Sciweavers

430 search results - page 36 / 86
» Securing Layer 2 in Local Area Networks
Sort
View
INFOCOM
2006
IEEE
14 years 2 months ago
Collaboration Improves the Connectivity of Wireless Networks
— In the standard approach to studying connectivity, a physical layer is assumed that allows direct transmission between neighbors within some fixed distance. The graph resultin...
Sanquan Song, Dennis Goeckel, Donald F. Towsley
PERCOM
2006
ACM
14 years 7 months ago
Node Clustering in Mobile Peer-to-Peer Multihop Networks
In mobile peer-to-peer (MP2P) networks, nodes tend to gather together rather than scattered uniformly across the network area. This paper considers the clustering of peer nodes an...
Chansu Yu, Kang G. Shin, Ben Lee, Seung-Min Park, ...
NCA
2003
IEEE
14 years 1 months ago
Adaptive Use of Network-Centric Mechanisms in Cyber-Defense
Attacks against distributed systems frequently start at the network layer by gathering network related information (such as open TCP ports) and continue on by exhausting resources...
Michael Atighetchi, Partha Pratim Pal, Franklin We...
CORR
2008
Springer
153views Education» more  CORR 2008»
13 years 8 months ago
Efficient and Robust Secure Aggregation for Sensor Networks
Abstract-- Wireless Sensor Networks (WSNs) rely on innetwork aggregation for efficiency, however, this comes at a price: A single adversary can severely influence the outcome by co...
Parisa Haghani, Panagiotis Papadimitratos, Marcin ...
NDSS
2000
IEEE
14 years 12 days ago
Secure Virtual Enclaves: Supporting Coalition Use of Distributed Application Technologies
The Secure Virtual Enclaves (SVE) collaboration infrastructure allows multiple organizations to share their distributed application objects, while respecting organizational autono...
Deborah Shands, Richard Yee, Jay Jacobs, E. John S...