Sciweavers

836 search results - page 103 / 168
» Privacy and Trust in Distributed Networks
Sort
View
CCS
2008
ACM
13 years 10 months ago
SEAR: a secure efficient ad hoc on demand routing protocol for wireless networks
Multi-hop routing is essential to the operation of wireless ad hoc networks. Unfortunately, it is very easy for an adversary to forge or modify routing messages to inflict severe ...
Qing Li, Yih-Chun Hu, Meiyuan Zhao, Adrian Perrig,...
OSDI
2002
ACM
14 years 9 months ago
Ivy: A Read/Write Peer-to-Peer File System
Ivy is a multi-user read/write peer-to-peer file system. Ivy has no centralized or dedicated components, and it provides useful integrity properties without requiring users to ful...
Athicha Muthitacharoen, Robert Morris, Thomer M. G...
ICDCS
2005
IEEE
14 years 2 months ago
Virtual Leashing: Internet-Based Software Piracy Protection
Software-splitting is a technique for protecting software from piracy by removing code fragments from an application and placing them on a remote trusted server. The server provid...
Ori Dvir, Maurice Herlihy, Nir Shavit
CSFW
2009
IEEE
14 years 3 months ago
Modeling and Verifying Physical Properties of Security Protocols for Wireless Networks
We present a formal model for modeling and reasoning about security protocols. Our model extends standard, inductive, trace-based, symbolic approaches with a formalization of phys...
Patrick Schaller, Benedikt Schmidt, David A. Basin...
SERSCISA
2009
Springer
14 years 3 months ago
A Kademlia-Based Node Lookup System for Anonymization Networks
Node lookup mechanisms constitute an integral part of any overlay network, and hence also of anonymous communication networks. Today, most anonymizers use centralized directories, ...
Benedikt Westermann, Andriy Panchenko, Lexi Pimeni...