Sciweavers

4263 search results - page 113 / 853
» Network Security
Sort
View
ACSAC
2009
IEEE
15 years 10 months ago
Enabling Secure Secret Sharing in Distributed Online Social Networks
—We study a new application of threshold-based secret sharing in a distributed online social network (DOSN), where users need a means to back up and recover their private keys in...
Le-Hung Vu, Karl Aberer, Sonja Buchegger, Anwitama...
138
Voted
ICC
2007
IEEE
206views Communications» more  ICC 2007»
15 years 9 months ago
ASRPAKE: An Anonymous Secure Routing Protocol with Authenticated Key Exchange for Wireless Ad Hoc Networks
— In this paper, we present a novel anonymous secure routing protocol for mobile ad hoc networks (MANETs). The proposed protocol not only provides anonymity from all the intermed...
Xiaodong Lin, Rongxing Lu, Haojin Zhu, Pin-Han Ho,...
160
Voted
CORR
2011
Springer
189views Education» more  CORR 2011»
14 years 10 months ago
Secure Routing in Wireless Mesh Networks
— This paper introduces Policy based Management Information Base to mange danger in Artificial Immune System inspired secure routing in Wireless Mesh Networks. WMN management fun...
Jaydip Sen
118
Voted
ADHOC
2007
104views more  ADHOC 2007»
15 years 3 months ago
An overlay approach to data security in ad-hoc networks
While it has been argued that application-layer overlay protocols can enhance services in mobile ad-hoc networks, hardly any empirical data is available on the throughput and dela...
Jörg Liebeherr, Guangyu Dong
TON
2010
210views more  TON 2010»
14 years 10 months ago
A New Approach to Optical Networks Security: Attack-Aware Routing and Wavelength Assignment
Abstract-- Security issues and attack management in transparent WDM (Wavelength Division Multiplexing) optical networks has become of prime importance to network operators due to t...
Nina Skorin-Kapov, J. Chen, Lena Wosinska