×
+ All Categories
Log in
English
Français
Español
Deutsch
The top documents tagged [malicious node]
Home >
malicious node
Mitigating Routing Misbehavior in Mobile Ad Hoc Networks By Sergio Marti, T.J. Giuli, Kevin Lai, & Mary Baker Department of Computer Science Stanford University.
212 views
V AMPIRE A TTACKS : D RAINING LIFE FROM WIRELESS AD - HOC SENSOR NETWORKS Guided By: Presented By: Prof. R.R Welekar Rashmi Jangre.
216 views
Transmission Time-based Mechanism to Detect Wormhole in Ad-hoc Networks Tran Van Phuong U-Security Group RTMM Lab, Kyung Hee Uni, Korea 2006.11.10.
214 views
Trust Establishment in Pervasive Grid Environments Syed Naqvi, Michel Riguidel TÉLÉCOM PARIS ÉNST É cole N ationale S upérieur des T élécommunications.
212 views
CS 265 PROJECT Secure Routing in Wireless Sensor Networks : Directed Diffusion a study Ajay Kalambur.
218 views
Anonymous Communication Luis von Ahn Andrew Bortz Nick Hopper The Aladdin Center Carnegie Mellon University.
213 views
15-849E Wireless Networking Discussion Lead Sai Vinayak George Nychis.
218 views
Hashing it Out in Public Common Failure Modes of DHT-based Anonymity Schemes Andrew Tran, Nicholas Hopper, Yongdae Kim Presenter: Josh Colvin, Fall 2011.
216 views
Security of Routing Protocols in Ad Hoc Wireless Networks presented by Reza Curtmola 600.647 – Advanced Topics in Wireless Networks.
215 views
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks
48 views
CS 265 PROJECT
30 views
How Secure are Secure Inter- Domain Routing Protocols? SIGCOMM 2010 Presenter: kcir.
217 views
< Previous
Next >