Sciweavers

159
Voted
ACNS
2011
Springer
241views Cryptology» more  ACNS 2011»
14 years 2 months ago
Misuse Detection in Consent-Based Networks
Consent-based networking, which requires senders to have permission to send traffic, can protect against multiple attacks on the network. Highly dynamic networks like Mobile Ad-hoc...
Mansoor Alicherry, Angelos D. Keromytis