Sciweavers

222 search results - page 29 / 45
» Equilibria for Networks with Malicious Users
Sort
View
AINA
2009
IEEE
14 years 3 months ago
Enabling Fast Bootstrap of Reputation in P2P Mobile Networks
The easy deployment of P2P self-organized systems has contributed to their wide diffusion and to the definition of a new communication paradigm. Mobile communities can now sponta...
Roberto G. Cascella
ICC
2008
IEEE
164views Communications» more  ICC 2008»
14 years 2 months ago
Detection of Encrypted Tunnels Across Network Boundaries
— The use of covert application-layer tunnels to bypass security gateways has become quite popular in recent years. By encapsulating blocked or controlled protocols such as peert...
Maurizio Dusi, Manuel Crotti, Francesco Gringoli, ...
ICPADS
2008
IEEE
14 years 2 months ago
Delaunay State Management for Large-Scale Networked Virtual Environments
Peer-to-Peer (P2P) networks have been proposed as a promising approach to create more scalable Networked Virtual Environment (NVE) systems, but P2P-NVE also increases the probabil...
Chien-Hao Chien, Shun-Yun Hu, Jehn-Ruey Jiang
DSN
2007
IEEE
14 years 11 days ago
Portable and Efficient Continuous Data Protection for Network File Servers
Continuous data protection, which logs every update to a file system, is an enabling technology to protect file systems against malicious attacks and/or user mistakes, because it ...
Ningning Zhu, Tzi-cker Chiueh
FPL
2001
Springer
92views Hardware» more  FPL 2001»
14 years 28 days ago
Secure Configuration of Field Programmable Gate Arrays
Although SRAM programmed Field Programmable Gate Arrays (FPGA's) have come to dominate the industry due to their density and performance advantages over non-volatile technolog...
Tom Kean