Sciweavers

219 search results - page 39 / 44
» Byzantine Quorum Systems
Sort
View
PPNA
2011
13 years 4 months ago
Security and privacy issues in P2P streaming systems: A survey
Streaming applications over Peer-To-Peer (P2P) systems have gained an enormous popularity. Success always implies increased concerns about security, protection, privacy and all the...
Gabriela Gheorghe, Renato Lo Cigno, Alberto Montre...
ICDCS
2007
IEEE
14 years 4 months ago
An Asymmetric Quorum-based Power Saving Protocol for Clustered Ad Hoc Networks
Clustering in Mobile Ad Hoc Networks (MANETs) has shown to be a promising technique to ensure the scalability and efficiency of various communication protocols. Since stations in...
Shan-Hung Wu, Chung-Min Chen, Ming-Syan Chen
SACMAT
2003
ACM
14 years 3 months ago
Cooperative role-based administration
In large organizations the administration of access privileges (such as the assignment of an access right to a user in a particular role) is handled cooperatively through distribu...
Horst Wedde, Mario Lischka
JSAC
2011
253views more  JSAC 2011»
13 years 4 months ago
Control Channel Establishment in Cognitive Radio Networks using Channel Hopping
Abstract—In decentralized cognitive radio (CR) networks, enabling the radios to establish a control channel (i.e., “rendezvous” to establish a link) is a challenging problem....
Kaigui Bian, Jung Min Park, Ruiliang Chen
ACSAC
2007
IEEE
14 years 4 months ago
Countering False Accusations and Collusion in the Detection of In-Band Wormholes
Cooperative intrusion detection techniques for MANETs utilize ordinary computing hosts as network intrusion sensors. If compromised, these hosts may inject bogus data into the int...
Daniel Sterne, Geoffrey Lawler, Richard Gopaul, Br...