Sciweavers

150 search results - page 24 / 30
» Interest-Based Access Control for Content Centric Networks
Sort
View
136
Voted
PET
2010
Springer
15 years 7 months ago
unFriendly: Multi-party Privacy Risks in Social Networks
Abstract. As the popularity of social networks expands, the information users expose to the public has potentially dangerous implications for individual privacy. While social netwo...
Kurt Thomas, Chris Grier, David M. Nicol
133
Voted
ACMICEC
2007
ACM
163views ECommerce» more  ACMICEC 2007»
15 years 7 months ago
Digital rights management using a mobile phone
This paper focuses on the problem of preventing illegal copying of digital assets without jeopardising the right of legitimate licence holders to transfer content between their ow...
Imad M. Abbadi, Chris J. Mitchell
121
Voted
WS
2006
ACM
15 years 9 months ago
Detecting identity-based attacks in wireless networks using signalprints
Wireless networks are vulnerable to many identity-based attacks in which a malicious device uses forged MAC addresses to masquerade as a specific client or to create multiple ill...
Daniel B. Faria, David R. Cheriton
152
Voted
ICC
2007
IEEE
193views Communications» more  ICC 2007»
15 years 10 months ago
Power-Aware MAC for MultiHop Wireless Networks: A Cross Layer Approach
— This paper addresses the problem of designing a power-aware Multiple Access Control (MAC) protocol for Multihop Wireless Networks (MHWN). The problem is formulated as a cross l...
Abdorasoul Ghasemi, Karim Faez
140
Voted
VTC
2007
IEEE
159views Communications» more  VTC 2007»
15 years 10 months ago
Data Fragmentation Scheme in IEEE 802.15.4 Wireless Sensor Networks
— The IEEE 802.15.4 Medium Access Control (MAC) protocol is designed for low data rate, short distance and low power communication applications such as Wireless Sensor Networks (...
Jongwon Yoon, Hyogon Kim, Jeong-Gil Ko