enter search term and/or author name
A survey on peer-to-peer key management for mobile ad hoc networks
Johann Van Der Merwe, Dawoud Dawoud, Stephen McDonald
Article No.: 1
The article reviews the most popular peer-to-peer key management protocols for mobile ad hoc networks (MANETs). The protocols are subdivided into groups based on their design strategy or main characteristic. The article discusses and provides...
Full-text indexes provide fast substring search over large text collections. A serious problem of these indexes has traditionally been their space consumption. A recent trend is to develop indexes that exploit the compressibility of the text, so...
Survey of network-based defense mechanisms countering the DoS and DDoS problems
Tao Peng, Christopher Leckie, Kotagiri Ramamohanarao
Article No.: 3
This article presents a survey of denial of service attacks and the methods that have been proposed for defense against these attacks. In this survey, we analyze the design decisions in the Internet that have created the potential for denial of...