Sciweavers

836 search results - page 93 / 168
» Privacy and Trust in Distributed Networks
Sort
View
WISE
2005
Springer
14 years 2 months ago
Peer-Sensitive ObjectRank - Valuing Contextual Information in Social Networks
Building on previous work on how to model contextual information for desktop search and how to implement semantically rich information exchange in social networks, we define a new...
Andrei Damian, Wolfgang Nejdl, Raluca Paiu
LCN
2008
IEEE
14 years 3 months ago
Key revocation based on Dirichlet multinomial model for mobile ad hoc networks
— The absence of an online trusted authority makes the issue of key revocation in mobile ad hoc networks (MANETs) particularly challenging. In this paper, we present a novel self...
Xinxin Fan, Guang Gong
ICPP
1999
IEEE
14 years 1 months ago
Mobile-Agents for Distributed Market Computing
This paper discusses the implementation using mobile agent and the performance of the market computing to allocate network quality of service most efficiently, based on users'...
Shinji Tanaka, Hirofumi Yamaki, Toru Ishida
ESORICS
2005
Springer
14 years 2 months ago
Sybil-Resistant DHT Routing
Distributed Hash Tables (DHTs) are very efficient distributed systems for routing, but at the same time vulnerable to disruptive nodes. Designers of such systems want them used in ...
George Danezis, Chris Lesniewski-Laas, M. Frans Ka...
ESAS
2007
Springer
14 years 3 months ago
Key Establishment in Heterogeneous Self-organized Networks
Traditional key pre-distribution schemes in sensor and ad hoc networks rely on the existence of a trusted third party to generate and distribute a key pool. The assumption of a sin...
Gelareh Taban, Reihaneh Safavi-Naini