Sciweavers

1381 search results - page 219 / 277
» Trusted Computing: Providing Security for Peer-to-Peer Netwo...
Sort
View
IJNSEC
2008
175views more  IJNSEC 2008»
14 years 11 months ago
ECPKS: An Improved Location-Aware Key Management Scheme in Static Sensor Networks
A location-aware scheme uses a priori knowledge of the deployed sensor nodes of some target field in a sensor network. Such location-aware schemes improve substantially higher net...
Ashok Kumar Das
CCS
2008
ACM
15 years 1 months ago
Location privacy of distance bounding protocols
Distance bounding protocols have been proposed for many security critical applications as a means of getting an upper bound on the physical distance to a communication partner. As...
Kasper Bonne Rasmussen, Srdjan Capkun
CIKM
2009
Springer
15 years 5 months ago
A framework for safely publishing communication traces
A communication trace is a detailed record of the communication between two entities. Communication traces are vital for research in computer networks and protocols in many domain...
Abhinav Parate, Gerome Miklau
CCR
2007
168views more  CCR 2007»
14 years 11 months ago
Challenges in peer-to-peer gaming
While multi-player online games are very successful, their fast deployment suffers from their server-based architecture. Indeed, servers both limit the scalability of the games a...
Christoph Neumann, Nicolas Prigent, Matteo Varvell...
DCOSS
2010
Springer
15 years 2 months ago
Wormholes No More? Localized Wormhole Detection and Prevention in Wireless Networks
A number of protocols have been proposed to date to defend against wormhole attacks in wireless networks by adopting synchronized clocks, positioning devices, or directional antenn...
Tassos Dimitriou, Thanassis Giannetsos