Sciweavers

1395 search results - page 65 / 279
» Communication Security in Multi-agent Systems
Sort
View
HICSS
2005
IEEE
137views Biometrics» more  HICSS 2005»
14 years 2 months ago
Sliding Window Protocol for Group Communication in Ad-Hoc Networks
Existing ad hoc routing protocols are either unicast or multicast. In this paper we propose a simple extension to the Dynamic Source Routing Protocol (DSR) to cater for group comm...
In Joe Khor, Johnson P. Thomas, Istvan Jonyer
JCM
2007
114views more  JCM 2007»
13 years 8 months ago
Tunable Pulse Amplitude and Position Modulation Technique for Reliable Optical Wireless Communication Channels
—Modulation techniques have attracted increasing attention in optical wireless communications. Basic schemes such as on off keying (OOK), pulse amplitude modulation (PAM) and pul...
Yu Zeng, Roger J. Green, Shaobo Sun, Mark S. Leeso...
ICICS
2001
Springer
14 years 1 months ago
Enforcing Obligation with Security Monitors
With the ubiquitous deployment of large scale networks more and more complex human interactions are supported by computer applications. This poses new challenges on the expressive...
Carlos Ribeiro, Andre Zuquete, Paulo Ferreira
SP
2009
IEEE
101views Security Privacy» more  SP 2009»
14 years 3 months ago
Noninterference for a Practical DIFC-Based Operating System
The Flume system is an implementation of decentralized information flow control (DIFC) at the operating system level. Prior work has shown Flume can be implemented as a practical ...
Maxwell N. Krohn, Eran Tromer
SIGCOMM
2012
ACM
11 years 11 months ago
Towards detecting BGP route hijacking using the RPKI
Prefix hijacking has always been a big concern in the Internet. Some events made it into the international world-news, but most of them remain unreported or even unnoticed. The s...
Matthias Wählisch, Olaf Maennel, Thomas C. Sc...