Sciweavers

832 search results - page 36 / 167
» Effect of Malicious Synchronization
Sort
View
JWSR
2008
109views more  JWSR 2008»
13 years 9 months ago
DsCWeaver: Synchronization-Constraint Aspect Extension to Procedural Process Specification Languages
BPEL is emerging as an open-standards language for Web service composition. However, its procedural style can lead to inflexible and tangled code for managing a crosscutting aspec...
Qinyi Wu, Calton Pu, Akhil Sahai, Roger S. Barga
SERSCISA
2010
Springer
13 years 8 months ago
Energy Efficiency of Collaborative Communication with Imperfect Frequency Synchronization in Wireless Sensor Networks
Collaborative communication produces significant (N2 where N is number of nodes used for collaboration) power gain and overcomes the effect of fading. With imperfect frequency sync...
Husnain Naqvi, Stevan M. Berber, Zoran A. Salcic
SIGCOMM
2006
ACM
14 years 3 months ago
SybilGuard: defending against sybil attacks via social networks
Peer-to-peer and other decentralized, distributed systems are known to be particularly vulnerable to sybil attacks. In a sybil attack, a malicious user obtains multiple fake ident...
Haifeng Yu, Michael Kaminsky, Phillip B. Gibbons, ...
IPSN
2005
Springer
14 years 3 months ago
Attack-resistant location estimation in sensor networks
— Many sensor network applications require sensors’ locations to function correctly. Despite the recent advances, location discovery for sensor networks in hostile environments...
Donggang Liu, Peng Ning, Wenliang Du
CORR
2010
Springer
164views Education» more  CORR 2010»
13 years 8 months ago
Securing AODV for MANETs using Message Digest with Secret Key
Due to lack of the infrastructure, open peer-to-peer architecture, shared wireless medium, limited resource constraints and highly dynamic topology, MANETs (Mobile Adhoc Networks) ...
Kamaljit I. Lakhtaria, Bhaskar N. Patel, Satish G....