Sciweavers

MADNES
2005
Springer
14 years 2 months ago
Detecting Impersonation Attacks in Future Wireless and Mobile Networks
Impersonation attacks in wireless and mobile networks by professional criminal groups are becoming more sophisticated. We confirm with simple risk analysis that impersonation atta...
Michel Barbeau, Jeyanthi Hall, Evangelos Kranakis
MADNES
2005
Springer
14 years 2 months ago
Distributed Data Mining Protocols for Privacy: A Review of Some Recent Results
With the rapid advance of the Internet, a large amount of sensitive data is collected, stored, and processed by different parties. Data mining is a powerful tool that can extract ...
Rebecca N. Wright, Zhiqiang Yang, Sheng Zhong
MADNES
2005
Springer
14 years 2 months ago
An XML Standards Based Authorization Framework for Mobile Agents
An outstanding security problem in mobile agent systems is resource access control, or authorization in its broader sense. In this paper we present an authorization framework for m...
Guillermo Navarro, Joan Borrell
MADNES
2005
Springer
14 years 2 months ago
ARMS: An Authenticated Routing Message in Sensor Networks
In wireless sensor networks, a sensor node broadcasts its data (such as routing information, beacon messages or meta-data) to all its neighbors, which is called local broadcast. A ...
Suk-Bok Lee, Yoon-Hwa Choi
MADNES
2005
Springer
14 years 2 months ago
Panel: Authentication in Constrained Environments
Abstract. This paper contains the summary of a panel on authentication in constrained environments held during the Secure MADNES’05 Workshop. These were transcribed from hand-wri...
Mike Burmester, Virgil D. Gligor, Evangelos Kranak...
IWQOS
2005
Springer
14 years 2 months ago
Edge-Based Differentiated Services
Henrik Lundqvist, Ignacio Más Ivars, Gunnar...
IWQOS
2005
Springer
14 years 2 months ago
Privacy and Reliability by Dispersive Routing
— The traditional single (shortest) path routing paradigm leaves sessions vulnerable to a variety of security threats, especially eavesdropping. We propose to overcome this via d...
Haim Zlatokrilov, Hanoch Levy
IWQOS
2005
Springer
14 years 2 months ago
Overlay Networks with Linear Capacity Constraints
Abstract. Previous work have assumed an independent model for overlay networks: a graph with independent link capacities. We introduce a model of overlays (LCC-overlay) which incor...
Ying Zhu, Baochun Li
IWQOS
2005
Springer
14 years 2 months ago
Analysis of Stochastic Service Guarantees in Communication Networks: A Server Model
Many communication networks such as wireless networks only provide stochastic service guarantees. For analyzing stochastic service guarantees, research efforts have been made in ...
Yuming Jiang, Peder J. Emstad