Sciweavers

1331 search results - page 57 / 267
» Trust Establishment in Distributed Networks: Analysis and Mo...
Sort
View
JAIR
2002
182views more  JAIR 2002»
13 years 9 months ago
An Analysis of Phase Transition in NK Landscapes
In this paper, we analyze the decision version of the NK landscape model from the perspective of threshold phenomena and phase transitions under two random distributions, the unif...
Yong Gao, Joseph C. Culberson
ACSAC
2006
IEEE
14 years 4 months ago
V-COPS: A Vulnerability-Based Cooperative Alert Distribution System
The efficiency of promptly releasing security alerts of established analysis centers has been greatly challenged by the continuous emergence of various large scale network attack...
Shiping Chen, Dongyu Liu, Songqing Chen, Sushil Ja...
ESORICS
2009
Springer
14 years 10 months ago
A Privacy Preservation Model for Facebook-Style Social Network Systems
Abstract. Recent years have seen unprecedented growth in the popularity of social network systems, with Facebook being an archetypical example. The access control paradigm behind t...
Philip W. L. Fong, Mohd M. Anwar, Zhen Zhao
MOBIHOC
2001
ACM
14 years 9 months ago
A probabilistic analysis for the range assignment problem in ad hoc networks
In this paper we consider the following problem for ad hoc networks: assume that n nodes are distributed in a d-dimensional region, with 1d3, and assume that all the nodes have th...
Paolo Santi, Douglas M. Blough, Feodor S. Vainstei...
ACSC
2004
IEEE
14 years 1 months ago
Kerberos Assisted Authentication in Mobile Ad-hoc Networks
An ad-hoc network comprises mobile nodes that cooperate with each other using wireless connections to route both data and control packets within the network. As the low transmissi...
Asad Amir Pirzada, Chris McDonald