Sciweavers

1737 search results - page 71 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
CORR
2010
Springer
218views Education» more  CORR 2010»
13 years 6 months ago
A Review of the Energy Efficient and Secure Multicast Routing Protocols for Mobile Ad hoc Networks
This paper presents a thorough survey of recent work addressing energy efficient multicast routing protocols and secure multicast routing protocols in Mobile Ad hoc Networks (MANE...
Busola S. Olagbegi, Natarajan Meghanathan
IJON
2002
185views more  IJON 2002»
13 years 8 months ago
An image retrieval system by impression words and specific object names - IRIS
Image content analysis has become an important issue in multimedia processing. Region-based image retrieval systems attempt to reduce the gap between high-level semantics and low-l...
Kazuhiro Kuroda, Masafumi Hagiwara
TRIDENTCOM
2010
IEEE
13 years 7 months ago
G-Lab Deep: Cross-Layer Composition and Security for a Flexible Future Internet
The Internet enables the way how global businesses and communities communicate today. In the last years, however, new demands have collided with old designs, resulting in a complex...
Carsten Schmoll, Christian Henke, Dirk Hoffstadt, ...
ISI
2003
Springer
14 years 2 months ago
Database Support for Exploring Criminal Networks
Understanding the data gathered thus far in a criminal investigation is of great importance, particularly in terms of guiding its future course. One established method of comprehen...
M. N. Smith, Peter J. H. King
PET
2005
Springer
14 years 2 months ago
An Analysis of Parallel Mixing with Attacker-Controlled Inputs
Parallel mixing [7] is a technique for optimizing the latency of a synchronous re-encryption mix network. We analyze the anonymity of this technique when an adversary can learn the...
Nikita Borisov