Sciweavers

510 search results - page 54 / 102
» Security issues in control, management and routing protocols
Sort
View
COMCOM
2008
138views more  COMCOM 2008»
13 years 8 months ago
Secure content access and replication in pure P2P networks
Despite the advantages offered by pure Peer-to-Peer (P2P) networks (e.g. robustness and fault tolerance), a crucial requirement is to guarantee basic security properties, such as ...
Esther Palomar, Juan M. Estévez-Tapiador, J...
INFOCOM
2007
IEEE
14 years 2 months ago
Robust and Scalable Geographic Multicast Protocol for Mobile Ad-hoc Networks
— Group communications are important in Mobile Ad hoc Networks (MANET). Multicast is an efficient method to implement the group communications. However, it is challenging to imp...
Xiaojing Xiang, Zehua Zhou, Xin Wang
SASN
2003
ACM
14 years 1 months ago
SECTOR: secure tracking of node encounters in multi-hop wireless networks
In this paper we present SECTOR, a set of mechanisms for the secure verification of the time of encounters between nodes in multi-hop wireless networks. This information can be u...
Srdjan Capkun, Levente Buttyán, Jean-Pierre...
COMPSEC
2006
90views more  COMPSEC 2006»
13 years 7 months ago
On Incident Handling and Response: A state-of-the-art approach
Incident Response has always been an important aspect of Information Security but it is often overlooked by security administrators. Responding to an incident is not solely a techn...
Sarandis Mitropoulos, Dimitrios Patsos, Christos D...
FMLDO
1999
Springer
137views Database» more  FMLDO 1999»
14 years 2 days ago
Federated Transaction Management with Snapshot Isolation
Federated transaction management (also known as multidatabase transaction management in the literature) is needed to ensure the consistency of data that is distributed across mult...
Ralf Schenkel, Gerhard Weikum, Norbert Weiße...