Sciweavers

4263 search results - page 224 / 853
» Network Security
Sort
View
ICOIN
2005
Springer
15 years 10 months ago
A Self-organized Authentication Architecture in Mobile Ad-Hoc Networks
Abstract. Network security is considered one of the obstacles that prevent the wide deployment of ad-hoc wireless networks. Among many security problems, authentication is the most...
Seongil Hahm, Yongjae Jung, Seunghee Yi, Yukyoung ...
ACISP
2005
Springer
15 years 11 months ago
Analysis of the HIP Base Exchange Protocol
Abstract The Host Identity Protocol (HIP) is an Internet security and multiaddressing mechanism specified by the IETF. HIP introduces a new layer between the transport and network ...
Tuomas Aura, Aarthi Nagarajan, Andrei Gurtov
EVOW
2006
Springer
15 years 9 months ago
BeeHiveGuard: A Step Towards Secure Nature Inspired Routing Algorithms
Abstract. Nature inspired routing protocols for fixed and mobile networks are becoming an active area of research. However, analyzing their security threats and countering them hav...
Horst Wedde, Constantin Timm, Muddassar Farooq
141
Voted
CCS
2007
ACM
15 years 11 months ago
On the accuracy of decentralized virtual coordinate systems in adversarial networks
Virtual coordinate systems provide an accurate and efficient service that allows hosts on the Internet to determine the latency to arbitrary hosts without actively monitoring all ...
David John Zage, Cristina Nita-Rotaru
NDSS
1998
IEEE
15 years 9 months ago
The Multilayer Firewall
We present a new security technology called the Multilayer Firewall. We argue that it is useful in some situations for which other approaches, such as cryptographically protected ...
Dan M. Nessett, Polar Humenn