Sciweavers

1630 search results - page 116 / 326
» Secure Overlay Network Design
Sort
View
TPDS
2010
142views more  TPDS 2010»
14 years 8 months ago
An Identity-Based Security System for User Privacy in Vehicular Ad Hoc Networks
Abstract—Vehicular Ad Hoc Network (VANET) can offer various services and benefits to users and thus deserves deployment effort. Attacking and misusing such network could cause d...
Jinyuan Sun, Chi Zhang, Yanchao Zhang, Yuguang Fan...
CCS
2008
ACM
14 years 12 months ago
Privacy-safe network trace sharing via secure queries
Privacy concerns relating to sharing network traces have traditionally been handled via sanitization, which includes removal of sensitive data and IP address anonymization. We arg...
Jelena Mirkovic
CCS
2006
ACM
15 years 1 months ago
TinySeRSync: secure and resilient time synchronization in wireless sensor networks
Accurate and synchronized time is crucial in many sensor network applications due to the need for consistent distributed sensing and coordination. In hostile environments where an...
Kun Sun, Peng Ning, Cliff Wang
ICPPW
2003
IEEE
15 years 3 months ago
Secure Bootstrapping and Routing in an IPv6-Based Ad Hoc Network
The mobile ad hoc network (MANET), which is characterized by an infrastructureless architecture and multi-hop communication, has attracted a lot of attention recently. In the evol...
Yu-Chee Tseng, Jehn-Ruey Jiang, Jih-Hsin Lee
EUROCRYPT
2007
Springer
15 years 1 months ago
Round-Efficient Secure Computation in Point-to-Point Networks
Essentially all work studying the round complexity of secure computation assumes broadcast as an atomic primitive. Protocols constructed under this assumption tend to have very poo...
Jonathan Katz, Chiu-Yuen Koo