Sciweavers

1630 search results - page 130 / 326
» Secure Overlay Network Design
Sort
View
WICON
2008
14 years 11 months ago
Security vulnerabilities in IEEE 802.22
Cognitive Radio (CR) is seen as one of the enabling technologies for realizing a new spectrum access paradigm, viz. Opportunistic Spectrum Sharing (OSS). IEEE 802.22 is the world&...
Kaigui Bian, Jung Min Park
NDSS
1998
IEEE
15 years 2 months ago
The Multilayer Firewall
We present a new security technology called the Multilayer Firewall. We argue that it is useful in some situations for which other approaches, such as cryptographically protected ...
Dan M. Nessett, Polar Humenn
INFOCOM
2009
IEEE
15 years 4 months ago
NetTube: Exploring Social Networks for Peer-to-Peer Short Video Sharing
—The recent three years have witnessed an explosion of networked video sharing, represented by YouTube, as a new killer Internet application. Their sustainable development howeve...
Xu Cheng, Jiangchuan Liu
PERCOM
2006
ACM
15 years 4 months ago
DHT-based Unicast for Mobile Ad Hoc Networks
As mobile ad hoc networks (MANETs) become ever more popular, it also becomes more and more interesting to build distributed network applications (e.g. data storage, etc.) that hav...
Thomas Zahn, Jochen H. Schiller
KIVS
2005
Springer
15 years 3 months ago
Combining Service-Orientation and Peer-to-Peer Networks
: Almost all current P2P applications are built as monolithic systems: they tightly couple application software with an underlying P2P technology. For simple P2P applications like ...
Michael Conrad, Jochen Dinger, Hannes Hartenstein,...