Sciweavers

374 search results - page 32 / 75
» Towards Secure and Scalable Computation in Peer-to-Peer Netw...
Sort
View
94
Voted
IPPS
2005
IEEE
15 years 5 months ago
Securely Replicated Web Documents
In order to achieve better scalability and reduce latency in handling user requests, many Web applications make extensive use of data replication through caches and Content Delive...
Bogdan C. Popescu, Maarten van Steen, Bruno Crispo...
CONEXT
2008
ACM
15 years 1 months ago
Towards a new generation of information-oriented internetworking architectures
In response to the limitations of the Internet architecture when used for applications for which it was not originally designed, a series of clean slate efforts have emerged to sh...
Christian Esteve, Fábio Luciano Verdi, Maur...
103
Voted
ICN
2005
Springer
15 years 5 months ago
On the Security of Cluster-Based Communication Protocols for Wireless Sensor Networks
Wireless sensor networks are ad hoc networks comprised mainly of small sensor nodes with limited resources, and are rapidly emerging as a technology for large-scale, lowcost, autom...
Adrian Carlos Ferreira, Marcos Aurélio Vila...
DSN
2009
IEEE
15 years 6 months ago
Exception triggered DoS attacks on wireless networks
Security protocols are not as secure as we assumed. In this paper, we identified a practical way to launch DoS attacks on security protocols by triggering exceptions. Through exp...
Yao Zhao, Sagar Vemuri, Jiazhen Chen, Yan Chen, Ha...
ISCA
2007
IEEE
111views Hardware» more  ISCA 2007»
15 years 6 months ago
Express virtual channels: towards the ideal interconnection fabric
Due to wire delay scalability and bandwidth limitations inherent in shared buses and dedicated links, packet-switched on-chip interconnection networks are fast emerging as the per...
Amit Kumar 0002, Li-Shiuan Peh, Partha Kundu, Nira...