Sciweavers

548 search results - page 14 / 110
» Secure peer sampling
Sort
View
HICSS
2002
IEEE
97views Biometrics» more  HICSS 2002»
14 years 2 months ago
A Secure Platform for Peer-to-Peer Computing in the Internet
WooYoung Kim, Sven Graupner, Akhil Sahai
WSC
2004
13 years 11 months ago
Evaluation of Secure Peer-to-Peer Overlay Routing for Survivable SCADA Systems
Supervisory Control And Data Acquisition (SCADA) systems gather and analyze data for real-time control. SCADA systems are used extensively, in applications such as electrical powe...
Jeffrey J. Farris, David M. Nicol
MDM
2009
Springer
126views Communications» more  MDM 2009»
14 years 4 months ago
Outlier Detection in Ad Hoc Networks Using Dempster-Shafer Theory
Mobile Ad-hoc NETworks (MANETs) are known to be vulnerable to a variety of attacks due to lack of central authority or fixed network infrastructure. Many security schemes have bee...
Wenjia Li, Anupam Joshi