Sciweavers

447 search results - page 23 / 90
» Mobile Secret Key Distribution with Network Coding
Sort
View
CN
2006
70views more  CN 2006»
13 years 7 months ago
Distribution of path durations in mobile ad-hoc networks - Palm's Theorem to the rescue
We first study the distribution of path duration in multi-hop wireless networks. We show that as the number of hops along a path increases, the path duration distribution can be a...
Yijie Han, Richard J. La, Armand M. Makowski, Seun...
P2P
2006
IEEE
101views Communications» more  P2P 2006»
14 years 1 months ago
Towards Scalable Mobility in Distributed Hash Tables
For the use in the Internet domain, distributed hash tables (DHTs) have proven to be an efficient and scalable approach to distributed content storage and access. In this paper, ...
Olaf Landsiedel, Stefan Götz, Klaus Wehrle
ICDCS
2007
IEEE
14 years 1 months ago
Secure Event Dissemination in Publish-Subscribe Networks
Abstract. Content-based publish-subscribe (pub-sub) systems are an emerging paradigm for building large-scale information delivery systems. Secure event dissemination in a pub-sub ...
Mudhakar Srivatsa, Ling Liu
ACNS
2003
Springer
168views Cryptology» more  ACNS 2003»
14 years 23 days ago
PLI: A New Framework to Protect Digital Content for P2P Networks
In this paper, we first propose a novel Public License Infrastructure (PLI) that uses cryptographic threshold secret sharing schemes to provide decentralized public license service...
Guofei Gu, Bin B. Zhu, Shipeng Li, Shiyong Zhang
ICPADS
2002
IEEE
14 years 14 days ago
Performance Evaluation of Distributed Computing Paradigms in Mobile Ad Hoc Sensor Networks
The emergence of mobile ad hoc sensor networks has brought new challenges to traditional network design. This paper focuses on the study at the application layer. In specific, it...
Yingyue Xu, Hairong Qi