Sciweavers

3483 search results - page 178 / 697
» Forward
Sort
View
126
Voted
ICNP
2007
IEEE
15 years 10 months ago
Source Address Validation: Architecture and Protocol Design
The current Internet addressing architecture does not verify the source address of a packet received and forwarded. This causes serious security and accounting problems. Based on t...
Jianping Wu, Gang Ren, Xing Li
IEEEARES
2007
IEEE
15 years 10 months ago
STEF: A Secure Ticket-Based En-route Filtering Scheme for Wireless Sensor Networks
— Node compromise is a serious threat in wireless sensor networks. An adversary can use compromised nodes to inject false data into the network forging events to deceive the base...
Christoph Krauß, Markus Schneider, Kpatcha M...
INFOCOM
2007
IEEE
15 years 10 months ago
Navigation in Distance Vector Spaces and Its Use for Node Avoidance Routing
—Traditional network routing uses the single (shortest) path paradigm. This paradigm exposes sessions to various attacks along this path, such as eavesdropping, DoS attacks etc. ...
Haim Zlatokrilov, Hanoch Levy
IPPS
2007
IEEE
15 years 10 months ago
Evolution of Strategy Driven Behavior in Ad Hoc Networks Using a Genetic Algorithm
In this paper we address the problem of selfish behavior in ad hoc networks. We propose a strategy driven approach which aims at enforcing cooperation between network participant...
Marcin Seredynski, Pascal Bouvry, Mieczyslaw A. Kl...
LICS
2007
IEEE
15 years 10 months ago
Alternation-free modal mu-calculus for data trees
d abstract) Marcin Jurdzi´nski and Ranko Lazi´c∗ Department of Computer Science, University of Warwick, UK An alternation-free modal µ-calculus over data trees is introduced ...
Marcin Jurdzinski, Ranko Lazic