Sciweavers

257 search results - page 19 / 52
» Delegating network security with more information
Sort
View
ADHOC
2007
144views more  ADHOC 2007»
13 years 8 months ago
Adaptive gossip protocols: Managing security and redundancy in dense ad hoc networks
Abstract. Many ad hoc routing algorithms rely on broadcast flooding for location discovery or, more generally, for secure routing applications. Flooding is a robust algorithm but ...
Mike Burmester, Tri Van Le, Alec Yasinsac
ICDCS
2010
IEEE
14 years 10 days ago
Existence Theorems and Approximation Algorithms for Generalized Network Security Games
—Aspnes et al [2] introduced an innovative game for modeling the containment of the spread of viruses and worms (security breaches) in a network. In this model, nodes choose to i...
V. S. Anil Kumar, Rajmohan Rajaraman, Zhifeng Sun,...
ICCCN
1998
IEEE
14 years 21 days ago
An Evolutionary Approach to Multilaterally Secure Services in ISDN / IN
Data protection and data security become more significant since telecommunication services and innovative applications based on these services handle an increasing amount of sensi...
Reiner Sailer
AINA
2005
IEEE
14 years 2 months ago
A Scheme for Testing Privacy State in Pervasive Sensor Networks
More and more sensor networks will be deployed in the place where people are living, studying, and working. These sensor networks bring us the convenience of accessing information...
Yingpeng Sang, Hong Shen
WWW
2010
ACM
14 years 3 months ago
Not so creepy crawler: easy crawler generation with standard xml queries
Web crawlers are increasingly used for focused tasks such as the extraction of data from Wikipedia or the analysis of social networks like last.fm. In these cases, pages are far m...
Franziska von dem Bussche, Klara A. Weiand, Benedi...