Sciweavers

1318 search results - page 142 / 264
» Measuring network security using dynamic bayesian network
Sort
View
JNSM
2000
96views more  JNSM 2000»
13 years 9 months ago
Multi-service Dynamic QoS Routing Schemes with Call Admission Control: A Comparative Study
In this paper, we consider wide-area backbone networks where multiple connection-oriented guaranteed services with differing bandwidth/flow requirements are offered. Specifically,...
Deep Medhi, I. Sukiman
MM
2003
ACM
118views Multimedia» more  MM 2003»
14 years 2 months ago
PROMISE: peer-to-peer media streaming using CollectCast
We present the design, implementation, and evaluation of PROMISE, a novel peer-to-peer media streaming system encompassing the key functions of peer lookup, peer-based aggregated ...
Mohamed Hefeeda, Ahsan Habib, Boyan Botev, Dongyan...
ESAS
2007
Springer
14 years 3 months ago
Authenticating DSR Using a Novel Multisignature Scheme Based on Cubic LFSR Sequences
The problem of secure routing in mobile ad hoc networks is long-standing and has been extensively studied by researchers. Recently, techniques of aggregating signatures have been a...
Saikat Chakrabarti 0002, Santosh Chandrasekhar, Mu...
CORR
2008
Springer
106views Education» more  CORR 2008»
13 years 9 months ago
GossiCrypt: Wireless Sensor Network Data Confidentiality Against Parasitic Adversaries
Resource and cost constraints remain a challenge for wireless sensor network security. In this paper, we propose a new approach to protect confidentiality against a parasitic adver...
Jun Luo, Panos Papadimitratos, Jean-Pierre Hubaux
ACSAC
2006
IEEE
14 years 3 months ago
Addressing SMTP-Based Mass-Mailing Activity within Enterprise Networks
Malicious mass-mailing activity on the Internet is a serious and continuing threat that includes mass-mailing worms, spam, and phishing. A mechanism commonly used to deliver such ...
David Whyte, Paul C. van Oorschot, Evangelos Krana...