Sciweavers

1630 search results - page 65 / 326
» Secure Overlay Network Design
Sort
View
ATVA
2007
Springer
134views Hardware» more  ATVA 2007»
15 years 1 months ago
Formal Modeling and Verification of High-Availability Protocol for Network Security Appliances
One of the prerequisites for information society is secure and reliable communication among computing systems. Accordingly, network security appliances become key components of inf...
Moonzoo Kim
MM
2004
ACM
97views Multimedia» more  MM 2004»
15 years 3 months ago
Range multicast routers for large-scale deployment of multimedia application
In this paper, we present the Range Multicast protocol and the implemented prototype. We propose to demonstrate the system at the 2004 ACM Multimedia Conference. Categories and Su...
Ning Jiang, Yao Hua Ho, Kien A. Hua
WOWMOM
2005
ACM
99views Multimedia» more  WOWMOM 2005»
15 years 3 months ago
Small Worlds and the Security of Ubiquitous Computing
This paper considers the small-world phenomenon in two contexts: ubiquitous computing and security. We argue that small-world properties emerge in ubicomp systems due to their nat...
Harald Vogt
CORR
2010
Springer
83views Education» more  CORR 2010»
14 years 9 months ago
A Platform for Implementing Secure Wireless Ad Hoc Networks
: We propose a new platform for implementing secure wireless ad hoc networks. Our proposal is based on a modular architecture, with the software stack constructed directly on the E...
Gyula Farkas, Béla Genge, Piroska Haller
SASN
2004
ACM
15 years 3 months ago
Resilient aggregation in sensor networks
This paper studies security for data aggregation in sensor networks. Current aggregation schemes were designed without security in mind and there are easy attacks against them. We...
David Wagner