package managers use different security mechanisms that provide varying levels of usability and resilience to...
Justin Cappos, Justin Samuel, Scott M. Baker, John...