Sciweavers

4263 search results - page 149 / 853
» Network Security
Sort
View
120
Voted
PERCOM
2008
ACM
16 years 3 months ago
P2PNS: A Secure Distributed Name Service for P2PSIP
Decentralized Voice over IP networks are a promising alternative to classical server-based SIP networks especially in disaster areas or areas without centralized infrastructure. T...
Ingmar Baumgart
223
Voted
NCA
2011
IEEE
14 years 10 months ago
Privacy preserving Back-propagation neural network learning over arbitrarily partitioned data
—Neural Networks have been an active research area for decades. However, privacy bothers many when the training dataset for the neural networks is distributed between two parties...
Ankur Bansal, Tingting Chen, Sheng Zhong
139
Voted
IJSN
2007
120views more  IJSN 2007»
15 years 3 months ago
On the design of secure protocols for hierarchical sensor networks
Wireless sensor networks (WSNs) are ad hoc networks comprised mainly of small sensor nodes with limited resources, and can be used to monitor areas of interest. In this paper, we p...
Leonardo B. Oliveira, Hao Chi Wong, Antonio Alfred...
CCS
2008
ACM
15 years 5 months ago
Revocation games in ephemeral networks
A frequently proposed solution to node misbehavior in mobile ad hoc networks is to use reputation systems. But in ephemeral networks - a new breed of mobile networks where contact...
Maxim Raya, Mohammad Hossein Manshaei, Márk...
CDC
2009
IEEE
133views Control Systems» more  CDC 2009»
15 years 8 months ago
On the security of linear consensus networks
Abstract—This work considers the problem of reaching consensus in an unreliable linear consensus network. A solution to this problem is relevant for several tasks in multi-agent ...
Fabio Pasqualetti, Antonio Bicchi, Francesco Bullo