Sciweavers

1030 search results - page 195 / 206
» Protocols Using Anonymous Connections: Mobile Applications
Sort
View
IBMRD
2011
112views more  IBMRD 2011»
14 years 4 months ago
Sensor Andrew: Large-scale campus-wide sensing and actuation
—We present Sensor Andrew, a multi-disciplinary campus-wide scalable sensor network that is designed to host a wide range of sensor, actuator and low-power applications. The goal...
Anthony Rowe, Mario Berges, Gaurav Bhatia, Ethan G...
ICNP
2009
IEEE
15 years 4 months ago
Topological Detection on Wormholes in Wireless Ad Hoc and Sensor Networks
—Wormhole attack is a severe threat to wireless ad hoc and sensor networks. Most existing countermeasures either require specialized hardware devices or make strong assumptions o...
Dezun Dong, Mo Li, Yunhao Liu, Xiang-Yang Li, Xian...
AINA
2007
IEEE
15 years 4 months ago
VIP: a Virtual Interface-based aPproach for vertical handover in single-subnet networks
We propose a simple and practical solution, called the Virtual Interface-based aPproach (VIP), for seamless vertical handover in single-subnet networks. VIP combines a virtual int...
Wei-Cheng Xiao, Shih-Hsuan Tang, Cheng-Fu Chou
SASO
2007
IEEE
15 years 3 months ago
Identifying Malicious Peers Before It's Too Late: A Decentralized Secure Peer Sampling Service
Many unstructured peer to peer (P2P) systems rely on a Peer Sampling Service (PSS) that returns randomly sampled nodes from the population comprising the system. PSS protocols are...
Gian Paolo Jesi, David Hales, Maarten van Steen
PET
2004
Springer
15 years 2 months ago
Secure Outsourcing of Sequence Comparisons
Internet computing technologies, like grid computing, enable a weak computational device connected to such a grid to be less limited by its inadequate local computational, storage,...
Mikhail J. Atallah, Jiangtao Li