Sciweavers

1630 search results - page 120 / 326
» Secure Overlay Network Design
Sort
View
TMC
2010
138views more  TMC 2010»
14 years 8 months ago
Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes
—Compromised-node and denial-of-service are two key attacks in wireless sensor networks (WSNs). In this paper, we study routing mechanisms that circumvent (bypass) black holes fo...
Tao Shu, Marwan Krunz, Sisi Liu
COLCOM
2007
IEEE
15 years 4 months ago
Cooperative security in distributed sensor networks
— Distributed sensor network protocols, such as routing, time synchronization or data aggregation protocols make use of collaborative techniques to minimize the consumption of sc...
Oscar García Morchon, Heribert Baldus, Tobi...
IPSN
2010
Springer
15 years 4 months ago
A vehicular surveillance and sensing system for car security and tracking applications
In this paper, we propose a Vehicular Surveillance and Sensing System (VS3 ), which targets at car security and tracking applications. VS3 can be triggered by events detected insi...
Lien-Wu Chen, Kun-Ze Syue, Yu-Chee Tseng
AINA
2008
IEEE
15 years 4 months ago
Transparently Adding Security Properties to Service Orchestration
In this paper, we present a tool allowing the design of orchestration at a high level of abstraction. This tool also allows specifying security properties, also in an way, as anno...
Stéphanie Chollet, Philippe Lalanda, Andr&e...
DSN
2011
IEEE
13 years 9 months ago
Analysis of security data from a large computing organization
In this work, we study security incidents that occurred over period of 5 years at the National Center for Supercomputing Applications at the University of Illinois. The analysis co...
Aashish Sharma, Zbigniew Kalbarczyk, James Barlow,...