Sciweavers

2200 search results - page 268 / 440
» Hop Integrity in Computer Networks
Sort
View
163
Voted
ICICS
2009
Springer
15 years 10 months ago
Assessing Security Risk to a Network Using a Statistical Model of Attacker Community Competence
We propose a novel approach for statistical risk modeling of network attacks that lets an operator perform risk analysis using a data model and an impact model on top of an attack ...
Tomas Olsson
ICC
2008
IEEE
106views Communications» more  ICC 2008»
15 years 10 months ago
Multicast with an Application-Oriented Networking (AON) Approach
Abstract—This paper proposes an efficient and scalable multicast scheme based on the concept of application-oriented networking (AON). The traditional IP multicast is bandwidth ...
Xiaohua Tian, Yu Cheng, Kui Ren, Bin Liu
GLOBECOM
2006
IEEE
15 years 9 months ago
Honeycomb Architecture for Energy Conservation in Wireless Sensor Networks
— Reducing energy consumption has been a recent focus of wireless sensor network research. Topology control explores the potential that a dense network has for energy savings. On...
Ren Ping Liu, Glynn Rogers, Sihui Zhou
128
Voted
COMCOM
2008
138views more  COMCOM 2008»
15 years 3 months ago
Secure content access and replication in pure P2P networks
Despite the advantages offered by pure Peer-to-Peer (P2P) networks (e.g. robustness and fault tolerance), a crucial requirement is to guarantee basic security properties, such as ...
Esther Palomar, Juan M. Estévez-Tapiador, J...
137
Voted
IJNSEC
2008
132views more  IJNSEC 2008»
15 years 3 months ago
Optimal Energy-Delay Routing Protocol with Trust Levels for Wireless Ad Hoc Networks
This paper presents the Trust Level Routing (TLR) protocol, an extension of the optimized energy-delay routing (OEDR) protocol, focusing on the integrity, reliability and survivab...
Eyad Taqieddin, S. Jagannathan, Ann Miller