Sciweavers

675 search results - page 90 / 135
» Anonymous communication in overlay networks
Sort
View
ICOIN
2005
Springer
14 years 4 months ago
A Self-organized Authentication Architecture in Mobile Ad-Hoc Networks
Abstract. Network security is considered one of the obstacles that prevent the wide deployment of ad-hoc wireless networks. Among many security problems, authentication is the most...
Seongil Hahm, Yongjae Jung, Seunghee Yi, Yukyoung ...
COMCOM
2007
82views more  COMCOM 2007»
13 years 11 months ago
On application-level load balancing in FastReplica
— In the paper, we consider the problem of distributing large-size content to a fixed set of nodes. In contrast with the most existing end-system solutions to this problem, Fast...
Jangwon Lee, Gustavo de Veciana
GLOBECOM
2006
IEEE
14 years 5 months ago
Improving Voice and Data Service Provisioning in Cellular/WLAN Integrated Networks by Admission Control
— In this paper, we study the voice and data service provisioning in an integrated system of cellular and wireless local area networks (WLANs). To maximize the overall resource u...
Wei Song, Yu Cheng, Weihua Zhuang, Aladdin Saleh
GLOBECOM
2006
IEEE
14 years 5 months ago
Evaluation of Dynamic Query Abolishment Methods in Heterogeneous Networks
— We compare the performance of various dynamic query abolishment mechanisms in different unstructured overlay network topologies such as found in several P2P systems. We speci...
Elena Meshkova, Janne Riihijärvi, Petri M&aum...
MMMACNS
2005
Springer
14 years 4 months ago
A Passive External Web Surveillance Technique for Private Networks
The variety and richness of what users browse on the Internet has made the communications of web-browsing hosts an attractive target for surveillance. We show that passive external...
Constantine Daicos, Scott Knight