Sciweavers

331 search results - page 13 / 67
» Cooperative Security for Network Coding File Distribution
Sort
View
SRDS
2007
IEEE
14 years 3 months ago
Activity Monitoring to Guarantee File Availability in Structured P2P File-sharing Systems
A cooperative structured peer-to-peer file-sharing system requires that the nodes participating in the system need to maintain the location mappings of other nodes. However, the s...
Guowei Huang, Zhi Chen, Qi Zhao, Gongyi Wu
VTC
2007
IEEE
100views Communications» more  VTC 2007»
14 years 3 months ago
Space-Time Trellis Coding Exploiting Superimposed Transmissions in Half-Duplex Relay Networks
— This work presents and analyzes a cooperative relaying approach which offers large scale spatial diversity and an additional coding advantage in a virtual antenna array. It uti...
Peter Rost, Gerhard Fettweis
CCS
2011
ACM
12 years 8 months ago
How to tell if your cloud files are vulnerable to drive crashes
This paper presents a new challenge—verifying that a remote server is storing a file in a fault-tolerant manner, i.e., such that it can survive hard-drive failures. We describe...
Kevin D. Bowers, Marten van Dijk, Ari Juels, Alina...
ESORICS
2000
Springer
14 years 9 days ago
Using Reflection as a Mechanism for Enforcing Security Policies in Mobile Code
Several authors have proposed using code modification as a technique for enforcing security policies such as resource limits, access controls, and network information flows. Howeve...
Ian Welch, Robert J. Stroud
RAID
2007
Springer
14 years 2 months ago
Vortex: Enabling Cooperative Selective Wormholing for Network Security Systems
We present a novel approach to remote traffic aggregation for Network Intrusion Detection Systems (NIDS) called Cooperative Selective Wormholing (CSW). Our approach works by select...
John R. Lange, Peter A. Dinda, Fabián E. Bu...