Sciweavers

548 search results - page 14 / 110
» Secure peer sampling
Sort
View
HICSS
2002
IEEE
97views Biometrics» more  HICSS 2002»
15 years 5 months ago
A Secure Platform for Peer-to-Peer Computing in the Internet
WooYoung Kim, Sven Graupner, Akhil Sahai
84
Voted
WSC
2004
15 years 1 months ago
Evaluation of Secure Peer-to-Peer Overlay Routing for Survivable SCADA Systems
Supervisory Control And Data Acquisition (SCADA) systems gather and analyze data for real-time control. SCADA systems are used extensively, in applications such as electrical powe...
Jeffrey J. Farris, David M. Nicol
109
Voted
MDM
2009
Springer
126views Communications» more  MDM 2009»
15 years 7 months ago
Outlier Detection in Ad Hoc Networks Using Dempster-Shafer Theory
Mobile Ad-hoc NETworks (MANETs) are known to be vulnerable to a variety of attacks due to lack of central authority or fixed network infrastructure. Many security schemes have bee...
Wenjia Li, Anupam Joshi