Sciweavers

610 search results - page 8 / 122
» Application-level Simulation for Network Security
Sort
View
TRIDENTCOM
2008
IEEE
15 years 4 months ago
A case study in testing a network security algorithm
Several difficulties arise when testing network security algorithms. First, using network data captured at a router does not guarantee that any instances of the security event of...
Carrie Gates
WORDS
2003
IEEE
15 years 2 months ago
Towards the Delay and Synchronization Control for Networked Real-Time Multi-Object Multimedia Applications
Due to the lack of QoS support, ensuring an acceptable application level QoS for the real-time delivery of multiobject multimedia presentations on the current Internet is very cha...
Haining Liu, Magda El Zarki
TMC
2012
13 years 1 days ago
Protecting Location Privacy in Sensor Networks against a Global Eavesdropper
— While many protocols for sensor network security provide confidentiality for the content of messages, contextual information usually remains exposed. Such information can be c...
Kiran Mehta, Donggang Liu, Matthew Wright
KIVS
2007
Springer
15 years 3 months ago
Key Exchange for Service Discovery in Secure Content Addressable Sensor Networks
Abstract. Secure Content Addressable Network (SCAN) is an architecture for service discovery in service centric sensor networks that enables dynamic service composition. This paper...
Hans-Joachim Hof, Ingmar Baumgart, Martina Zitterb...
80
Voted
IAW
2003
IEEE
15 years 2 months ago
Security Vulnerabilities in Command and Control Interoperability
- This paper will outline issues associated with communication system interoperability, the security vulnerabilities associated with improved interoperability, network simulation t...
John A. Hamilton Jr.