Sciweavers

2503 search results - page 406 / 501
» Building Computer Network Attacks
Sort
View
CCS
2008
ACM
15 years 3 months ago
Location privacy of distance bounding protocols
Distance bounding protocols have been proposed for many security critical applications as a means of getting an upper bound on the physical distance to a communication partner. As...
Kasper Bonne Rasmussen, Srdjan Capkun
PPNA
2011
14 years 8 months ago
Security and privacy issues in P2P streaming systems: A survey
Streaming applications over Peer-To-Peer (P2P) systems have gained an enormous popularity. Success always implies increased concerns about security, protection, privacy and all the...
Gabriela Gheorghe, Renato Lo Cigno, Alberto Montre...
FTDCS
2003
IEEE
15 years 6 months ago
Looking for a Common View for Mobile Worlds
This paper considers central issues of distributed computing in a mobile environment. Its aim is to light on the first brick of a common view for mobile systems. We pool together...
Maria Gradinariu, Michel Raynal, Gwendal Simon
121
Voted
GPC
2008
Springer
15 years 2 months ago
Middleware Integration and Deployment Strategies for Cyberinfrastructures
Virtual Organizations require infrastructure that meets their scientific needs. Traditionally, a VO can require access to computational backends that are suited for interactive app...
Sebastien Goasguen, Krishna Madhavan, David Wolins...
PERCOM
2006
ACM
16 years 1 months ago
QoS Routing in OLSR with Several Classes of Service
The Optimized Link State Routing (OLSR) protocol is a proactive link-state protocol bafor ad-hoc networks. It uses an optimization called Multi-Point Relays (MPRs) to provide an e...
Jeremie Leguay, Timur Friedman