Sciweavers

1737 search results - page 167 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
237
Voted
HUMAN
2003
Springer
15 years 10 months ago
Analysis of User Utility Function in the Combined Cellular/WLAN Environments
Recent advances in wireless networking technologies enabled nomadic users connected to the Internet anywhere from the outdoor environments such as airport, hotel, subway station, o...
Jae-Hwan Kim, Young Yong Kim
ESAS
2007
Springer
15 years 11 months ago
Authenticating DSR Using a Novel Multisignature Scheme Based on Cubic LFSR Sequences
The problem of secure routing in mobile ad hoc networks is long-standing and has been extensively studied by researchers. Recently, techniques of aggregating signatures have been a...
Saikat Chakrabarti 0002, Santosh Chandrasekhar, Mu...
DEXA
2007
Springer
107views Database» more  DEXA 2007»
15 years 9 months ago
When Mobile Objects' Energy Is Not So Tight: A New Perspective on Scalability Issues of Continuous Spatial Query Systems
The two dominant costs in continuous spatial query systems are the wireless communication cost for location update, and the evaluation cost for query processing. Existing works add...
Tai T. Do, Fuyu Liu, Kien A. Hua
154
Voted
INFOCOM
2010
IEEE
15 years 3 months ago
Maximum Damage Malware Attack in Mobile Wireless Networks
—Malware attacks constitute a serious security risk that threatens to slow down the large scale proliferation of wireless applications. As a first step towards thwarting this se...
M. H. R. Khouzani, Saswati Sarkar, Eitan Altman
SIGMOD
2011
ACM
177views Database» more  SIGMOD 2011»
14 years 7 months ago
NetTrails: a declarative platform for maintaining and querying provenance in distributed systems
We demonstrate NetTrails, a declarative platform for maintaining and interactively querying network provenance in a distributed system. Network provenance describes the history an...
Wenchao Zhou, Qiong Fei, Shengzhi Sun, Tao Tao, An...