Sciweavers

337 search results - page 50 / 68
» Attack Resiliency of Network Topologies
Sort
View
SIMUTOOLS
2008
15 years 4 days ago
Realistic simulation environments for IP-based networks
During development of new protocols and systems researchers in most cases use simulations for evaluation of their product, especially in the area of communication networks. The qu...
Thomas Gamer, Michael Scharf
ICDCS
2008
IEEE
15 years 5 months ago
A Sophisticated Privacy-Enhanced Yet Accountable Security Framework for Metropolitan Wireless Mesh Networks
— Recently, multi-hop wireless mesh networks (WMNs) have attracted increasing attention and deployment as a low-cost approach to provide broadband Internet access at metropolitan...
Kui Ren, Wenjing Lou
IPCCC
2005
IEEE
15 years 4 months ago
Key management in wireless ad hoc networks: collusion analysis and prevention
Due to the dynamic nature of WAHN communications and the multi-node involvement in most WAHN applications, group key management has been proposed for efficient support of secure c...
Mohamed F. Younis, Kajaldeep Ghumman, Mohamed Elto...
INFOCOM
2008
IEEE
15 years 5 months ago
On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks
—We argue that the traditional notion of trust as a relation among entities, while useful, becomes insufficient for emerging data-centric mobile ad hoc networks. In these system...
Maxim Raya, Panagiotis Papadimitratos, Virgil D. G...
ICDCS
2008
IEEE
15 years 5 months ago
Distributed Divide-and-Conquer Techniques for Effective DDoS Attack Defenses
Distributed Denial-of-Service (DDoS) attacks have emerged as a popular means of causing mass targeted service disruptions, often for extended periods of time. The relative ease an...
Muthusrinivasan Muthuprasanna, Govindarasu Manimar...