Sciweavers

849 search results - page 74 / 170
» Evaluation of Security Protocols for the Session Initiation ...
Sort
View
GCC
2005
Springer
14 years 1 months ago
A Routing Protocol Based on Trust for MANETs
Abstract. Ad hoc network is a peer-to-peer grid system. The combination of the Knowledge Grid and ad hoc network could have a great effect on the future interconnection environment...
Cuirong Wang, Xiaozong Yang, Yuan Gao
STORAGESS
2006
ACM
14 years 1 months ago
Scalable security for large, high performance storage systems
New designs for petabyte-scale storage systems are now capable of transferring hundreds of gigabytes of data per second, but lack strong security. We propose a scalable and effici...
Andrew W. Leung, Ethan L. Miller
ASIACRYPT
1999
Springer
14 years 21 hour ago
Approximation Hardness and Secure Communication in Broadcast Channels
Problems of secure communication and computation have been studied extensively in network models. Goldreich, Goldwasser, and Linial, Franklin and Yung, and Franklin and Wright have...
Yvo Desmedt, Yongge Wang
ICUIMC
2009
ACM
14 years 2 months ago
Proposal and evaluation of multiple gateways distribution method for wireless mesh network
Researches on the wireless mesh network in which access points (APs) of a wireless LAN are connected by an ad-hoc networks are recently drawing much attention. In the wireless mes...
Masashi Ito, Toshihiro Shikama, Akira Watanabe
SIGSOFT
2000
ACM
14 years 3 days ago
Bugs in the programs
Fuzzing is a well-known black-box approach to the security testing of applications. Fuzzing has many advantages in terms of simplicity and effectiveness over more complex, expensi...
Richard D. Pethia