Sciweavers

777 search results - page 78 / 156
» Secure broadcasting in large networks
Sort
View
JIPS
2010
389views more  JIPS 2010»
14 years 4 months ago
The Wormhole Routing Attack in Wireless Sensor Networks (WSN)
Secure routing is vital to the acceptance and use of Wireless Sensor Networks (WSN) for many applications. However, providing secure routing in WSNs is a challenging task due to th...
Lukman Sharif, Munir Ahmed
HPCC
2007
Springer
15 years 4 months ago
Security Enhancement and Performance Evaluation of an Object-Based Storage System
Object-based storage offloads some works of file systems to storage devices to improve security, scalability, and performance. Security is a main concern when sharing data over ne...
Po-Chun Liu, Sheng-Kai Hung, Yarsun Hsu
TON
2008
86views more  TON 2008»
14 years 9 months ago
Securing user-controlled routing infrastructures
Designing infrastructures that give untrusted third parties (such as end-hosts) control over routing is a promising research direction for achieving flexible and efficient communic...
Karthik Lakshminarayanan, Daniel Adkins, Adrian Pe...
INFOCOM
2007
IEEE
15 years 4 months ago
Scalable Secure Bidirectional Group Communication
— Many network applications are based on a group communications model where one party sends messages to a large number of authorized recipients and/or receives messages from mult...
Yitao Duan, John F. Canny
CCR
2007
119views more  CCR 2007»
14 years 10 months ago
An edge-to-edge filtering architecture against DoS
Defending against large, distributed Denial-of-Service attacks is challenging, with large changes to the network core or to end-hosts often suggested. To make matters worse, spoo...
Felipe Huici, Mark Handley