Sciweavers

4263 search results - page 97 / 853
» Network Security
Sort
View
146
Voted
CCS
2009
ACM
15 years 9 months ago
NISAN: network information service for anonymization networks
Network information distribution is a fundamental service for any anonymization network. Even though anonymization and information distribution about the network are two orthogona...
Andriy Panchenko, Stefan Richter, Arne Rache
129
Voted
AINA
2008
IEEE
15 years 9 months ago
Secure Routing Protocol with Malicious Nodes Detection for Ad Hoc Networks
An ad hoc network is a highly dynamic routing network cooperated by a set of wireless mobile nodes without any assistance of centralized access point. ARIADNE is a well-known secu...
Chu-Hsing Lin, Wei-Shen Lai, Yen-Lin Huang, Mei-Ch...
150
Voted
MOBIHOC
2005
ACM
16 years 2 months ago
Toward resilient security in wireless sensor networks
Node compromise poses severe security threats in wireless sensor networks. Unfortunately, existing security designs can address only a small, fixed threshold number of compromised...
Hao Yang, Fan Ye, Yuan Yuan, Songwu Lu, William A....
CHI
2007
ACM
16 years 3 months ago
Designing software for consumers to easily set up a secure home network
Brenton Elmore, Stuart Hamilton, Subbarao Ivaturi
95
Voted
CCS
2010
ACM
15 years 2 months ago
Secure latency estimation with treeple
A network latency estimation scheme associates a "position" to every peer in a distributed network such that the latency between any two nodes can be accurately estimate...
Eric Chan-Tin, Nicholas Hopper