Sciweavers

167 search results - page 25 / 34
» Security in P2P Networks: Survey and Research Directions
Sort
View

Publication
104views
14 years 9 months ago
Examining travel distances by walking and cycling, Montréal, Canada
Active transportation – especially walking and cycling – is undergoing a surge in popularity in urban planning and transportation circles as a solution to the environmental and...
Yasmin, F., Larsen, J. & El-Geneidy, A.
INFOCOM
2011
IEEE
12 years 11 months ago
Fast and scalable secret key generation exploiting channel phase randomness in wireless networks
—Recently, there has been great interest in physical layer security techniques that exploit the randomness of wireless channels for securely extracting cryptographic keys. Severa...
Qian Wang, Hai Su, Kui Ren, Kwangjo Kim
SIGMOD
2009
ACM
161views Database» more  SIGMOD 2009»
14 years 8 months ago
Cross-tier, label-based security enforcement for web applications
This paper presents SELinks, a programming language focused on building secure multi-tier web applications. SELinks provides a uniform programming model, in the style of LINQ and ...
Brian J. Corcoran, Nikhil Swamy, Michael W. Hicks
NETWORKING
2007
13 years 9 months ago
Using PANA for Mobile IPv6 Bootstrapping
One of the current challenge of the Mobile IPv6 Working Group at the IETF is to dynamically assign to a Mobile Node its Home Agent, Home Address and to setup necessary security ass...
Julien Bournelle, Jean Michel Combes, Maryline Lau...
ISI
2008
Springer
13 years 7 months ago
Data mining for social network analysis
A social network is defined as a social structure of individuals, who are related (directly or indirectly to each other) based on a common relation of interest, e.g. friendship, t...
J. Srivastava