Sciweavers

110 search results - page 14 / 22
» Secure encounter-based social networks: requirements, challe...
Sort
View
WMCSA
2008
IEEE
15 years 3 months ago
Distributed authentication for low-cost wireless networks
Cost is one of the key challenges facing the deployment of wireless networks. Though 802.11-based networks have shown that costly, licensed spectrum is not always necessary, the c...
Sridhar Machiraju, Hao Chen, Jean Bolot
AIS
2010
Springer
14 years 9 months ago
Community networks and the evolution of civic intelligence
Although the intrinsic physicality of human beings has not changed in millennia, the species has managed to profoundly reconstitute the physical and social world it inhabits. Alth...
Douglas Schuler
NOMS
2006
IEEE
105views Communications» more  NOMS 2006»
15 years 3 months ago
Adaptive Flow Aggregation - A New Solution for Robust Flow Monitoring under Security Attacks
— Flow-level traffic measurement is required for a wide range of applications including accounting, network planning and security management. A key design challenge is how to gr...
Yan Hu, Dah-Ming Chiu, John C. S. Lui
IEEESP
2010
126views more  IEEESP 2010»
14 years 8 months ago
Privacy-Preserving Sharing of Sensitive Information
The need for controlled sharing of sensitive information occurs in many realistic everyday scenarios, ranging from critical (e.g., national security) to mundane (e.g., social netw...
Salvatore J. Stolfo, Gene Tsudik
WIMOB
2008
IEEE
15 years 3 months ago
An Ad Hoc Network Infrastructure: Communication and Information Sharing for Emergency Response
— During an emergency response, access to a reliable communication infrastructure is required to exchange accurate information in a timely manner. Various communication technolog...
Raheleh B. Dilmaghani, Ramesh R. Rao