Sciweavers

610 search results - page 76 / 122
» Application-level Simulation for Network Security
Sort
View
ICC
2007
IEEE
144views Communications» more  ICC 2007»
15 years 4 months ago
On Mitigating In-band Wormhole Attacks in Mobile Ad Hoc Networks
— Colluding malicious insider nodes with no special hardware capability can use packet encapsulation and tunnelling to create bogus short-cuts (in-band wormholes) in routing path...
Xu Su, Rajendra V. Boppana
ISCC
2006
IEEE
15 years 3 months ago
Layered Multicast Data Origin Authentication and Non-repudiation over Lossy Networks
— Security and QoS are two main issues for a successful wide deployment of multicast services. For instance, in a multicast streaming application, a receiver would require a data...
Yoann Hinard, Hatem Bettahar, Yacine Challal, Abde...
CN
2004
122views more  CN 2004»
14 years 9 months ago
Explicit transport error notification (ETEN) for error-prone wireless and satellite networks
This paper is a summary of the BBN Technical Report No. 8333, "Explicit Transport Error Notification for Error-Prone Wireless and Satellite Networks." In this study we di...
Rajesh Krishnan, James P. G. Sterbenz, Wesley M. E...
ICRA
2005
IEEE
166views Robotics» more  ICRA 2005»
15 years 3 months ago
Bilateral Teleoperation of Multiple Cooperative Robots over Delayed Communication Networks: Theory
Abstract— We propose a control framework for the bilateral teleoperation between a single master robot and multiple cooperative slave robots with communication-delay in the maste...
Dongjun Lee, Mark W. Spong
INFOCOM
2006
IEEE
15 years 3 months ago
Session Privacy Enhancement by Traffic Dispersion
— Traditional network routing uses the single (shortest) path paradigm. This paradigm leaves the session vulnerable to a variety of security threats, such as eavesdropping. We pr...
Haim Zlatokrilov, Hanoch Levy