Sciweavers

167 search results - page 21 / 34
» A Game-Theoretic Approach to Anonymous Networking
Sort
View
PERCOM
2006
ACM
14 years 7 months ago
Context-Aware Resource Management in Multi-Inhabitant Smart Homes: A Nash H-Learning based Approach
A smart home aims at building intelligence automation with a goal to provide its inhabitants with maximum possible comfort, minimize the resource consumption and thus overall cost...
Nirmalya Roy, Abhishek Roy, Sajal K. Das
LISA
2000
13 years 8 months ago
Tracing Anonymous Packets to Their Approximate Source
Most denial-of-service attacks are characterized by a flood of packets with random, apparently valid source addresses. These addresses are spoofed, created by a malicious program ...
Hal Burch, Bill Cheswick
CCS
2009
ACM
13 years 11 months ago
The bayesian traffic analysis of mix networks
This work casts the traffic analysis of anonymity systems, and in particular mix networks, in the context of Bayesian inference. A generative probabilistic model of mix network ar...
Carmela Troncoso, George Danezis
PET
2009
Springer
14 years 2 months ago
Scalable Link-Based Relay Selection for Anonymous Routing
The performance of an anonymous path can be described using many network metrics – e.g., bandwidth, latency, jitter, loss, etc. However, existing relay selection algorithms have ...
Micah Sherr, Matt Blaze, Boon Thau Loo
JASIS
2006
108views more  JASIS 2006»
13 years 7 months ago
Fuzzy techniques for trust and reputation management in anonymous peer-to-peer systems
P2P applications are rapidly gaining acceptance among users of Internet-based services, especially because of their capability of exchanging resources while preserving the anonymi...
Roberto Aringhieri, Ernesto Damiani, Sabrina De Ca...