Sciweavers

360 search results - page 47 / 72
» Information Security on the Logistical Network: An End-to-En...
Sort
View
INFOCOM
2007
IEEE
14 years 2 months ago
Detecting Phantom Nodes in Wireless Sensor Networks
—In an adversarial environment, various kinds of security attacks become possible if malicious nodes could claim fake locations that are different from where they are physically ...
Joengmin Hwang, Tian He, Yongdae Kim
LCN
2006
IEEE
14 years 2 months ago
Flexible Flow Aggregation for Adaptive Network Monitoring
Network monitoring is a major building block for many domains in communication networks. Besides typical accounting mechanisms and the emerging area of charging in next generation...
Falko Dressler, Gerhard Münz
SAC
2008
ACM
13 years 8 months ago
Privacy-preserving link discovery
Abstract. Link discovery is a process of identifying association(s) among different entities included in a complex network structure. These association(s) may represent any interac...
Xiaoyun He, Basit Shafiq, Jaideep Vaidya, Nabil R....
PET
2009
Springer
14 years 3 months ago
Scalable Link-Based Relay Selection for Anonymous Routing
The performance of an anonymous path can be described using many network metrics – e.g., bandwidth, latency, jitter, loss, etc. However, existing relay selection algorithms have ...
Micah Sherr, Matt Blaze, Boon Thau Loo
ICDCSW
2008
IEEE
14 years 2 months ago
Real-Time Data Services for Cyber Physical Systems
Cyber Physical Systems (CPSs) have grand visions with great socio-economic impacts such as blackout-free electricity supply and real-time disaster recovery. A key challenge is pro...
Kyoung-Don Kang, Sang Hyuk Son