Sciweavers

73 search results - page 4 / 15
» Securing user-controlled routing infrastructures
Sort
View
CSFW
2010
IEEE
13 years 11 months ago
Modeling and Verifying Ad Hoc Routing Protocols
Mobile ad hoc networks consist of mobile wireless devices which autonomously organize their infrastructure. In such a network, a central issue, ensured by routing protocols, is to ...
Mathilde Arnaud, Véronique Cortier, St&eacu...
WETICE
2000
IEEE
13 years 11 months ago
Towards Secure e-Services
This poster paper presents a work in progress in the new emerging area of electronic services (e-services). The networked home with refrigerators and washing machines connected to...
Claudiu Duma, Almut Herzog, Nahid Shahmehri
ICN
2005
Springer
14 years 25 days ago
Discovery and Routing in the HEN Heterogeneous Peer-to-Peer Network
Network infrastructures are nowadays getting more and more complex as security considerations and technical needs like network address translation are blocking traffic and protocol...
Tim Schattkowsky
SIGCOMM
2009
ACM
14 years 1 months ago
Diverter: a new approach to networking within virtualized infrastructures
As virtualized data-centres become the back-end platforms behind a new generation of utility and cloud computing infrastructures (such as AmazonAWS [1]) their multi-tenancy, scale...
Aled Edwards, Anna Fischer, Antonio Lain
ICNP
2002
IEEE
14 years 8 days ago
A Secure Routing Protocol for Ad Hoc Networks
Most recent ad hoc network research has focused on providing routing services without considering security. In this paper, we detail security threats against ad hoc routing protoc...
Kimaya Sanzgiri, Bridget Dahill, Brian Neil Levine...