Posts
Publishing Search Logs – A Comparative Study Of Privac...
Publishing Search Logs – A Comparative Study Of Privacy Guarantees
Query Planning for Continuous Aggregation Queries over ...
Query Planning for Continuous Aggregation Queries over a Network of Data Aggrega...
ROAD: A New Spatial Object Search Framework for Road Ne...
ROAD: A New Spatial Object Search Framework for Road Networks
Tree-Based Mining for Discovering Patterns of Human Int...
Tree-Based Mining for Discovering Patterns of Human Interaction in Meetings
Bounding the Impact of Unbounded Attacks in Stabilization
Bounding the Impact of Unbounded Attacks in Stabilization
Catching Packet Droppers and Modifiers in Wireless Sens...
Catching Packet Droppers and Modifiers in Wireless Sensor Networks
The Three-Tier Security Scheme in Wireless Sensor Netw...
The Three-Tier Security Scheme in Wireless Sensor Networks with Mobile Sinks
Optimal Source-Based Filtering of Malicious Traffic
Optimal Source-Based Filtering of Malicious Traffic
Topology Control In Mobile Ad Hoc Networks With Coopera...
Topology Control In Mobile Ad Hoc Networks With Cooperative Communications
A Secure Intrusion detection system against DDOS attack...
A Secure Intrusion detection system against DDOS attack in Wireless Mobile Ad-ho...
Design and Implementation of TARF: A Trust-Aware Routin...
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs
On the Security and Efficiency of Content Distribution ...
On the Security and Efficiency of Content Distribution via Network Coding
SPOC: A Secure and Privacy-preserving Opportunistic Com...
SPOC: A Secure and Privacy-preserving Opportunistic Computing Framework for Mobi...