Sciweavers

7544 search results - page 195 / 1509
» Network Forensics Analysis
Sort
View
135
Voted
IJNSEC
2010
152views more  IJNSEC 2010»
14 years 10 months ago
Comparative Analysis of Different Cryptosystems for Hierarchical Mobile IPv6-based Wireless Mesh Network
Wireless Mesh Network (WMN) is advocated as the major supporting technology for the next generation wireless Internet satisfying the needs of anywhere-anytime broadband Internet a...
Ramanarayana Kandikattu, Lillykutty Jacob
124
Voted
WWW
2008
ACM
16 years 4 months ago
Feature weighting in content based recommendation system using social network analysis
We propose a hybridization of collaborative filtering and content based recommendation system. Attributes used for content based recommendations are assigned weights depending on ...
Souvik Debnath, Niloy Ganguly, Pabitra Mitra
149
Voted
PERCOM
2005
ACM
16 years 3 months ago
Energy Analysis of Public-Key Cryptography for Wireless Sensor Networks
In this paper, we quantify the energy cost of authentication and key exchange based on public-key cryptography on an 8-bit microcontroller platform. We present a comparison of two...
Arvinderpal Wander, Nils Gura, Hans Eberle, Vipul ...
111
Voted
ECBS
2008
IEEE
86views Hardware» more  ECBS 2008»
15 years 10 months ago
A Formal Model for Network-Wide Security Analysis
Network designers perform challenging tasks with so many configuration options that it is often hard or even impossible for a human to predict all potentially dangerous situation...
Petr Matousek, Jaroslav Ráb, Ondrej Rysavy,...
112
Voted
ICASSP
2008
IEEE
15 years 10 months ago
Throughput analysis of wireless mesh networks
Wireless mesh networks are rapidly deployable for many applications. The throughput of such a network depends on the schemes used for medium access control. In this paper, we pres...
Yuan Yu, Yi Huang, Bin Zhao, Yingbo Hua