Sciweavers

2099 search results - page 221 / 420
» Securing Wireless Sensor Networks: Security Architectures
Sort
View
CSFW
2010
IEEE
15 years 2 months ago
Modeling and Verifying Ad Hoc Routing Protocols
Mobile ad hoc networks consist of mobile wireless devices which autonomously organize their infrastructure. In such a network, a central issue, ensured by routing protocols, is to ...
Mathilde Arnaud, Véronique Cortier, St&eacu...

Lecture Notes
401views
16 years 8 months ago
Introduction to Computer Networking
The lecture notes cover the following topics, Course Overview , Data Communications and Networking Overview , Data Transmission , Transmission Media , Signal Encoding Techniques ...
Raj Jain
CCS
2009
ACM
15 years 2 months ago
The bayesian traffic analysis of mix networks
This work casts the traffic analysis of anonymity systems, and in particular mix networks, in the context of Bayesian inference. A generative probabilistic model of mix network ar...
Carmela Troncoso, George Danezis
NDSS
2005
IEEE
15 years 4 months ago
Security Analysis and Improvements for IEEE 802.11i
This paper analyzes the IEEE 802.11i wireless networking standard with respect to data confidentiality, integrity, mutual authentication, and availability. Under our threat model,...
Changhua He, John C. Mitchell
HASE
2007
IEEE
15 years 5 months ago
Fuzzing Wi-Fi Drivers to Locate Security Vulnerabilities
Wireless LANs (WLAN) are becoming ubiquitous, as more and more consumer electronic equipments start to support them. This creates new security concerns, since hackers no longer ne...
Manuel Mendonça, Nuno Ferreira Neves