Sciweavers

200 search results - page 19 / 40
» Challenges in Securing Networked J2ME Applications
Sort
View
CORR
2006
Springer
206views Education» more  CORR 2006»
13 years 7 months ago
ANAP: Anonymous Authentication Protocol in Mobile Ad hoc Networks
The pervasiveness of wireless communication recently gave mobile ad hoc networks (MANET) a significant researcher's attention, due to its innate capabilities of instant commu...
Tomasz Ciszkowski, Zbigniew Kotulski
RAID
2010
Springer
13 years 6 months ago
Detecting the Onset of Infection for Secure Hosts
Abstract. Software flaws in applications such as a browser may be exploited by attackers to launch drive-by-download (DBD), which has become the major vector of malware infection....
Kui Xu, Qiang Ma, Danfeng (Daphne) Yao
SIGCOMM
2010
ACM
13 years 7 months ago
Cloudward bound: planning for beneficial migration of enterprise applications to the cloud
In this paper, we tackle challenges in migrating enterprise services into hybrid cloud-based deployments, where enterprise operations are partly hosted on-premise and partly in th...
Mohammad Y. Hajjat, Xin Sun, Yu-Wei Eric Sung, Dav...
INFOCOM
2009
IEEE
14 years 2 months ago
Dependable and Secure Sensor Data Storage with Dynamic Integrity Assurance
Abstract—Recently, distributed data storage has gained increasing popularity for efficient and robust data management in wireless sensor networks (WSNs). But the distributed arc...
Qian Wang, Kui Ren, Wenjing Lou, Yanchao Zhang
INFOCOM
2003
IEEE
14 years 24 days ago
Packet Leashes: A Defense against Wormhole Attacks in Wireless Networks
Abstract— As mobile ad hoc network applications are deployed, security emerges as a central requirement. In this paper, we introduce the wormhole attack, a severe attack in ad ho...
Yih-Chun Hu, Adrian Perrig, David B. Johnson