Sciweavers

1748 search results - page 132 / 350
» Security Models for Heterogeneous Networking
Sort
View
163
Voted
PERCOM
2011
ACM
14 years 10 months ago
AnonySense: A system for anonymous opportunistic sensing
We describe AnonySense, a privacy-aware system for realizing pervasive applications based on collaborative, opportunistic sensing by personal mobile devices. AnonySense allows app...
Minho Shin, Cory Cornelius, Daniel Peebles, Apu Ka...
169
Voted
CSFW
2012
IEEE
13 years 6 months ago
Provably Secure and Practical Onion Routing
The onion routing network Tor is undoubtedly the most widely employed technology for anonymous web access. Although the underlying onion routing (OR) protocol appears satisfactory...
Michael Backes, Ian Goldberg, Aniket Kate, Esfandi...
115
Voted
NDSS
2005
IEEE
15 years 9 months ago
Security Analysis and Improvements for IEEE 802.11i
This paper analyzes the IEEE 802.11i wireless networking standard with respect to data confidentiality, integrity, mutual authentication, and availability. Under our threat model,...
Changhua He, John C. Mitchell
127
Voted
ANSS
2005
IEEE
15 years 9 months ago
An Extensible Platform for Evaluating Security Protocols
We present a discrete-event network simulator, called Simnet, designed specifically for analyzing networksecurity protocols. The design and implementation is focused on simplicit...
Seny Kamara, Darren Davis, Lucas Ballard, Ryan Cau...
130
Voted
HSNMC
2004
Springer
130views Multimedia» more  HSNMC 2004»
15 years 9 months ago
Benefits of Using Ontologies in the Management of High Speed Networks
Network management is an area where many different technologies coexist. Several languages are used to define the information to be managed, which are specific of each management m...
Jorge E. López de Vergara, Víctor A....