Sciweavers

1737 search results - page 93 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
VTC
2006
IEEE
171views Communications» more  VTC 2006»
15 years 5 months ago
Analysis of Spatial Multiplexing for Cross-Layer Design of MIMO Ad Hoc Networks
— We consider the application of spatial multiplexing to ad hoc networks where nodes have multiple antennas. At the physical level, we suppose that layered space–time multiuser...
Marco Levorato, Stefano Tomasin, Paolo Casari, Mic...
CCS
2009
ACM
15 years 6 months ago
NISAN: network information service for anonymization networks
Network information distribution is a fundamental service for any anonymization network. Even though anonymization and information distribution about the network are two orthogona...
Andriy Panchenko, Stefan Richter, Arne Rache
MSWIM
2009
ACM
15 years 6 months ago
HUBCODE: message forwarding using hub-based network coding in delay tolerant networks
Most people-centric delay tolerant networks have been shown to exhibit power-law behavior. Analysis of the temporal connectivity graph of such networks reveals the existence of hu...
Shabbir Ahmed, Salil S. Kanhere
IADIS
2003
15 years 1 months ago
Enhance Opensst Protocol's Security with Smart Card
As an open source project, Open Simple Secure Transaction (OpenSST) protocol aims to be a secure and transactionoriented protocol for the unsecured network. At present a prototype...
Xinhua Zhang, Alexandre Dulaunoy, Christoph Meinel
MOBIHOC
2003
ACM
15 years 11 months ago
ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks
In hostile environments, the enemy can launch traffic analysis against interceptable routing information embedded in routing messages and data packets. Allowing adversaries to tra...
Jiejun Kong, Xiaoyan Hong