Sciweavers

2503 search results - page 212 / 501
» Building Computer Network Attacks
Sort
View
SASN
2003
ACM
15 years 7 months ago
SECTOR: secure tracking of node encounters in multi-hop wireless networks
In this paper we present SECTOR, a set of mechanisms for the secure verification of the time of encounters between nodes in multi-hop wireless networks. This information can be u...
Srdjan Capkun, Levente Buttyán, Jean-Pierre...
RAID
2010
Springer
15 years 11 days ago
Anomaly Detection and Mitigation for Disaster Area Networks
Abstract. One of the most challenging applications of wireless networking are in disaster area networks where lack of infrastructure, limited energy resources, need for common oper...
Jordi Cucurull, Mikael Asplund, Simin Nadjm-Tehran...
PERCOM
2007
ACM
16 years 1 months ago
Securing distributed data storage and retrieval in sensor networks
Sensor networks have been an attractive platform for pervasive computing and communication. Due to the lack of physical protection, however, sensor networks are vulnerable to atta...
Nalin Subramanian, Chanjun Yang, Wensheng Zhang
CCS
2007
ACM
15 years 8 months ago
How much anonymity does network latency leak?
Low-latency anonymity systems such as Tor, AN.ON, Crowds, and Anonymizer.com aim to provide anonymous connections that are both untraceable by “local” adversaries who control ...
Nicholas Hopper, Eugene Y. Vasserman, Eric Chan-Ti...
ICDCSW
2006
IEEE
15 years 8 months ago
Sharing sensor networks
Many industrial applications rely on sensors and sensor networks residing on machinery, transport containers or in the environment. For distributed processes in such domains the s...
Manabu Isomura, Till Riedel, Christian Decker, Mic...