Sciweavers

2503 search results - page 158 / 501
» Building Computer Network Attacks
Sort
View
MA
1999
Springer
110views Communications» more  MA 1999»
15 years 6 months ago
Hive: Distributed Agents for Networking Things
Hive is a distributed agents platform, a decentralized system for building applications by networking local system resources. This paper presents the architecture of Hive, concent...
Nelson Minar, Matthew Gray, Oliver Roup, Raffi Kri...
SIGMOD
2004
ACM
121views Database» more  SIGMOD 2004»
16 years 1 months ago
A secure hierarchical model for sensor network
In a distributed sensor network, large number of sensors deployed which communicate among themselves to selforganize a wireless ad hoc network. We propose an energyefficient level...
Malik Ayed Tubaishat, Jian Yin, Biswajit Panja, Sa...
CONEXT
2006
ACM
15 years 7 months ago
Secure sensor network routing: a clean-slate approach
The deployment of sensor networks in security- and safety-critical environments requires secure communication primitives. In this paper, we design, implement, and evaluate a new s...
Bryan Parno, Mark Luk, Evan Gaustad, Adrian Perrig
WS
2006
ACM
15 years 7 months ago
Integrity regions: authentication through presence in wireless networks
We introduce Integrity (I) regions, a novel security primitive that enables message authentication in wireless networks without the use of pre-established or pre-certified keys. ...
Srdjan Capkun, Mario Cagalj
IPTPS
2005
Springer
15 years 7 months ago
Impact of Neighbor Selection on Performance and Resilience of Structured P2P Networks
Recent work has shown that intelligent neighbor selection during construction can significantly enhance the performance of peer-to-peer overlay networks. While its impact on perf...
Byung-Gon Chun, Ben Y. Zhao, John Kubiatowicz