Sciweavers

167 search results - page 26 / 34
» A Game-Theoretic Approach to Anonymous Networking
Sort
View
HICSS
2007
IEEE
125views Biometrics» more  HICSS 2007»
14 years 1 months ago
Stochastic Model for Power Grid Dynamics
We introduce a stochastic model that describes the quasistatic dynamics of an electric transmission network under perturbations introduced by random load fluctuations, random rem...
Marian Anghel, Kenneth A. Werley, Adilson E. Motte...
JSAC
2008
146views more  JSAC 2008»
13 years 7 months ago
On the Interaction and Competition among Internet Service Providers
The current Internet architecture comprises of different privately owned Internet service providers (ISPs) where higher tier ISPs supply connectivity service to lower tier ISPs an...
Sam C. M. Lee, John C. S. Lui
JUCS
2008
149views more  JUCS 2008»
13 years 7 months ago
Formal Security Definition and Efficient Construction for Roaming with a Privacy-Preserving Extension
: In a secure roaming scenario, a user U travels to a foreign network and communicates with a foreign server V securely so that no one other than U and V can obtain the messages ex...
Guomin Yang, Duncan S. Wong, Xiaotie Deng
PET
2005
Springer
14 years 29 days ago
Privacy Issues in Vehicular Ad Hoc Networks
Vehicular Ad hoc NETworks (VANETs) demand a thorough investigation of privacy related issues. On one hand, users of such networks have to be prevented from misuse of their private ...
Florian Dötzer
SIGCOMM
2000
ACM
13 years 12 months ago
Practical network support for IP traceback
This paper describes a technique for tracing anonymous packet flooding attacks in the Internet back towards their source. This work is motivated by the increased frequency and so...
Stefan Savage, David Wetherall, Anna R. Karlin, Th...