Sciweavers

313 search results - page 50 / 63
» Efficient Implementation of XML Security for Mobile Devices
Sort
View
ICNP
2000
IEEE
15 years 2 months ago
TCP-Probing: Towards an Error Control Schema with Energy and Throughput Performance Gains
Today’s universal communications increasingly involve mobile and battery-powered devices (e.g. hand-held, laptop) over wired and wireless networks. Energy efficiency, as well as...
Vassilios Tsaoussidis, Hussein G. Badr
ATAL
2004
Springer
15 years 1 months ago
IDReAM: Intrusion Detection and Response Executed with Agent Mobility
This paper deals with a new approach to build a completely distributed and decentralized Intrusion Detection and Response System (IDRS) in computer networks. This approach is call...
Noria Foukia
ANCS
2007
ACM
15 years 1 months ago
Curing regular expressions matching algorithms from insomnia, amnesia, and acalculia
The importance of network security has grown tremendously and a collection of devices have been introduced, which can improve the security of a network. Network intrusion detectio...
Sailesh Kumar, Balakrishnan Chandrasekaran, Jonath...
ECBS
2011
IEEE
204views Hardware» more  ECBS 2011»
13 years 9 months ago
Towards Comprehensive Modelling by Inter-model Links Using an Integrating Repository
—Model-based development techniques enable a high efficiency and the mastering of complexity. For many domains more than one model has to be used to express the relevant informat...
Matthias Riebisch, Stephan Bode, Qurat-ul-ann Faro...
DCOSS
2010
Springer
15 years 1 months ago
Wormholes No More? Localized Wormhole Detection and Prevention in Wireless Networks
A number of protocols have been proposed to date to defend against wormhole attacks in wireless networks by adopting synchronized clocks, positioning devices, or directional antenn...
Tassos Dimitriou, Thanassis Giannetsos