Sciweavers

5511 search results - page 112 / 1103
» Security for Network Places
Sort
View
APNOMS
2006
Springer
14 years 2 months ago
Path Hopping Based on Reverse AODV for Security
In Ad hoc networks, malicious nodes can enter in radio transmission range on the routing path and disrupt network activity. Therefore, protecting from intrusion of malicious node a...
Elmurod Talipov, Donxue Jin, JaeYoun Jung, Ilkhyu ...
WASA
2009
Springer
127views Algorithms» more  WASA 2009»
14 years 5 months ago
Experimental Study on Secure Data Collection in Vehicular Sensor Networks
Abstract. In this paper, we show through a simple secure symmetric key based protocol design and its implementation the feasibility of secure data collection in a vehicular sensor ...
Harry Gao, Seth Utecht, Fengyuan Xu, Haodong Wang,...
ACSAC
1998
IEEE
14 years 2 months ago
Role-Based Access Control Framework for Network Enterprises
A business's success depends on its ability to protect valuable business assets in an increasingly hostile environment. Protecting information requires a cost, not only in pu...
D. J. Thomsen, D. O'Brien, J. Bogle
CSREASAM
2009
13 years 11 months ago
Specialized Solutions for Improvement of Firewall Performance and Conformity to Security Policy
- Until recently the reasons for reduced efficiency and limited implementation of new security systems has been the insufficient performance of hardware that executes access contro...
Vladimir S. Zaborovsky, Anton Titov
COMCOM
2008
87views more  COMCOM 2008»
13 years 10 months ago
Providing VANET security through active position detection
Vehicle position is one of the most valuable pieces of information in a Vehicular Adhoc NETwork (VANET). The main contribution of this work is a novel approach to enhancing positi...
Gongjun Yan, Stephan Olariu, Michele C. Weigle