Sciweavers

287 search results - page 14 / 58
» An Information Security Strategy for Networkable Devices
Sort
View
ECIS
2001
13 years 9 months ago
E-Business Strategy Formulating and Forming: New Wine in Old Bottles?
The motivation for strategic action should be highest in volatile, unstable and unpredictable environments. For that reason, the search for a more strategic, systematic approach t...
Arjen Wassenaar, Shirley Gregor
ADHOCNOW
2007
Springer
14 years 2 months ago
Dependable and Secure Distributed Storage System for Ad Hoc Networks
The increased use of ubiquitous computing devices is resulting in networks that are highly mobile, well connected and growing in processing and storage capabilities. The nature of ...
Rudi Ball, James Grant, Jonathan So, Victoria Spur...
FC
2007
Springer
128views Cryptology» more  FC 2007»
14 years 2 months ago
Informant: Detecting Sybils Using Incentives
We propose an economic approach to Sybil attack detection. In our Informant protocol, a detective offers a reward for Sybils to reveal themselves. The detective accepts from one i...
N. Boris Margolin, Brian Neil Levine
SASN
2003
ACM
14 years 1 months ago
SECTOR: secure tracking of node encounters in multi-hop wireless networks
In this paper we present SECTOR, a set of mechanisms for the secure verification of the time of encounters between nodes in multi-hop wireless networks. This information can be u...
Srdjan Capkun, Levente Buttyán, Jean-Pierre...
JPDC
2011
155views more  JPDC 2011»
12 years 11 months ago
A cellular learning automata-based deployment strategy for mobile wireless sensor networks
: One important problem which may arise in designing a deployment strategy for a wireless sensor network is how to deploy a specific number of sensor nodes throughout an unknown ne...
Mehdi Esnaashari, Mohammad Reza Meybodi