Sciweavers

337 search results - page 27 / 68
» Attack Resiliency of Network Topologies
Sort
View
SASN
2004
ACM
15 years 4 months ago
Location-aware key management scheme for wireless sensor networks
Sensor networks are composed of a large number of low power sensor devices. For secure communication among sensors, secret keys must be established between them. Recently, several...
Dijiang Huang, Manish Mehta 0003, Deep Medhi, Lein...
COMCOM
2006
100views more  COMCOM 2006»
14 years 10 months ago
A secure alternate path routing in sensor networks
This paper presents a secure alternate path routing in sensor networks. Our alternate path scheme makes the routing protocol resilient in the presence of malicious nodes that laun...
Suk-Bok Lee, Yoon-Hwa Choi
SAC
2010
ACM
15 years 5 months ago
CAPTCHA smuggling: hijacking web browsing sessions to create CAPTCHA farms
CAPTCHAs protect online resources and services from automated access. From an attacker’s point of view, they are typically perceived as an annoyance that prevents the mass creat...
Manuel Egele, Leyla Bilge, Engin Kirda, Christophe...
CCS
2009
ACM
15 years 5 months ago
ShadowWalker: peer-to-peer anonymous communication using redundant structured topologies
Peer-to-peer approaches to anonymous communication promise to eliminate the scalability concerns and central vulnerability points of current networks such as Tor. However, the P2P...
Prateek Mittal, Nikita Borisov
GLOBECOM
2008
IEEE
15 years 5 months ago
WONDER: A PON over a Folded Bus
— Passive Optical Networks (PONs) represent a step forward in “first mile” networks; indeed, by using optical technologies, PONs can transfer a large amount of data, and by ...
Andrea Bianco, Davide Cuda, Jorge M. Finochietto, ...