Sciweavers

455 search results - page 54 / 91
» Peer-to-Peer Traffic in Operator Networks
Sort
View
IJNSEC
2008
110views more  IJNSEC 2008»
14 years 9 months ago
Security Measures and Weaknesses of the GPRS Security Architecture
This paper presents an evaluation of the security architecture employed in the General Packet Radio Services (GPRS). More specifically, the security measures applied to protect th...
Christos Xenakis
72
Voted
GLOBECOM
2010
IEEE
14 years 7 months ago
Capability and Fidelity of Mote-Class Wireless Sniffers
Abstract--Monitoring the health of a sensor network is important for maintaining the health and normal operation of the network. For large-scale cost-effective monitoring, using in...
Jordan Cote, Bing Wang, Wei Zeng, Zhijie Shi
77
Voted
MOBIHOC
2003
ACM
15 years 9 months ago
ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks
In hostile environments, the enemy can launch traffic analysis against interceptable routing information embedded in routing messages and data packets. Allowing adversaries to tra...
Jiejun Kong, Xiaoyan Hong
INFOCOM
2002
IEEE
15 years 2 months ago
Constraint-based path selection methods for on-demand provisioning in WDM networks
Abstract-- We propose a framework for decentralized path selection and on-demand wavelength channel provisioning in WDM networks with routing constraints. Within this framework, th...
Admela Jukan, Gerald Franzl
IAT
2010
IEEE
14 years 7 months ago
DLB-SDPOP: A Multiagent Pseudo-tree Repair Algorithm for Load Balancing in WLANs
The traffic load of wireless local area networks (WLANs) is often distributed unevenly among access points. In addition, interference from collocated wireless devices operating in...
Shanjun Cheng, Anita Raja, Jiang Xie, Ivan Howitt