Sciweavers

371 search results - page 41 / 75
» Secure Dynamic Source Routing
Sort
View
SIGCOMM
2012
ACM
11 years 11 months ago
Signposts: end-to-end networking in a world of middleboxes
This demo presents Signposts, a system to provide users with a secure, simple mechanism to establish and maintain communication channels between their personal cloud of named devi...
Amir Chaudhry, Anil Madhavapeddy, Charalampos Rots...
CCS
2007
ACM
14 years 2 months ago
Non-intrusive IP traceback for DDoS attacks
The paper describes a Non-Intrusive IP traceback scheme which uses sampled traffic under non-attack conditions to build and maintains caches of the valid source addresses transiti...
Vrizlynn L. L. Thing, Morris Sloman, Naranker Dula...
MOBIHOC
2002
ACM
14 years 8 months ago
Performance analysis of the CONFIDANT protocol
: Mobile ad-hoc networking works properly only if the participating nodes cooperate in routing and forwarding. However, it may be advantageous for individual nodes not to cooperate...
Sonja Buchegger, Jean-Yves Le Boudec
ACISICIS
2005
IEEE
14 years 2 months ago
Performance Analysis on Mobility of Ad-Hoc Network for Inter-Vehicle Communication
This paper presents the feasibility of using an ad-hoc network as an infrastructure for a small group of inter-vehicle communication network. Mobile ad-hoc networking with wireles...
Jaehyun Kim, Woojin Han, Woohyuk Choi, Yunil Hwang...
INFOCOM
2003
IEEE
14 years 1 months ago
On-demand Power Management for Ad Hoc Networks
— Battery power is an important resource in ad hoc networks. It has been observed that in ad hoc networks, energy consumption does not reflect the communication activities in th...
Rong Zheng, Robin Kravets