Sciweavers

4263 search results - page 164 / 853
» Network Security
Sort
View
133
Voted
EUROMICRO
1999
IEEE
15 years 8 months ago
JFS: A Secure Distributed File System for Network Computers
Network-centric computing aims to solve the problems associated with traditional client/server systems, namely the high performance requirements, and costly maintenance of, the co...
Marcus O'Connell, Paddy Nixon
132
Voted
ACNS
2006
Springer
96views Cryptology» more  ACNS 2006»
15 years 5 months ago
On Optimizing the Security-Throughput Trade-Off in Wireless Networks with Adversaries
In this paper, we model the adversary (eavesdropper) present in the wireless communication medium using probabilistic models. We precisely formulate the security-throughput optimiz...
Mohamed A. Haleem, Chetan Nanjunda Mathur, Rajarat...
127
Voted
EUC
2006
Springer
15 years 7 months ago
Security in P2P Networks: Survey and Research Directions
A fundamental feature of Peer-to-Peer (P2P) networks is the honest collaboration among an heterogeneous community of participants. After Napster success
Esther Palomar, Juan M. Estévez-Tapiador, J...
158
Voted
ONDM
2007
15 years 5 months ago
Securing Passive Optical Networks Against Signal Injection Attacks
Passive optical access networks are susceptible to intended attacks and unintended failures. This paper discusses intrusion by user-side signalinjection resulting in reduced networ...
Harald Rohde, Dominic A. Schupke
162
Voted
JSAC
2006
167views more  JSAC 2006»
15 years 3 months ago
Secure and resilient clock synchronization in wireless sensor networks
Abstract--Wireless sensor networks have received a lot of attention recently due to its wide applications. An accurate and synchronized clock time is crucial in many sensor network...
Kun Sun, Peng Ning, Cliff Wang