Sciweavers

507 search results - page 64 / 102
» Attacking DDoS at the Source
Sort
View
TMC
2012
13 years 4 days ago
Protecting Location Privacy in Sensor Networks against a Global Eavesdropper
— While many protocols for sensor network security provide confidentiality for the content of messages, contextual information usually remains exposed. Such information can be c...
Kiran Mehta, Donggang Liu, Matthew Wright
CORR
2008
Springer
137views Education» more  CORR 2008»
14 years 9 months ago
Counteracting Byzantine Adversaries with Network Coding: An Overhead Analysis
Network coding increases throughput and is robust against failures and erasures. However, since it allows mixing of information within the network, a single corrupted packet genera...
MinJi Kim, Muriel Médard, João Barro...
WWW
2011
ACM
14 years 4 months ago
Semi-supervised truth discovery
Accessing online information from various data sources has become a necessary part of our everyday life. Unfortunately such information is not always trustworthy, as different sou...
Xiaoxin Yin, Wenzhao Tan
INFOCOM
2007
IEEE
15 years 4 months ago
Ranking-Based Optimal Resource Allocation in Peer-to-Peer Networks
—This paper presents a theoretic framework of optimal resource allocation and admission control for peer-topeer networks. Peer’s behavioral rankings are incorporated into the r...
Yonghe Yan, Adel El-Atawy, Ehab Al-Shaer
SSDBM
2007
IEEE
105views Database» more  SSDBM 2007»
15 years 4 months ago
Maintaining K-Anonymity against Incremental Updates
K-anonymity is a simple yet practical mechanism to protect privacy against attacks of re-identifying individuals by joining multiple public data sources. All existing methods achi...
Jian Pei, Jian Xu, Zhibin Wang, Wei Wang 0009, Ke ...