Sciweavers

2099 search results - page 208 / 420
» Securing Wireless Sensor Networks: Security Architectures
Sort
View
CN
2004
106views more  CN 2004»
14 years 10 months ago
Security applications of peer-to-peer networks
Open networks are often insecure and provide an opportunity for viruses and DDOS activities to spread. To make such networks more resilient against these kind of threats, we propo...
Vasileios Vlachos, Stephanos Androutsellis-Theotok...
JSAC
2010
84views more  JSAC 2010»
14 years 9 months ago
A little feedback can simplify sensor network cooperation
—Shannon’s discovery of digital communication has shaped the architecture of virtually all communication systems in use today. The digital communication paradigm is built aroun...
Anand D. Sarwate, Michael Gastpar
CCS
2009
ACM
15 years 2 months ago
On lightweight mobile phone application certification
Users have begun downloading an increasingly large number of mobile phone applications in response to advancements in handsets and wireless networks. The increased number of appli...
William Enck, Machigar Ongtang, Patrick Drew McDan...
JSW
2007
116views more  JSW 2007»
14 years 10 months ago
Security Patterns for Voice over IP Networks
—Voice over IP (VoIP) has had a strong effect on global communications by allowing human voice and fax information to travel over existing packet data networks along with traditi...
Eduardo B. Fernández, Juan C. Pelaez, Mar&i...
MOBISYS
2009
ACM
15 years 11 months ago
Wifi-reports: improving wireless network selection with collaboration
Wi-Fi clients can obtain much better performance at some commercial hotspots than at others. Unfortunately, there is currently no way for users to determine which hotspot access p...
Jeffrey Pang, Ben Greenstein, Michael Kaminsky, Da...