Sciweavers

948 search results - page 36 / 190
» Making a Game of Network Security
Sort
View
NCA
2006
IEEE
14 years 2 months ago
SecLEACH - A Random Key Distribution Solution for Securing Clustered Sensor Networks
Clustered sensor networks have been shown to increase system throughput, decrease system delay, and save energy. While those with rotating cluster heads, such as LEACH, have also ...
Leonardo B. Oliveira, Hao Chi Wong, Marshall W. Be...
ICDE
2008
IEEE
200views Database» more  ICDE 2008»
14 years 3 months ago
Enforcing security in semantics driven policy based networks
— Security is emerging as an important requirement for a number of distributed applications such as online banking, social networking etc. due to the private nature of the data b...
Palanivel Balaji Kodeswaran, Sethuram Balaji Kodes...
INFOCOM
2006
IEEE
14 years 2 months ago
Repeated-Game Modeling of Multicast Overlays
— This paper studies multicast application overlay networks in a repeated-game framework. In these overlays, users have both the motivation and the means to alter their position...
Mike Afergan, Rahul Sami
BERTINORO
2005
Springer
14 years 2 months ago
Multifaceted Simultaneous Load Balancing in DHT-Based P2P Systems: A New Game with Old Balls and Bins
In this paper we present and evaluate uncoordinated on-line algorithms for simultaneous storage and replication load-balancing in DHT-based peer-to-peer systems. We compare our ap...
Karl Aberer, Anwitaman Datta, Manfred Hauswirth
SUTC
2010
IEEE
14 years 16 days ago
Pollution Attack Defense for Coding Based Sensor Storage
—We present a novel information theoretic approach to make network coding based storage secure against pollution attacks in sensor networks. The approach is based on a new decodi...
Levente Buttyán, Laszlo Czap, István...