Sciweavers

1357 search results - page 265 / 272
» Security in Wireless Sensor Networks: Issues and Challenges
Sort
View
ESORICS
2007
Springer
14 years 2 months ago
Cloak: A Ten-Fold Way for Reliable Covert Communications
A number of network covert channels have been proposed recently that may have important ramifications for Internet security and privacy. However, they could become ineffective in...
Xiapu Luo, Edmond W. W. Chan, Rocky K. C. Chang
ACSW
2006
13 years 10 months ago
Synapse: auto-correlation and dynamic attack redirection in an immunologically-inspired IDS
Intrusion detection systems (IDS) perform an important role in the provision of network security, providing real- time notification of attacks in progress. One promising category ...
David Duncombe, George M. Mohay, Andrew Clark
JSAC
2006
112views more  JSAC 2006»
13 years 8 months ago
Performance Optimizations for Deploying VoIP Services in Mesh Networks
In the recent past, there has been a tremendous increase in the popularity of VoIP services as a result of huge growth in broadband access. The same voice-over-Internet protocol (V...
Samrat Ganguly, Vishnu Navda, Kyungtae Kim, Anand ...
ISLPED
2006
ACM
128views Hardware» more  ISLPED 2006»
14 years 2 months ago
Design and power management of energy harvesting embedded systems
Harvesting energy from the environment is a desirable and increasingly important capability in several emerging applications of embedded systems such as sensor networks, biomedica...
Vijay Raghunathan, Pai H. Chou
JCM
2006
101views more  JCM 2006»
13 years 8 months ago
On the Analysis of Mobility Mechanisms in Micro Mobile MPLS Access Networks
Abstract--One of the major challenges for the nextgeneration mobile systems is related to efficient mobility management issue. In this paper, we propose a new micromobility managem...
Rami Langar, Nizar Bouabdallah, Samir Tohmé