Sciweavers

838 search results - page 18 / 168
» An Architecture for Network Layer Privacy
Sort
View
SOUPS
2009
ACM
14 years 3 months ago
flyByNight: mitigating the privacy risks of social networking
Social networking websites are enormously popular, but they present a number of privacy risks to their users, one of the foremost of which being that social network service provid...
Matthew M. Lucas, Nikita Borisov
MOBICOM
2006
ACM
14 years 2 months ago
State-of-the-art in protocol research for underwater acoustic sensor networks
In this paper, architectures for two-dimensional and three-dimensional underwater sensor networks are discussed. A detailed overview on the current solutions for medium access con...
Ian F. Akyildiz, Dario Pompili, Tommaso Melodia
AINA
2010
IEEE
13 years 3 days ago
A Novel Cross Layer Intrusion Detection System in MANET
— Intrusion detection System forms a vital component of internet security. To keep pace with the growing trends, there is a critical need to replace single layer detection techno...
Rakesh Shrestha, Kyong-Heon Han, Dong-You Choi, Se...
PKC
1999
Springer
86views Cryptology» more  PKC 1999»
14 years 21 days ago
Preserving Privacy in Distributed Delegation with Fast Certificates
Abstract. In a distributed system, dynamically dividing execution between nodes is essential for service robustness. However, when all of the nodes cannot be equally trusted, and w...
Pekka Nikander, Yki Kortesniemi, Jonna Partanen
GLOBECOM
2009
IEEE
13 years 11 months ago
Inter-Gateway Cross-Layer Handoffs in Wireless Mesh Networks
—Wireless mesh networks (WMNs) have recently emerged to be a cost-effective solution to support large-scale wireless Internet access. One important component of realizing large-s...
Weiyi Zhao, Jiang Xie