×

Found 59 Documents (Results 1–59)

Communications and networking. 11th EAI international conference, ChinaCom 2016, Chongqing, China, September 24–26, 2016. Proceedings. Part I. (English) Zbl 1375.94010

Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 209. Cham: Springer (ISBN 978-3-319-66624-2/pbk; 978-3-319-66625-9/ebook). xxii, 516 p. (2018).
MSC:  94-06 94A05 00B25
PDFBibTeX XMLCite
Full Text: DOI

Resilience of routing in parallel link networks. (English) Zbl 1453.91028

Zhu, Quanyan (ed.) et al., Decision and game theory for security. 7th international conference, GameSec 2016, New York, NY, USA, November 2–4, 2016. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 9996, 3-17 (2016).
PDFBibTeX XMLCite
Full Text: DOI HAL

The implication problem of computing policies. (English) Zbl 1428.68088

Pelc, Andrzej (ed.) et al., Stabilization, safety, and security of distributed systems. 17th international symposium, SSS 2015, Edmonton, AB, Canada, August 18–21, 2015. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 9212, 109-123 (2015).
MSC:  68M25 68Q25
PDFBibTeX XMLCite
Full Text: DOI

Brief announcement: Network-destabilizing attacks. (English) Zbl 1301.68044

Proceedings of the 2012 ACM symposium on principles of distributed computing, PODC ’12, Funchal, Portugal, July 16–18, 2012. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-1450-3). 331-332 (2012).
PDFBibTeX XMLCite
Full Text: DOI

Deceptive routing in relay networks. (English) Zbl 1377.68018

Grossklags, Jens (ed.) et al., Decision and game theory for security. Third international conference, GameSec 2012, Budapest, Hungary, November 5–6, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-34265-3/pbk). Lecture Notes in Computer Science 7638, 171-185 (2012).
MSC:  68M10 91A80 94A62
PDFBibTeX XMLCite
Full Text: DOI

Preventing the cluster formation attack against the hierarchical OLSR protocol. (English) Zbl 1303.68049

Garcia-Alfaro, Joaquin (ed.) et al., Foundations and practice of security. 4th Canada-France MITACS workshop, FPS 2011, Paris, France, May 12–13, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-27900-3/pbk). Lecture Notes in Computer Science 6888, 118-131 (2012).
MSC:  68P25 68M12 94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Design of a reliability-based source routing protocol for wireless mobile ad hoc networks. (English) Zbl 1207.68056

Meghanathan, Natarajan (ed.) et al., Recent trends in network security and applications. Third international conference, CNSA 2010, Chennai, India, July 23–25, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-14477-6/pbk; 978-3-642-14478-3/ebook). Communications in Computer and Information Science 89, 463-472 (2010).
MSC:  68M10 68M12
PDFBibTeX XMLCite
Full Text: DOI

Secure collection tree protocol for tamper-resistant wireless sensors. (English) Zbl 1200.68037

Ślęzak, D. (ed.) et al., Security technology. International conference, SecTech 2009, held as part of the future generation information technology conference, FGIT 2009, Jeju Island, Korea, December 10–12, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-10846-4/pbk; 978-3-642-10847-1/ebook). Communications in Computer and Information Science 58, 217-224 (2010).
MSC:  68M10 68P25
PDFBibTeX XMLCite
Full Text: DOI

A novel architecture for secure and scalable multicast over IP network. (English) Zbl 1184.68081

Chen, Yan (ed.) et al., Security and privacy in communication networks. 5th international ICST conference, SecureComm 2009, Athens, Greece, September 14–18, 2009. Revised selected papers. Berlin: Springer (ISBN 978-3-642-05283-5/pbk; 978-3-642-05284-2/ebook). Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering 19, 417-436 (2009).
MSC:  68M11 68M12
PDFBibTeX XMLCite
Full Text: DOI

A model of onion routing with provable anonymity. (English) Zbl 1195.68023

Dietrich, Sven (ed.) et al., Financial cryptography and data security. 11th international conference, FC 2007, and 1st international workshop on usable security, USEC 2007, Scarborough, Trinidad and Tobago, February 12–16, 2007. Revised selected papers. Berlin: Springer (ISBN 978-3-540-77365-8/pbk). Lecture Notes in Computer Science 4886, 57-71 (2008).
MSC:  68M12 68Q45 94A62
PDFBibTeX XMLCite
Full Text: DOI

Truth in advertising, lightweight verification of route integrity. (English) Zbl 1283.68060

Proceedings of the 26th annual ACM symposium on principles of distributed computing, PODC ’07, Portland, OR, USA, August 12–15, 2007. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-59593-616-5). 147-156 (2007).
MSC:  68M10 68M11 94A60
PDFBibTeX XMLCite
Full Text: DOI

Securing the destination-sequenced distance vector routing protocol (S-DSDV). (English) Zbl 1109.68488

Lopez, Javier (ed.) et al., Information and communications security. 6th international conference, ICICS 2004, Malaga, Spain, October 27–29, 2004. Proceedings. Berlin: Springer (ISBN 3-540-23563-9/pbk). Lecture Notes in Computer Science 3269, 358-374 (2004).
MSC:  68P25 68M12
PDFBibTeX XMLCite
Full Text: DOI

S-RIP: A secure distance vector routing protocol. (English) Zbl 1103.68540

Jakobsson, Markus (ed.) et al., Applied cryptography and network security. Second international conference, ACNS 2004, Yellow Mountain, China, June 8–11, 2004. Proceedings. Berlin: Springer (ISBN 3-540-22217-0/pbk). Lecture Notes in Computer Science 3089, 103-119 (2004).
MSC:  68P25 94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

IPv6 - the new protocol of Internet. Technology, application, migration. 2., aktualis. u. erweit. Aufl. (IPv6 - das neue Internetprotokoll. Technik, Anwendung, Migration.) (German) Zbl 1001.68008

Heidelberg: dpunkt.verlag. 270 S. (2002).
MSC:  68M12 68-01 68M10
PDFBibTeX XMLCite

Filter Results by …

Document Type

all top 5

Author

all top 5

Year of Publication

all top 3

Main Field