Sciweavers

360 search results - page 19 / 72
» Information Security on the Logistical Network: An End-to-En...
Sort
View
ICCS
2007
Springer
14 years 2 months ago
Dynamical Patterns in Scalefree Trees of Coupled 2D Chaotic Maps
New insights have been gained recently into the interplay between complex network architectures and the collective dynamics of simple elements coupled through them. The usual parad...
Zoran Levnajic, Bosiljka Tadic
CCS
2011
ACM
12 years 8 months ago
Trust-based anonymous communication: adversary models and routing algorithms
We introduce a novel model of routing security that incorporates the ordinarily overlooked variations in trust that users have for different parts of the network. We focus on ano...
Aaron Johnson, Paul F. Syverson, Roger Dingledine,...
EUROSEC
2009
ACM
14 years 3 months ago
Deep packet anonymization
Network traces of Internet attacks are among the most valuable resources for network analysts and security researchers. However, organizations and researchers are usually reluctan...
Michalis Foukarakis, Demetres Antoniades, Michalis...
DSOM
2006
Springer
14 years 2 days ago
Efficient Information Retrieval in Network Management Using Web Services
Abstract. Web Services is an XML-based technology that has attracted significant attention for building distributed Internet services. There have also been significant efforts tryi...
Aimilios Chourmouziadis, George Pavlou
PERCOM
2005
ACM
14 years 8 months ago
Expose or Not? A Progressive Exposure Approach for Service Discovery in Pervasive Computing Environments
In pervasive computing environments, service discovery facilitates users to access network services by automating tedious manual configurations. When network services becomes perv...
Feng Zhu, Wei Zhu, Matt W. Mutka, Lionel M. Ni