Sciweavers

537 search results - page 14 / 108
» Buy-at-Bulk Network Design with Protection
Sort
View
SASN
2005
ACM
15 years 4 months ago
The security of vehicular ad hoc networks
Vehicular networks are likely to become the most relevant form of mobile ad hoc networks. In this paper, we address the security of these networks. We provide a detailed threat an...
Maxim Raya, Jean-Pierre Hubaux
ICNP
2007
IEEE
15 years 4 months ago
Design and Implementation of Cross-Domain Cooperative Firewall
Security and privacy are two major concerns in supporting roaming users across administrative domains. In current practices, a roaming user often uses encrypted tunnels, e.g., Virt...
Jerry Cheng, Hao Yang, Starsky H. Y. Wong, Petros ...
SASN
2003
ACM
15 years 3 months ago
A security design for a general purpose, self-organizing, multihop ad hoc wireless network
We present a security design for a general purpose, selforganizing, multihop ad hoc wireless network, based on the IEEE 802.15.4 low-rate wireless personal area network standard. ...
Thomas S. Messerges, Johnas Cukier, Tom A. M. Keve...
SIGCOMM
2010
ACM
14 years 10 months ago
Design and implementation of an "approximate" communication system for wireless media applications
All practical wireless communication systems are prone to errors. At the symbol level such wireless errors have a well-defined structure: when a receiver decodes a symbol erroneou...
Sayandeep Sen, Syed Gilani, Shreesha Srinath, Step...
ACMIDC
2009
15 years 2 months ago
Petimo: safe social networking robot for children
"Petimo" is an interactive robotic toy designed to protect children from potential risks in social networks and the virtual world and helps them to make a safely connect...
Adrian David Cheok, Owen Noel Newton Fernando, Cha...