Sciweavers

339 search results - page 13 / 68
» Network security project management: a security policy-based...
Sort
View
ADHOC
2007
104views more  ADHOC 2007»
14 years 9 months ago
An overlay approach to data security in ad-hoc networks
While it has been argued that application-layer overlay protocols can enhance services in mobile ad-hoc networks, hardly any empirical data is available on the throughput and dela...
Jörg Liebeherr, Guangyu Dong
NGC
2002
Springer
14 years 9 months ago
Offering a Multicast Delivery Service in a Programmable Secure IP VPN Environment
The programmable network approach is one possible solution to quickly adapt existing infrastructures to new requirements. This paper shows how programmable networking can be explo...
Lina Alchaal, Vincent Roca, Michel Habert
EWSN
2009
Springer
15 years 10 months ago
secFleck: A Public Key Technology Platform for Wireless Sensor Networks
We describe the design and implementation of a public-key platform, secFleck, based on a commodity Trusted Platform Module (TPM) chip that extends the capability of a standard node...
Wen Hu, Peter I. Corke, Wen Chan Shih, Leslie Over...
118
Voted
ADHOCNOW
2004
Springer
15 years 2 months ago
Weathering the Storm: Managing Redundancy and Security in Ad Hoc Networks
Many ad hoc routing algorithms rely on broadcast flooding for location discovery or more generally for secure routing applications, particularly when dealing with Byzantine threat...
Mike Burmester, Tri Van Le, Alec Yasinsac
ADHOC
2007
144views more  ADHOC 2007»
14 years 9 months ago
Adaptive gossip protocols: Managing security and redundancy in dense ad hoc networks
Abstract. Many ad hoc routing algorithms rely on broadcast flooding for location discovery or, more generally, for secure routing applications. Flooding is a robust algorithm but ...
Mike Burmester, Tri Van Le, Alec Yasinsac