Skip to main content

and
Your search also matched 11 preview-only Content is preview-only when you or your institution have not yet subscribed to it.

By making our abstracts and previews universally accessible we help you purchase only the content that is relevant to you.
results, e.g.

Improving byzantine fault tolerance based on stake evaluation and consistent hashing

Include preview-only content
  1. Chapter and Conference Paper

    Security-Enhanced Reprogramming with XORs Coding in Wireless Sensor Networks

    Reprogramming is an important function required by wireless sensor networks (WSNs). Due to the openness of WSNs, more and more researchers pay attention to the security aspect of reprogramming, but confidentia...

    Depeng Chen, Dao**g He, Sammy Chan in Information and Communications Security (2016)

  2. Chapter and Conference Paper

    Network Anomaly Detection Using Unsupervised Feature Selection and Density Peak Clustering

    Intrusion detection systems (IDSs) play a significant role to effectively defend our crucial computer systems or networks against attackers on the Internet. Anomaly detection is an effective way to detect intr...

    **ejun Ni, Dao**g He, Sammy Chan in Applied Cryptography and Network Security (2016)

  3. Chapter and Conference Paper

    Call Admission Control for 3G CDMA Networks with Differentiated QoS

    A call admission control (CAC) scheme for 3G wireless networks based on the estimated interference and differentiated quality of service (QoS) is proposed in this paper. In this CAC scheme, the interferences i...

    Qian Huang, Hui Min Chen, King Tim Ko in NETWORKING 2002: Networking Technologies, … (2002)