Sciweavers

2200 search results - page 169 / 440
» Hop Integrity in Computer Networks
Sort
View
126
Voted
EWSN
2004
Springer
16 years 3 months ago
Design of a Secure Distributed Service Directory for Wireless Sensornetworks
Sensor networks consist of a potentially huge number of very small and resource limited self-organizing devices. This paper presents the design of a general distributed service dir...
Erik-Oliver Blaß, Hans-Joachim Hof, Martina ...
132
Voted
WISEC
2010
ACM
15 years 1 months ago
Efficient code diversification for network reprogramming in sensor networks
As sensors in a network are mostly homogeneous in software and hardware, a captured sensor can easily expose its code and data to attackers and further threaten the whole network....
Qijun Gu
153
Voted
PATAT
2004
Springer
150views Education» more  PATAT 2004»
15 years 9 months ago
Logistics Service Network Design for Time-Critical Delivery
Abstract. Service network design is critical to the profitability of express shipment carriers. In this paper, we consider the problem of designing the integrated service network ...
Cynthia Barnhart, Su Shen
130
Voted
AAMAS
2006
Springer
15 years 3 months ago
CONFIDANT: Collaborative Object Notification Framework for Insider Defense using Autonomous Network Transactions
File Integrity Analyzers serve as a component of an Intrusion Detection environment by performing filesystem inspections to verify the content of security-critical files in order ...
Adam J. Rocke, Ronald F. DeMara
110
Voted
LCN
2003
IEEE
15 years 9 months ago
Secure and Manageable Virtual Private Networks for End-users
This paper presents personal networks, which integrate a VPN and the per-VPN execution environments of the hosts included in the VPN. The key point is that each execution environm...
Kenichi Kourai, Toshio Hirotsu, Koji Sato, Osamu A...