Sciweavers

2560 search results - page 470 / 512
» Securing VO Management
Sort
View
IJNSEC
2011
77views more  IJNSEC 2011»
13 years 4 months ago
Performance Evaluation of the TSS Node Authentication Scheme in Noisy MANETs
This paper presents a description and performance evaluation of a threshold secret sharing (TSS) node authentication scheme in noisy mobile ad hoc networks (MANETs). The scheme ca...
Hussein Al-Bahadili, Shakir Hussain, Ghassan Issa,...
JSAC
2011
159views more  JSAC 2011»
13 years 4 months ago
An Anti-Jamming Stochastic Game for Cognitive Radio Networks
—Various spectrum management schemes have been proposed in recent years to improve the spectrum utilization in cognitive radio networks. However, few of them have considered the ...
Beibei Wang, Yongle Wu, K. J. Ray Liu, T. Charles ...
JDCTA
2010
143views more  JDCTA 2010»
13 years 4 months ago
A Potent Model for Unwanted Traffic Detection in QoS Network Domain
Unwanted traffic injection which amplifies the traffic loading and exhausts network resources is counted as network security threat. Despite of the numerous protection systems, th...
Abdulghani Ali, Aman Jantan, Ghassan Ahmed Ali
TPDS
2010
134views more  TPDS 2010»
13 years 4 months ago
Null Data Frame: A Double-Edged Sword in IEEE 802.11 WLANs
Null data frames are a special but important type of frames in IEEE 802.11 WLANs. They are widely used in 802.11 WLANs for control purposes such as power management, channel scanni...
Wenjun Gu, Zhimin Yang, Dong Xuan, Weijia Jia, Can...
ASPLOS
2012
ACM
12 years 5 months ago
ELI: bare-metal performance for I/O virtualization
Direct device assignment enhances the performance of guest virtual machines by allowing them to communicate with I/O devices without host involvement. But even with device assignm...
Abel Gordon, Nadav Amit, Nadav Har'El, Muli Ben-Ye...