Sciweavers

838 search results - page 27 / 168
» An Architecture for Network Layer Privacy
Sort
View
SIGCOMM
1990
ACM
14 years 15 days ago
Architectural Considerations for a New Generation of Protocols
The current generation of protocol architectures, such as TCP/IP or the IS0 suite, seem successful at meeting the demands of todays networks. However, a number of new requirements...
David D. Clark, David L. Tennenhouse
SECON
2007
IEEE
14 years 2 months ago
Query privacy in wireless sensor networks
— Existing mechanisms for querying wireless sensor networks leak client interests to the servers performing the queries. The leaks are not only in terms of specific regions but ...
Bogdan Carbunar, Yang Yu, Weidong Shi, Michael Pea...
GLOBECOM
2006
IEEE
14 years 2 months ago
Defense against Routing Disruption Attacks in Mobile Ad Hoc Networks
—We propose a secure routing architecture for Mobile Ad hoc NETworks (MANETs) called ThroughpUt-Feedback (TUF) routing, which is resilient against a wide range of routing disrupt...
Ruiliang Chen, Michael Snow, Jung Min Park, M. Tam...
ACSW
2007
13 years 10 months ago
A Privacy Enhancing Mechanism based on Pseudonyms for Identity Protection in Location-Based Services
Over the past years Mobile Business has gained significant progress not only because of higher transfer rates as well as advanced processing power and memory capabilities of netw...
Oliver Jorns, Gerald Quirchmayr, Oliver Jung
DATE
2003
IEEE
86views Hardware» more  DATE 2003»
14 years 1 months ago
Layered, Multi-Threaded, High-Level Performance Design
A primary goal of high-level modeling is to efficiently explore a broad design space, converging on an optimal or near-optimal system architecture before moving to a more detaile...
Andrew S. Cassidy, JoAnn M. Paul, Donald E. Thomas