Sciweavers

828 search results - page 51 / 166
» A Network Coding Approach to Secret Key Distribution
Sort
View
MINENET
2006
ACM
15 years 8 months ago
SC2D: an alternative to trace anonymization
Progress in networking research depends crucially on applying novel analysis tools to real-world traces of network activity. This often conflicts with privacy and security requir...
Jeffrey C. Mogul, Martin F. Arlitt
119
Voted
NETWORKING
2004
15 years 4 months ago
Distributed Algorithm for Service Replication in Service Overlay Network
The service overlay network (SON) is an effective mean to deploy end-to-end QoS guaranteed content delivery services on the current Internet. We model the content delivery service ...
Kevin Y. K. Liu, John C. S. Lui, Zhi-Li Zhang
CORR
2007
Springer
189views Education» more  CORR 2007»
15 years 2 months ago
Diversity-Multiplexing Tradeoff of Asynchronous Cooperative Diversity in Wireless Networks
Synchronization of relay nodes is an important and critical issue in exploiting cooperative diversity in wireless networks. In this paper, two asynchronous cooperative diversity s...
Shuangqing Wei
CDC
2009
IEEE
135views Control Systems» more  CDC 2009»
15 years 7 months ago
Trust Estimation in autonomic networks: a statistical mechanics approach
— Trust management, broadly intended as the ability to maintain belief relationship among entities, is recognized as a fundamental security challenge for autonomous and selforgan...
Stefano Ermon, Luca Schenato, Sandro Zampieri
129
Voted
ICDCS
2006
IEEE
15 years 8 months ago
A DoS Resilient Flow-level Intrusion Detection Approach for High-speed Networks
Global-scale attacks like viruses and worms are increasing in frequency, severity and sophistication, making it critical to detect outbursts at routers/gateways instead of end hos...
Yan Gao, Zhichun Li, Yan Chen