Zobrazeno 1 - 10
of 26
pro vyhledávání: '"Gordon B. Agnew"'
Publikováno v:
International Journal of Distributed Sensor Networks, Vol 2, Iss 1, Pp 23-54 (2006)
Externí odkaz:
https://doaj.org/article/b50929b676054852b8e2d184542ef392
Publikováno v:
International Journal of Distributed Sensor Networks, Vol 2, Iss 2, Pp 121-145 (2006)
Externí odkaz:
https://doaj.org/article/d3b3737e73f2408087b79e4930dc21ee
Autor:
Saad Saleh Alaboodi, Gordon B. Agnew
Publikováno v:
International Journal of Intelligent Computing Research. 4:301-310
Demands for better design and analysis of access controls require system-level evaluation models that can facilitate a quantitative and consistent study of operational capabilities and economics of access control implementations. Previous works on ac
Publikováno v:
IEEE/ACM Transactions on Networking. 15:1478-1489
Table-driven routing algorithms in flat networks have the scalability problem due to the need for global topology updates. To reduce update cost, networks are hierarchically organized. Clustering algorithms organize flat networks into hierarchical ne
Publikováno v:
IEEE Transactions on Parallel and Distributed Systems. 18:1462-1475
In many applications of sensor networks, the sink needs to keep track of the history of sensed data of a monitored region for scientific analysis or supporting historical queries. We call these historical data a time series of value distributions or
Publikováno v:
International Journal of Distributed Sensor Networks, Vol 2, Iss 2, Pp 121-145 (2006)
Energy conservation is an important design consideration for battery powered wireless sensor networks (WSNET). Energy constraint in WSNETs limits the total amount of sensed data (data capacity) received by sinks. In the commonly used static model of
Autor:
A. Sivanandan, Gordon B. Agnew
Publikováno v:
International Journal on Digital Libraries. 3:297-301
The move to publish documents electronically has several significant advantages to publishers and to consumers. These include the elimination of printing costs, paper costs, warehousing and transport of material, and the lag between release and deliv
Autor:
Gordon B. Agnew, Seyed Ali Ahmadzadeh
Publikováno v:
INFOCOM
Inspired by the challenges of designing a robust, and undetectable covert channel, in this paper we introduce a design methodology for timing covert channels that achieve provable polynomial-time undetectability. This means that the covert channel ca
Autor:
Gordon B. Agnew, Seyed Ali Ahmadzadeh
Publikováno v:
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering ISBN: 9783642319082
SecureComm
SecureComm
In this paper, the use of structural behavior of communication protocols (e.g., CSMA) in designing new covert channels is investigated. In this way, the covert transmitter adopts the communication protocol architecture to control its overt traffic fl
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::c7c9f2f38d870fdae0c4e1f95767cec8
https://doi.org/10.1007/978-3-642-31909-9_8
https://doi.org/10.1007/978-3-642-31909-9_8
Autor:
Seyed Ali Ahmadzadeh, Gordon B. Agnew
Publikováno v:
ACM Conference on Computer and Communications Security
In this work, we investigate the application of geometric representation of hash vectors of the information packets in multicast authentication protocols. To this end, a new authentication approach based on geometric properties of hash vectors in an