Sciweavers

3452 search results - page 77 / 691
» Secure Data Outsourcing
Sort
View
TMC
2010
138views more  TMC 2010»
13 years 8 months ago
Secure Data Collection in Wireless Sensor Networks Using Randomized Dispersive Routes
—Compromised-node and denial-of-service are two key attacks in wireless sensor networks (WSNs). In this paper, we study routing mechanisms that circumvent (bypass) black holes fo...
Tao Shu, Marwan Krunz, Sisi Liu
IJIPM
2010
77views more  IJIPM 2010»
13 years 7 months ago
Increase honeypot security through data analysis
Milad Daliran, Ramin Nassiri
COMCOM
2011
13 years 4 months ago
Securing the data path of next-generation router systems
Tilman Wolf, Russell Tessier, Gayatri Prabhu
CHI
2011
ACM
13 years 1 months ago
Data type based security alert dialogs
Max-Emanuel Maurer, Alexander De Luca, Heinrich Hu...