Sciweavers

114 search results - page 20 / 23
» A Novel Scheme for Secured Data Transfer Over Computer Netwo...
Sort
View
NDSS
2007
IEEE
14 years 2 months ago
Secret Handshakes with Dynamic and Fuzzy Matching
The need for communication privacy over public networks is of growing concern in today’s society. As a result, privacy-preserving authentication and key exchange protocols have ...
Giuseppe Ateniese, Jonathan Kirsch, Marina Blanton
MOBIHOC
2004
ACM
14 years 7 months ago
A single-channel solution for transmission power control in wireless ad hoc networks
Transmission power control (TPC) has a great potential to increase the throughput of a mobile ad hoc network (MANET). Existing TPC schemes achieve this goal by using additional ha...
Alaa Muqattash, Marwan Krunz
NSDI
2008
13 years 10 months ago
Effective Diagnosis of Routing Disruptions from End Systems
Internet routing events are known to introduce severe disruption to applications. So far effective diagnosis of routing events has relied on proprietary ISP data feeds, resulting ...
Ying Zhang, Zhuoqing Morley Mao, Ming Zhang
PKDD
2010
Springer
178views Data Mining» more  PKDD 2010»
13 years 5 months ago
Graph Regularized Transductive Classification on Heterogeneous Information Networks
A heterogeneous information network is a network composed of multiple types of objects and links. Recently, it has been recognized that strongly-typed heterogeneous information net...
Ming Ji, Yizhou Sun, Marina Danilevsky, Jiawei Han...
CCS
2004
ACM
14 years 1 months ago
Attestation-based policy enforcement for remote access
Intranet access has become an essential function for corporate users. At the same time, corporation’s security administrators have little ability to control access to corporate ...
Reiner Sailer, Trent Jaeger, Xiaolan Zhang, Leende...