skip to main content
Volume 2, Issue 1/2February 2010
Publisher:
  • Inderscience Publishers
  • World Trade Center Bldg, 29, route de Pre-Bois, Case Postale 896
  • Geneva 15
  • Switzerland
ISSN:1748-569X
EISSN:1748-5703
Reflects downloads up to 01 Nov 2024Bibliometrics
Skip Table Of Content Section
article
LH * RSP 2 P : a fast and high churn resistant scalable distributed data structure for P2P systems

LH*<SUB align=right>RS<SUP align=right>P2P</SUP> is a new scalable distributed data structure (SDDS) for P2P applications. It deals with two major issues in P2P systems. One is efficient location of the peers with searched data ...

article
A novel approach against the system buffer overflow

The system buffer overflow (SBO) is a universal problem in information security. In the traditional defence mechanisms, the SBO prevents shell code execution and neglect unsuccessful attack that makes system procedures terminate abnormally. In this ...

article
Forty years of movie hacking: considering the potential implications of the popular media representation of computer hackers from 1968 to 2008

Increasingly movies are being produced which feature plots that incorporate elements of computer security and hacking, and cumulatively these movies are creating a public perception as to the nature of computer security. This research examines movies ...

article
Malicious node detection system in wireless sensor networks: a decentralised approach

The large deployment of wireless sensor networks (WSNs) increases their exposure to intrusions on sensor nodes. One of the most challenging issues is how to detect compromised or malicious nodes. Our goal in this paper is to review different techniques ...

article
Security of internet-connected computer networks

The security of computer networks connected to the internet is an important, vital and hotly contested real-world issue. Once the computer networks get connected to the internet, the number of attacks, their strength and intensity grow exponentially. ...

article
A lightweight secure architecture for wireless sensor networks

The adoption and widespread deployment of wireless sensor networks means that security issues are of critical concern. To date, much research has focused on the usability of these networks in a variety of environments where conventional wired networks ...

article
Improving TCP performance over mobile ad hoc networks

The transmission control protocol (TCP) was designed to provide reliable end-to-end delivery of data over unreliable networks. Most TCP implementations have been carefully optimised to operate in wired networks. Deploying standard TCP in wireless mobile ...

article
Providing location privacy in pervasive computing through a hybrid mechanism

Advances in pervasive computing technology on the one hand, and the widespread use of mobile computing devices combined with improvements in embedded positioning capabilities on the other hand, testify the need for new mechanisms and applications to ...

article
Trust algorithms in P2P file sharing networks

Many peer to peer (P2P) networks are used to share different types of files between users who are usually anonymous. To prevent the distribution of files that have been intentionally damaged, filled with false content or infected with malware, users ...

Comments

Please enable JavaScript to view thecomments powered by Disqus.