Sciweavers

394 search results - page 71 / 79
» Efficient and Robust Secure Aggregation for Sensor Networks
Sort
View
CUZA
2002
76views more  CUZA 2002»
13 years 7 months ago
Probes Coordination Protocol for Network Performance Measurement
The fast expansion of Grid technologies emphasizes the importance of network performance measurement. Some network measurement methods, like TCP throughput or latency evaluation, a...
Robert Harakaly, Pascale Primet, Franck Bonnassieu...
ESAS
2006
Springer
13 years 11 months ago
Impact of Pseudonym Changes on Geographic Routing in VANETs
Inter-vehicle communication is regarded as one of the major applications of mobile ad hoc networks (MANETs). In these so called vehicular ad hoc networks (VANETs) security and priv...
Elmar Schoch, Frank Kargl, Tim Leinmüller, St...
GLOBECOM
2007
IEEE
14 years 1 months ago
Hierarchical Provisioning Algorithm for Virtual Private Networks Using the Hose Model
— Virtual Private Networks (VPN) provide a secure and reliable communication between customer sites over a shared network. Two models were proposed for the service provisioning i...
Monia Ghobadi, Sudhakar Ganti, Gholamali C. Shoja
IWIA
2005
IEEE
14 years 1 months ago
A General Cooperative Intrusion Detection Architecture for MANETs
1 Intrusion detection in MANETs is challenging because these networks change their topologies dynamically; lack concentration points where aggregated traffic can be analyzed; utili...
Daniel F. Sterne, Poornima Balasubramanyam, David ...
CORR
2010
Springer
177views Education» more  CORR 2010»
13 years 4 months ago
AntiJam: Efficient Medium Access despite Adaptive and Reactive Jamming
Abstract--Intentional interference constitutes a major threat for communication networks operating over a shared medium where availability is imperative. Jamming attacks are often ...
Andréa W. Richa, Christian Scheideler, Stef...