Sciweavers

1663 search results - page 322 / 333
» Compositional Service Trees
Sort
View
TC
2010
13 years 6 months ago
Stateless Multicasting in Mobile Ad Hoc Networks
—There are increasing interest and big challenge in designing a scalable and robust multicast routing protocol in a mobile ad hoc network (MANET) due to the difficulty in group ...
Xiaojing Xiang, Xin Wang, Yuanyuan Yang
ESORICS
2009
Springer
14 years 8 months ago
Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing
Cloud Computing has been envisioned as the next-generation architecture of IT Enterprise. It moves the application software and databases to the centralized large data centers, whe...
Qian Wang, Cong Wang, Jin Li, Kui Ren, Wenjing Lou
ICDCS
2008
IEEE
14 years 2 months ago
Distributed Divide-and-Conquer Techniques for Effective DDoS Attack Defenses
Distributed Denial-of-Service (DDoS) attacks have emerged as a popular means of causing mass targeted service disruptions, often for extended periods of time. The relative ease an...
Muthusrinivasan Muthuprasanna, Govindarasu Manimar...
DCOSS
2005
Springer
14 years 1 months ago
jWebDust : A Java-Based Generic Application Environment for Wireless Sensor Networks
Abstract. Wireless sensor networks can be very useful in applications that require the detection of crucial events, in physical environments subjected to critical conditions, and t...
Ioannis Chatzigiannakis, Georgios Mylonas, Sotiris...
NOSSDAV
2010
Springer
14 years 14 days ago
RTP-miner: a real-time security framework for RTP fuzzing attacks
Real-time Transport Protocol (RTP) is a widely adopted standard for transmission of multimedia traffic in Internet telephony (commonly known as VoIP). Therefore, it is a hot poten...
M. Ali Akbar, Muddassar Farooq