Sciweavers

836 search results - page 93 / 168
» Privacy and Trust in Distributed Networks
Sort
View
110
Voted
WISE
2005
Springer
15 years 9 months ago
Peer-Sensitive ObjectRank - Valuing Contextual Information in Social Networks
Building on previous work on how to model contextual information for desktop search and how to implement semantically rich information exchange in social networks, we define a new...
Andrei Damian, Wolfgang Nejdl, Raluca Paiu
133
Voted
LCN
2008
IEEE
15 years 10 months ago
Key revocation based on Dirichlet multinomial model for mobile ad hoc networks
— The absence of an online trusted authority makes the issue of key revocation in mobile ad hoc networks (MANETs) particularly challenging. In this paper, we present a novel self...
Xinxin Fan, Guang Gong
118
Voted
ICPP
1999
IEEE
15 years 8 months ago
Mobile-Agents for Distributed Market Computing
This paper discusses the implementation using mobile agent and the performance of the market computing to allocate network quality of service most efficiently, based on users'...
Shinji Tanaka, Hirofumi Yamaki, Toru Ishida
114
Voted
ESORICS
2005
Springer
15 years 9 months ago
Sybil-Resistant DHT Routing
Distributed Hash Tables (DHTs) are very efficient distributed systems for routing, but at the same time vulnerable to disruptive nodes. Designers of such systems want them used in ...
George Danezis, Chris Lesniewski-Laas, M. Frans Ka...
158
Voted
ESAS
2007
Springer
15 years 10 months ago
Key Establishment in Heterogeneous Self-organized Networks
Traditional key pre-distribution schemes in sensor and ad hoc networks rely on the existence of a trusted third party to generate and distribute a key pool. The assumption of a sin...
Gelareh Taban, Reihaneh Safavi-Naini