259
Voted
TDSC
14 years 12 months ago
2011
—Anonymizing networks such as Tor allow users to access Internet services privately by using a series of routers to hide the client’s IP address from the server. The success of...
262
click to vote
TDSC
14 years 12 months ago
2011
—In this paper, we study leader election in the presence of selfish nodes for intrusion detection in mobile ad hoc networks (MANETs). To balance the resource consumption among a...
228
Voted
TDSC
14 years 12 months ago
2011 262
click to vote
TDSC
14 years 12 months ago
2011
To ensure fair and secure communication in Mobile Ad hoc Networks (MANETs), the applications running in these networks must be regulated by proper communication policies. However,...
174
Voted
TDSC
14 years 12 months ago
2011
— Most of existing privacy preserving techniques, such as k-anonymity methods, are designed for static data sets. As such, they cannot be applied to streaming data which are cont...
|