Sciweavers

188 search results - page 20 / 38
» Simulative Evaluation of Security Attacks in Networked Criti...
Sort
View
INFOCOM
2005
IEEE
15 years 4 months ago
Provably competitive adaptive routing
Abstract— An ad hoc wireless network is an autonomous selforganizing system of mobile nodes connected by wireless links where nodes not in direct range communicate via intermedia...
Baruch Awerbuch, David Holmer, Herbert Rubens, Rob...
KIVS
2007
Springer
15 years 5 months ago
Key Exchange for Service Discovery in Secure Content Addressable Sensor Networks
Abstract. Secure Content Addressable Network (SCAN) is an architecture for service discovery in service centric sensor networks that enables dynamic service composition. This paper...
Hans-Joachim Hof, Ingmar Baumgart, Martina Zitterb...
WS
2006
ACM
15 years 4 months ago
Proactive security for mobile messaging networks
The interoperability of IM (Instant Messaging) and SMS (Short Messaging Service) networks allows users to seamlessly use a variety of computing devices from desktops to cellular p...
Abhijit Bose, Kang G. Shin
80
Voted
NDSS
2000
IEEE
15 years 3 months ago
Secure Border Gateway Protocol (S-BGP) - Real World Performance and Deployment Issues
The Border Gateway Protocol (BGP), which is used to distribute routing information between autonomous systems, is an important component of the Internet’s routing infrastructure...
Stephen T. Kent, Charles Lynn, Joanne Mikkelson, K...
CCS
2003
ACM
15 years 4 months ago
Using graphic turing tests to counter automated DDoS attacks against web servers
We present WebSOS, a novel overlay-based architecture that provides guaranteed access to a web server that is targeted by a denial of service (DoS) attack. Our approach exploits t...
William G. Morein, Angelos Stavrou, Debra L. Cook,...