Sciweavers

1630 search results - page 119 / 326
» Secure Overlay Network Design
Sort
View
PERCOM
2010
ACM
14 years 8 months ago
Security analysis of reliable transport layer protocols for wireless sensor networks
End-to-end reliability of communications is an important requirement in many applications of wireless sensor networks. For this reason, a number of reliable transport protocols sp...
Levente Buttyán, L. Csik
WINET
2010
199views more  WINET 2010»
14 years 8 months ago
Secure encrypted-data aggregation for wireless sensor networks
This paper proposes a secure encrypted-data aggregation scheme for wireless sensor networks. Our design for data aggregation eliminates redundant sensor readings without using encr...
Shih-I Huang, Shiuhpyng Shieh, J. D. Tygar
ICNP
2007
IEEE
15 years 4 months ago
Design and Implementation of Cross-Domain Cooperative Firewall
Security and privacy are two major concerns in supporting roaming users across administrative domains. In current practices, a roaming user often uses encrypted tunnels, e.g., Virt...
Jerry Cheng, Hao Yang, Starsky H. Y. Wong, Petros ...
SAINT
2007
IEEE
15 years 4 months ago
Local Production, Local Consumption Peer-to-Peer Architecture for a Dependable and Sustainable Social Infrastructure
Peer-to-peer (P2P) is a system of overlay networks such that participants can potentially take symmetrical roles. This translates itself into a design based on the philosophy of L...
Kenji Saito, Eiichi Morino, Yoshihiko Suko, Takaak...
IPPS
2007
IEEE
15 years 4 months ago
Securing Grid Data Transfer Services with Active Network Portals
Widely available and utilized Grid servers are vulnerable to a variety of threats from Denial of Service (DoS) attacks, overloading caused by flash crowds, and compromised client ...
Onur Demir, Michael R. Head, Kanad Ghose, Madhusud...