Sciweavers

257 search results - page 10 / 52
» Delegating network security with more information
Sort
View
IEEEARES
2006
IEEE
14 years 2 months ago
Mitigating Denial of Service Threats in GSM Networks
–Mobile networks not only provide great benefits to their users but they also introduce inherent security issues. With respect to security, the emerging risks of denial of servic...
Valer Bocan, Vladimir Cretu
ISI
2008
Springer
13 years 8 months ago
Information sharing and privacy protection of terrorist or criminal social networks
Terrorist or criminal social network analysis is helpful for intelligence and law enforcement force in investigation. However, individual agency usually has part of the complete te...
Christopher C. Yang
SIGCOMM
2010
ACM
13 years 8 months ago
How secure are secure interdomain routing protocols
In response to high-profile Internet outages, BGP security variants have been proposed to prevent the propagation of bogus routing information. To inform discussions of which vari...
Sharon Goldberg, Michael Schapira, Peter Hummon, J...
WCNC
2010
IEEE
13 years 6 months ago
Characterization of the Secrecy Region of a Single Relay Cooperative System
Abstract—Security is an important aspect for the future wireless networks. Since the number of network nodes increases constantly, and, in addition, the networks are decentralize...
Ninoslav Marina, Are Hjørungnes
ICC
2007
IEEE
104views Communications» more  ICC 2007»
14 years 2 months ago
Secure Tracking in Sensor Networks
Abstract— Target tracking is a canonical issue in sensor networks research. However, tracking security has gained little or no attention. Once a sensor node is compromised, it wi...
Chih-Chieh Geoff Chang, Wesley E. Snyder, Cliff Wa...