Sciweavers

537 search results - page 25 / 108
» Buy-at-Bulk Network Design with Protection
Sort
View
IADIS
2003
15 years 2 days ago
A Framework of High Confidence E-Healthcare Information System
In this paper a framework for a high-confidence e-healthcare information system which meets five criteria including availability, reliability, security, survivability and restorab...
Shun-Chieh Lin, Wen-Hsiang Tsai, Shian-Shyong Tsen...
CCS
2008
ACM
15 years 21 days ago
Revocation games in ephemeral networks
A frequently proposed solution to node misbehavior in mobile ad hoc networks is to use reputation systems. But in ephemeral networks - a new breed of mobile networks where contact...
Maxim Raya, Mohammad Hossein Manshaei, Márk...
DSN
2004
IEEE
15 years 2 months ago
Diverse Firewall Design
Firewalls are the mainstay of enterprise security and the most widely adopted technology for protecting private networks. An error in a firewall policy either creates security hole...
Alex X. Liu, Mohamed G. Gouda
WS
2005
ACM
15 years 4 months ago
Group-based key pre-distribution in wireless sensor networks
Many key pre-distribution techniques have been developed recently to establish pairwise keys for wireless sensor networks. To further improve these schemes, researchers have propo...
Donggang Liu, Peng Ning, Wenliang Du
ANCS
2009
ACM
14 years 8 months ago
SANS: a scalable architecture for network intrusion prevention with stateful frontend
Inline stateful and deep inspection for intrusion prevention is becoming more challenging due to the increase in both the volume of network traffic and the complexity of the analy...
Fei He, Yaxuan Qi, Yibo Xue, Jun Li