Sciweavers

141 search results - page 19 / 29
» Intrusion Tolerance in Wireless Environments: An Experimenta...
Sort
View
100
Voted
ICNP
2009
IEEE
15 years 7 months ago
Declarative Policy-based Adaptive MANET Routing
—This paper presents the design and implementation of declarative policy-based adaptive MANET routing protocols. Our work builds upon declarative networking, a recent innovation ...
Changbin Liu, Ricardo Correa, Xiaozhou Li, Prithwi...
SAC
2009
ACM
15 years 7 months ago
SQLProb: a proxy-based architecture towards preventing SQL injection attacks
SQL injection attacks (SQLIAs) consist of maliciously crafted SQL inputs, including control code, used against Databaseconnected Web applications. To curtail the attackers’ abil...
Anyi Liu, Yi Yuan, Duminda Wijesekera, Angelos Sta...
CCS
2006
ACM
15 years 4 months ago
Secure function evaluation with ordered binary decision diagrams
Privacy-preserving protocols allow multiple parties with private inputs to perform joint computation while preserving the privacy of their respective inputs. An important cryptogr...
Louis Kruger, Somesh Jha, Eu-Jin Goh, Dan Boneh
94
Voted
IPSN
2007
Springer
15 years 6 months ago
Underground structure monitoring with wireless sensor networks
Environment monitoring in coal mines is an important application of wireless sensor networks (WSNs) that has commercial potential. We discuss the design of a Structure-Aware Self-...
Mo Li, Yunhao Liu
104
Voted
TRIDENTCOM
2006
IEEE
15 years 6 months ago
Creating wireless multi-hop topologies on space-constrained indoor testbeds through noise injection
— To evaluate routing protocols on a controlled indoor wireless testbed, the radio range must be compressed so that larger multi-hop topologies can be mapped into a laboratorysiz...
Sanjit Krishnan Kaul, Marco Gruteser, Ivan Seskar