Sciweavers

836 search results - page 73 / 168
» Privacy and Trust in Distributed Networks
Sort
View
CSFW
1992
IEEE
14 years 25 days ago
Attribute Support for Inter-Domain Use
Mary Ellen Zurko Laboratory for Computer Science Massachusetts Institute of Technology and Digital Equipment Corporation Littleton, MA, 01460 This paper describes the User Attribu...
Mary Ellen Zurko
MOBICOM
2010
ACM
13 years 9 months ago
Privacy vulnerability of published anonymous mobility traces
Mobility traces of people and vehicles have been collected and published to assist the design and evaluation of mobile networks, such as large-scale urban sensing networks. Althou...
Chris Y. T. Ma, David K. Y. Yau, Nung Kwan Yip, Na...
CCS
2007
ACM
14 years 22 days ago
Mitigating denial-of-service attacks in MANET by distributed packet filtering: a game-theoretic approach
Defending against denial-of-service (DoS) in a mobile ad hoc network (MANET) is challenging because the network topology is dynamic and nodes are selfish. In this paper, we propos...
Xiaoxin Wu, David K. Y. Yau
ACSAC
2001
IEEE
14 years 12 days ago
Requirements for a General Framework for Response to Distributed Denial-of-Service
What is network denial of service (DoS), and why is it such a problem? This research project has sought to investigate these questions and look at the deeper questions such as can...
D. W. Gresty, Qi Shi, Madjid Merabti
EUROPKI
2007
Springer
14 years 2 months ago
Undeniable Mobile Billing Schemes
An undeniable mobile billing system allows a mobile network service provider to bill its subscribers with trustworthy evidences. Chen, Jan and Chen proposed such a billing system b...
Shiqun Li, Guilin Wang, Jianying Zhou, Kefei Chen