Sciweavers

3751 search results - page 733 / 751
» Events in security protocols
Sort
View
WIMOB
2008
IEEE
14 years 2 months ago
An Ad Hoc Network Infrastructure: Communication and Information Sharing for Emergency Response
— During an emergency response, access to a reliable communication infrastructure is required to exchange accurate information in a timely manner. Various communication technolog...
Raheleh B. Dilmaghani, Ramesh R. Rao
ISCC
2006
IEEE
14 years 1 months ago
Characterizing Address Use Structure and Stability of Origin Advertisement in Inter-domain Routing
— The stability and robustness of BGP remains one of the most critical elements in sustaining today’s Internet. In this paper, we study the structure and stability of origin ad...
Sophie Y. Qiu, Patrick Drew McDaniel, Fabian Monro...
ISCC
2005
IEEE
107views Communications» more  ISCC 2005»
14 years 1 months ago
FTSE: The FNP-Like TCAM Searching Engine
As the Internet grows at a very rapid pace, so does the incidence of attack events and documented unlawful intrusions. The Network Intrusion Detection Systems (NIDSes) are designe...
Rong-Tai Liu, Chia-Nan Kao, Hung-Shen Wu, Ming-Cha...
ISW
2005
Springer
14 years 1 months ago
Tracing-by-Linking Group Signatures
In a group signature [19], any group member can sign on behalf of the group while remaining anonymous, but its identity can be traced in an future dispute investigation. Essentiall...
Victor K. Wei
DMSN
2004
ACM
14 years 1 months ago
Active rules for sensor databases
Recent years have witnessed a rapidly growing interest in query processing in sensor and actuator networks. This is mainly due to the increased awareness of query processing as th...
Michael Zoumboulakis, George Roussos, Alexandra Po...