Sciweavers

167 search results - page 20 / 34
» Security in P2P Networks: Survey and Research Directions
Sort
View
CORR
2010
Springer
108views Education» more  CORR 2010»
13 years 7 months ago
Securing data transfer in the cloud through introducing identification packet and UDT-authentication option field: a characteriz
The emergence of various technologies has since pushed researchers to develop new protocols that support high density data transmissions in Wide Area Networks. Many of these proto...
Danilo Valeros Bernardo, Doan B. Hoang
ISSA
2008
13 years 9 months ago
Emerging Framework for The Evaluation of Open Source Security Tools
The drive from the South African Government towards the adoption of open source software across all platforms, incurred a number of research and development questions. The open so...
Elmarie Biermann, Jan Mentz
FC
2001
Springer
123views Cryptology» more  FC 2001»
14 years 8 days ago
Trust: A Collision of Paradigms
The technological challenges of securing networks are great, as recently witnessed in widespread denial of service and virus attacks. The human reaction to these attacks may be ei...
L. Jean Camp, Helen Nissenbaum, Cathleen McGrath
COMSUR
2011
263views Hardware» more  COMSUR 2011»
12 years 7 months ago
Networked Wireless Sensor Data Collection: Issues, Challenges, and Approaches
—Wireless sensor networks (WSNs) have been applied to many applications since emerging. Among them, one of the most important applications is Sensor Data Collections, where sense...
Feng Wang, Jiangchuan Liu
JDA
2006
184views more  JDA 2006»
13 years 7 months ago
Dynamic shortest paths and transitive closure: Algorithmic techniques and data structures
In this paper, we survey fully dynamic algorithms for path problems on general directed graphs. In particular, we consider two fundamental problems: dynamic transitive closure and...
Camil Demetrescu, Giuseppe F. Italiano