Nothing Special   »   [go: up one dir, main page]

skip to main content
Reflects downloads up to 28 Nov 2024Bibliometrics
Skip Table Of Content Section
research-article
A Policy Enforcing Mechanism for Trusted Ad Hoc Networks

To ensure fair and secure communication in Mobile Ad hoc Networks (MANETs), the applications running in these networks must be regulated by proper communication policies. However, enforcing policies in MANETs is challenging because they lack the ...

research-article
CASTLE: Continuously Anonymizing Data Streams

Most of the existing privacy-preserving techniques, such as k-anonymity methods, are designed for static data sets. As such, they cannot be applied to streaming data which are continuous, transient, and usually unbounded. Moreover, in streaming ...

research-article
Determining the Diagnosability of (1,2)-Matching Composition Networks and Its Applications

The classic problem of determining the diagnosability of a given network has been studied extensively. Under the PMC model, this paper addresses the problem of determining the diagnosability of a class of networks called (1,2)-Matching Composition ...

research-article
Low-Energy Symmetric Key Distribution in Wireless Sensor Networks

In this work, a scheme for key distribution and network access in a Wireless Sensor Network (WSN) that utilizes Identity-Based Cryptography (IBC) is presented. The scheme is analyzed on the ARM920T processor and measurements were taken for the runtime ...

research-article
Modeling and Detection of Camouflaging Worm

Active worms pose major security threats to the Internet. This is due to the ability of active worms to propagate in an automated fashion as they continuously compromise computers on the Internet. Active worms evolve during their propagation, and thus, ...

research-article
Recovery Device for Real-Time Dual-Redundant Computer Systems

This paper proposes the design of specialized hardware, called Recovery Device, for a dual-redundant computer system that operates in real-time. Recovery Device executes all fault-tolerant services including fault detection, fault type determination, ...

research-article
Reliability for Networked Storage Nodes

High-end enterprise storage has traditionally consisted of monolithic systems with customized hardware, multiple redundant components and paths, and no single point of failure. Distributed storage systems realized through networked storage nodes offer ...

research-article
Replica Placement for Route Diversity in Tree-Based Routing Distributed Hash Tables

Distributed hash tables (DHTs) share storage and routing responsibility among all nodes in a peer-to-peer network. These networks have bounded path length unlike unstructured networks. Unfortunately, nodes can deny access to keys or misroute lookups. We ...

research-article
Robust Correlation of Encrypted Attack Traffic through Stepping Stones by Flow Watermarking

Network-based intruders seldom attack their victims directly from their own computer. Often, they stage their attacks through intermediate “stepping stones” in order to conceal their identity and origin. To identify the source of the attack behind the ...

research-article
Securing Topology Maintenance Protocols for Sensor Networks

We analyze the security vulnerabilities of PEAS, ASCENT, and CCP, three well-known topology maintenance protocols (TMPs) for sensor networks. These protocols aim to increase the lifetime of the sensor network by only maintaining a subset of nodes in an ...

research-article
The F_f-Family of Protocols for RFID-Privacy and Authentication

In this paper, we present the design of the lightweight F_f family of privacy-preserving authentication protocols for RFID-systems. F_f results from a systematic design based on a new algebraic framework focusing on the security and privacy of RFID ...

Comments

Please enable JavaScript to view thecomments powered by Disqus.