Sciweavers

1256 search results - page 26 / 252
» A Simple E-Voting Protocol
Sort
View
AIMS
2009
Springer
14 years 2 months ago
NETCONF Interoperability Testing
The IETF has developed a network configuration management protocol called NETCONF which was published as proposed standard in 2006. The NETCONF protocol provides mechanisms to in...
Ha Manh Tran, Iyad Tumar, Jürgen Schönw&...
WDAG
2004
Springer
122views Algorithms» more  WDAG 2004»
14 years 22 days ago
Active and Concurrent Topology Maintenance
A central problem for structured peer-to-peer networks is topology maintenance, that is, how to properly update neighbor variables when nodes join and leave the network, possibly c...
Xiaozhou Li, Jayadev Misra, C. Greg Plaxton
JSAC
2010
188views more  JSAC 2010»
13 years 2 months ago
Random-walk based approach to detect clone attacks in wireless sensor networks
Abstract--Wireless sensor networks (WSNs) deployed in hostile environments are vulnerable to clone attacks. In such attack, an adversary compromises a few nodes, replicates them, a...
Yingpei Zeng, Jiannong Cao, Shigeng Zhang, Shanqin...
TDP
2010
166views more  TDP 2010»
13 years 2 months ago
Communication-Efficient Privacy-Preserving Clustering
The ability to store vast quantities of data and the emergence of high speed networking have led to intense interest in distributed data mining. However, privacy concerns, as well ...
Geetha Jagannathan, Krishnan Pillaipakkamnatt, Reb...
HSNMC
2003
Springer
102views Multimedia» more  HSNMC 2003»
14 years 18 days ago
A RTT-based Partitioning Algorithm for a Multi-rate Reliable Multicast Protocol
Various Internet applications involve multiple parties and usually adopt a one-to-many communication paradigm (multicast). The presence of multiple receivers in a multicast session...
Moufida Maimour, CongDuc Pham