Sciweavers

610 search results - page 30 / 122
» Application-level Simulation for Network Security
Sort
View
NOSSDAV
2009
Springer
15 years 4 months ago
Cross-tree adjustment for spatialized audio streaming over networked virtual environments
In recent years, integrated spatialized voice services have become an appealing application for networked virtual environments (NVE), e.g., Second Life. With a spatialized voice s...
Ke Liang, Roger Zimmermann
CCS
2009
ACM
15 years 4 months ago
NISAN: network information service for anonymization networks
Network information distribution is a fundamental service for any anonymization network. Even though anonymization and information distribution about the network are two orthogona...
Andriy Panchenko, Stefan Richter, Arne Rache
ISDA
2005
IEEE
15 years 3 months ago
IDEAS: Intrusion Detection based on Emotional Ants for Sensors
Due to the wide deployment of sensor networks recently security in sensor networks has become a hot research topic. Popular ways to secure a sensor network are by including crypto...
Soumya Banerjee, Crina Grosan, Ajith Abraham
GLOBECOM
2007
IEEE
15 years 4 months ago
Secure Key Management Architecture Against Sensor-Node Fabrication Attacks
Abstract—In lightweight mobile ad hoc networks, both probabilistic and deterministic key management schemes are fragile to node fabrication attacks. Our simulation results show t...
Jeffrey S. Dwoskin, Dahai Xu, Jianwei Huang, Mung ...
MOBIHOC
2003
ACM
15 years 9 months ago
ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks
In hostile environments, the enemy can launch traffic analysis against interceptable routing information embedded in routing messages and data packets. Allowing adversaries to tra...
Jiejun Kong, Xiaoyan Hong