– The threat of DDoS attack are mainly directed at home and SOHO network that lacks the incentive, expertise, and financial means to defend themselves. This paper proposes an Aut...
In wireless ad hoc networks, all its nodes behave as routers and take part in its discovery and maintenance of routes to other nodes. Thus, the presence of selfish or malicious nod...
Abstract. Mix networks are a popular mechanism for anonymous Internet communications. By routing IP traffic through an overlay chain of mixes, they aim to hide the relationship bet...
—In unreliable and untrustworthy systems, information dissemination may suffer network failures and attacks from Byzantine nodes which are controlled by traitors or adversaries, ...
Kai Han, Guanhong Pei, Binoy Ravindran, E. Douglas...
— We present the design and evaluation of I4, a network infrastructure that enables information exchange and collaboration among different domains. I4 can help address problems, ...
F. Zhao, V. R. Vemuri, Shyhtsun Felix Wu, F. Xue, ...