Sciweavers

188 search results - page 32 / 38
» Simulative Evaluation of Security Attacks in Networked Criti...
Sort
View
RIVF
2007
13 years 11 months ago
Stochastic routing in large grid-shaped quantum networks
— This paper investigates the problem of secret key transmissions for an arbitrary Alice-Bob pair in Quantum Key Distribution (QKD)-based networks. We develop a realistic QKDbase...
Cuong Le Quoc, Patrick Bellot, Akim Demaille
IPSN
2005
Springer
14 years 3 months ago
Attack-resistant location estimation in sensor networks
— Many sensor network applications require sensors’ locations to function correctly. Despite the recent advances, location discovery for sensor networks in hostile environments...
Donggang Liu, Peng Ning, Wenliang Du
IPCCC
2007
IEEE
14 years 4 months ago
ACM: A Transmission Mechanism for Urgent Sensor Information
The wireless sensor network (WSN) is one of the most promising technologies which helps making our society safe, secure, and comfortable. A WSN as a social infrastructure must tra...
Tetsuya Kawai, Naoki Wakamiya, Masayuki Murata
CCS
2007
ACM
14 years 4 months ago
Memsherlock: an automated debugger for unknown memory corruption vulnerabilities
Software vulnerabilities have been the main contributing factor to the Internet security problems such as fast spreading worms. Among these software vulnerabilities, memory corrup...
Emre Can Sezer, Peng Ning, Chongkyung Kil, Jun Xu
INFOCOM
2007
IEEE
14 years 4 months ago
Navigation in Distance Vector Spaces and Its Use for Node Avoidance Routing
—Traditional network routing uses the single (shortest) path paradigm. This paradigm exposes sessions to various attacks along this path, such as eavesdropping, DoS attacks etc. ...
Haim Zlatokrilov, Hanoch Levy