Search Results
2. An Adversarial Evaluation of Network Signaling and Control Mechanisms
3. Traffic Analysis Against Low-Latency Anonymity Networks Using Available Bandwidth Estimation
4. A2M: Access-Assured Mobile Desktop Computing
5. Adding Trust to P2P Distribution of Paid Content
6. Deny-by-Default Distributed Security Policy Enforcement in Mobile Ad Hoc Networks
7. Evaluating a Collaborative Defense Architecture for MANETs
8. Approximating a Global Passive Adversary Against Tor
9. Casting Out Demons: Sanitizing Training Data for Anomaly Sensors
10. Distributed Firewall For MANETs
- « Previous
- Next »
- 1
- 2
- 3
- 4