Sciweavers

8 search results - page 1 / 2
» Providing Transparent Security Services to Sensor Networks
Sort
View
CN
1998
73views more  CN 1998»
15 years 1 months ago
NetCache Architecture and Deployment
This paper describes the architecture of Network Appliance’s NetCache proxy cache. It discusses sizing proxy caches, contrasts the advantages and disadvantages of transparent ca...
Peter B. Danzig
CN
2010
90views more  CN 2010»
15 years 1 months ago
The price of security in wireless sensor networks
With the increased application of wireless sensor networks (WSNs) to military, commercial, and home environments, securing the data in the network has become a critical issue. Seve...
Jongdeog Lee, Krasimira Kapitanova, Sang Hyuk Son
CN
2004
136views more  CN 2004»
15 years 1 months ago
Managing service level agreements in Premium IP networks: a business-oriented approach
This paper presents a market-enabling framework where users, content providers and network operators can interact in the seamless, transparent sale and delivery of a wide range of...
Salvatore D'Antonio, Maurizio D'Arienzo, Marcello ...
CN
2004
256views more  CN 2004»
15 years 1 months ago
A line in the sand: a wireless sensor network for target detection, classification, and tracking
Intrusion detection is a surveillance problem of practical import that is well suited to wireless sensor networks. In this paper, we study the application of sensor networks to the...
Anish Arora, Prabal Dutta, Sandip Bapat, Vinod Kul...
CN
2004
106views more  CN 2004»
15 years 1 months ago
Security applications of peer-to-peer networks
Open networks are often insecure and provide an opportunity for viruses and DDOS activities to spread. To make such networks more resilient against these kind of threats, we propo...
Vasileios Vlachos, Stephanos Androutsellis-Theotok...