Sciweavers

2207 search results - page 27 / 442
» Security at the Internet Layer
Sort
View
ICC
2009
IEEE
185views Communications» more  ICC 2009»
15 years 4 months ago
On the Security Performance of Physical-Layer Network Coding
—Physical-layer network coding (PLNC) is a novel wireless communication technology, in which multiple transmitters can send signals on the same channel to the same receiver at th...
Kejie Lu, Shengli Fu, Yi Qian, Tao Zhang
71
Voted
SGAI
2007
Springer
15 years 3 months ago
Expressive security policy rules using Layered Conceptual Graphs
A method must be provided to support the analysis of security policy rules interdependencies in a (possibly distributed) environment. We propose a Conceptual Graphs based language...
Madalina Croitoru, Liang Xiao 0002, David Dupplaw,...
CISIS
2009
IEEE
15 years 4 months ago
A Security Layer for JXTA Core Protocols
— JXTA defines a set of six core protocols specifically suited for ad hoc, pervasive, multi-hop, peer-to-peer (P2P) computing. These protocols allow peers to cooperate and form...
Joan Arnedo-Moreno, Jordi Herrera-Joancomart&iacut...
79
Voted
PERCOM
2010
ACM
14 years 8 months ago
Security analysis of reliable transport layer protocols for wireless sensor networks
End-to-end reliability of communications is an important requirement in many applications of wireless sensor networks. For this reason, a number of reliable transport protocols sp...
Levente Buttyán, L. Csik
CORR
2010
Springer
93views Education» more  CORR 2010»
14 years 9 months ago
Optimal Cooperative Relaying Schemes for Improving Wireless Physical Layer Security
Jiangyuan Li, Athina P. Petropulu, Steven Weber