Sciweavers

5234 search results - page 177 / 1047
» Simulation of Computer Network Attacks
Sort
View
WOWMOM
2005
ACM
165views Multimedia» more  WOWMOM 2005»
15 years 7 months ago
Hybrid Key Establishment for Multiphase Self-Organized Sensor Networks
Recent work on key establishment for sensor networks has shown that it is feasible to employ limited Elliptic Curve Cryptography in sensor networks through hybrid protocols. In th...
Panayiotis Kotzanikolaou, Emmanouil Magkos, Christ...
RTSS
2003
IEEE
15 years 7 months ago
JAM: A Jammed-Area Mapping Service for Sensor Networks
Preventing denial-of-service attacks in wireless sensor networks is difficult primarily because of the limited resources available to network nodes and the ease with which attacks...
Anthony D. Wood, John A. Stankovic, Sang Hyuk Son
WSC
2004
15 years 3 months ago
Simulation-Based Optimization for Material Dispatching in a Retailer Network
This paper presents preliminary work done on simulationbased optimization of a stochastic material-dispatching system in a retailer network. The problem we consider is one of dete...
Ganesh Subramaniam, Abhijit Gosavi
PERCOM
2005
ACM
16 years 1 months ago
Security Analysis of Two Anonymous Authentication Protocols for Distributed Wireless Networks
In a set of distributed wireless networks, such as globally distributed cellular systems, different networks could be administered by different operators. Mobile devices subscribe...
Duncan S. Wong
WONS
2005
IEEE
15 years 8 months ago
Secure Multipath Routing for Mobile Ad Hoc Networks
Multipath routing minimizes the consequences of security attacks deriving from collaborating malicious nodes in MANET, by maximizing the number of nodes that an adversary must com...
Panayiotis Kotzanikolaou, Rosa Mavropodi, Christos...