Sciweavers

2209 search results - page 298 / 442
» Language Based Secure Communication
Sort
View
168
Voted
CCS
2008
ACM
15 years 5 months ago
The risk-utility tradeoff for IP address truncation
Network operators are reluctant to share traffic data due to security and privacy concerns. Consequently, there is a lack of publicly available traces for validating and generaliz...
Martin Burkhart, Daniela Brauckhoff, Martin May, E...
IPSN
2010
Springer
15 years 10 months ago
Programming storage-centric sensor networks with Squirrel
We present SQUIRREL, a stream-oriented programming framework for storage-centric sensor networks. The storagecentric paradigm—where storage operations prevail over communication...
Luca Mottola
150
Voted
ICAC
2009
IEEE
15 years 10 months ago
Threat-model-driven runtime adaptation and evaluation of intrusion detection system
We present a mechanism for autonomous self-adaptation of a network-based intrusion detection system (IDS). The system is composed of a set of cooperating agents, each of which is ...
Martin Rehák, Eugen Staab, Volker Fusenig, ...
ICDCS
2008
IEEE
15 years 10 months ago
Real-Time Detection of Clone Attacks in Wireless Sensor Networks
A central problem in sensor network security is that sensors are susceptible to physical capture attacks. Once a sensor is compromised, the adversary can easily launch clone attac...
Kai Xing, Fang Liu, Xiuzhen Cheng, David Hung-Chan...
CISC
2007
Springer
156views Cryptology» more  CISC 2007»
15 years 9 months ago
Deniable Authentication on the Internet
Deniable authentication is a technique that allows one party to send messages to another while the latter can not prove to a third party the fact of communication. In this paper, w...
Shaoquan Jiang