Sciweavers

73 search results - page 14 / 15
» Securing user-controlled routing infrastructures
Sort
View
IJWIN
2006
119views more  IJWIN 2006»
13 years 6 months ago
Querying in Packs: Trustworthy Data Management in Ad Hoc Networks
We describe a trust-based data management framework enabling mobile devices to access the distributed computation, storage, and sensory resources available in pervasive computing ...
Anand Patwardhan, Filip Perich, Anupam Joshi, Tim ...
PE
2006
Springer
114views Optimization» more  PE 2006»
13 years 6 months ago
On the performance of Internet worm scanning strategies
In recent years, fast spreading worms, such as Code Red, Slammer, Blaster and Sasser, have become one of the major threats to the security of the Internet. In order to defend agai...
Cliff Changchun Zou, Donald F. Towsley, Weibo Gong
AIMS
2009
Springer
13 years 11 months ago
Evaluation of Sybil Attacks Protection Schemes in KAD
In this paper, we assess the protection mechanisms entered into recent clients to fight against the Sybil attack in KAD, a widely deployed Distributed Hash Table. We study three m...
Thibault Cholez, Isabelle Chrisment, Olivier Festo...
LISA
2003
13 years 7 months ago
Three Practical Ways to Improve Your Network
This paper presents three simple techniques for improving network service using relatively unknown features of many existing networks. The resulting system provides greater reliab...
Kevin Miller
SASN
2006
ACM
14 years 6 days ago
Robust cooperative trust establishment for MANETs
In a mobile ad hoc network (MANET), a source node must rely on intermediate nodes to forward its packets along multihop routes to the destination node. Due to the lack of infrastr...
Charikleia Zouridaki, Brian L. Mark, Marek Hejmo, ...