Sciweavers

530 search results - page 83 / 106
» Performance Analysis of DECK Collective Communication Servic...
Sort
View
145
Voted
SP
2008
IEEE
103views Security Privacy» more  SP 2008»
15 years 9 months ago
Preserving Caller Anonymity in Voice-over-IP Networks
— Applications such as VoIP need to provide anonymity to clients while maintaining low latency to satisfy quality of service (QoS) requirements. Existing solutions for providing ...
Mudhakar Srivatsa, Ling Liu, Arun Iyengar
139
Voted
ICCNMC
2005
Springer
15 years 9 months ago
Curve-Based Greedy Routing Algorithm for Sensor Networks
Routing packets along a specified curve is a new approach to forwarding packets in large-scale dense sensor networks. Forwarding packets along trajectories can be very effective in...
Jin Zhang, Yaping Lin, Mu Lin, Ping Li, Si-wang Zh...
119
Voted
CCS
2004
ACM
15 years 8 months ago
Mitigating bandwidth-exhaustion attacks using congestion puzzles
d Abstract) XiaoFeng Wang∗ Michael K. Reiter† We present congestion puzzles (CP), a new countermeasure to bandwidth-exhaustion attacks. Like other defenses based on client puz...
XiaoFeng Wang, Michael K. Reiter
WISEC
2010
ACM
15 years 8 months ago
Secure walking GPS: a secure localization and key distribution scheme for wireless sensor networks
In many applications of wireless sensor networks, sensor nodes are manually deployed in hostile environments where an attacker can disrupt the localization service and tamper with...
Qi Mi, John A. Stankovic, Radu Stoleru
121
Voted
VTC
2010
IEEE
123views Communications» more  VTC 2010»
15 years 1 months ago
Downlink Power Control Scheme for Smart Antenna Based Wireless Systems
— In this paper, we propose a downlink power control scheme for a wireless system which utilizes a smart antenna technology for space division multiple access(SDMA). In the wirel...
Woongsup Lee, Dong-Ho Cho