Sciweavers

2656 search results - page 65 / 532
» The Use of Communications Networks to Increase Personal Priv...
Sort
View
ADHOCNOW
2004
Springer
15 years 5 months ago
Session-Based Service Discovery and Access Control in Peer-to-Peer Communications
Abstract. Service Location Protocol (SLP) is a standard service discovery protocol proposed by IETF. SLP provides a flexible and scalable service discovery framework over IP netwo...
Anand Dersingh, Ramiro Liscano, Allan G. Jost, Hao...
IEEEARES
2008
IEEE
15 years 6 months ago
Intensive Programme on Information and Communication Security
IT Security is a problem that can only be addressed and taught holistically. Just as broad as the field of ICT itself, IT Security is an integral part of all network and software ...
Christian Schläger, Ludwig Fuchs, Günthe...
MOBIHOC
2007
ACM
15 years 11 months ago
Capacity of a wireless ad hoc network with infrastructure
In this paper we study the capacity of wireless ad hoc networks with infrastructure support of an overlay of wired base stations. Such a network architecture is often referred to ...
Benyuan Liu, Patrick Thiran, Donald F. Towsley
CCS
2007
ACM
15 years 3 months ago
Analyzing network traffic to detect self-decrypting exploit code
Remotely-launched software exploits are a common way for attackers to intrude into vulnerable computer systems. As detection techniques improve, remote exploitation techniques are...
Qinghua Zhang, Douglas S. Reeves, Peng Ning, S. Pu...
PVLDB
2008
146views more  PVLDB 2008»
14 years 11 months ago
Resisting structural re-identification in anonymized social networks
We identify privacy risks associated with releasing network data sets and provide an algorithm that mitigates those risks. A network consists of entities connected by links repres...
Michael Hay, Gerome Miklau, David Jensen, Donald F...