Sciweavers

1123 search results - page 79 / 225
» Network Protocol System Fingerprinting - A Formal Approach
Sort
View
MIDDLEWARE
2005
Springer
15 years 5 months ago
INDISS: Interoperable Discovery System for Networked Services
Abstract. The emergence of handheld devices associated with wireless technologies has introduced new challenges for middleware. First, mobility is becoming a key characteristic; mo...
Yérom-David Bromberg, Valérie Issarn...
COMCOM
2008
153views more  COMCOM 2008»
14 years 12 months ago
A TTP-free protocol for location privacy in location-based services
Location-based services (LBS) will be a keystone of the new information society that is founded on the information and communications technologies (ICTs). Mobile devices such as c...
Agusti Solanas, Antoni Martínez-Ballest&eac...
GLOBECOM
2010
IEEE
14 years 10 months ago
Trust Management for Encounter-Based Routing in Delay Tolerant Networks
: We propose and analyze a class of trust management protocols for encounter-based routing in delay tolerant networks (DTNs). The underlying idea is to incorporate trust evaluation...
Ing-Ray Chen, Fenye Bao, Moonjeong Chang, Jin-Hee ...
ICNP
2007
IEEE
15 years 6 months ago
Location Privacy in Sensor Networks Against a Global Eavesdropper
— While many protocols for sensor network security provide confidentiality for the content of messages, contextual information usually remains exposed. Such information can be c...
K. Mehta, Donggang Liu, Matthew Wright
OSDI
2002
ACM
16 years 5 days ago
CMC: A Pragmatic Approach to Model Checking Real Code
Many system errors do not emerge unless some intricate sequence of events occurs. In practice, this means that most systems have errors that only trigger after days or weeks of ex...
Madanlal Musuvathi, David Y. W. Park, Andy Chou, D...