Sciweavers

4264 search results - page 45 / 853
» Provenance-aware secure networks
Sort
View
NETWORK
2011
14 years 4 months ago
Selective jamming/dropping insider attacks in wireless mesh networks
—Wireless mesh networks (WMNs) promise to extend high-speed wireless connectivity beyond what is possible with the current WiFi-based infrastructure. However, their unique archit...
Loukas Lazos, Marwan Krunz
WPES
2003
ACM
15 years 2 months ago
Leveraging the "Multi" in secure multi-party computation
Secure Multi-Party Computation enables parties with private data to collaboratively compute a global function of their private data, without revealing that data. The increase in s...
Jaideep Vaidya, Chris Clifton
MOBIHOC
2001
ACM
15 years 9 months ago
The quest for security in mobile ad hoc networks
So far, research on mobile ad hoc networks has been focused primarily on routing issues. Security, on the other hand, has been given a lower priority. This paper provides an overv...
Jean-Pierre Hubaux, Levente Buttyán, Srdjan...
WS
2005
ACM
15 years 3 months ago
The security of vehicular networks
Vehicular networks are likely to become the most relevant form of ad hoc networks. In this paper, we address the security of these networks. We provide a detailed threat analysis ...
Jean-Pierre Hubaux
CN
2010
107views more  CN 2010»
14 years 8 months ago
Secure multicast in IPTV services
Technological evolution is leading telecommunications to all-IP networks where multiple services are transported as IP packets. Among these are the group communications services w...
António Pinto, Manuel Ricardo