Sciweavers

412 search results - page 77 / 83
» Random Key Predistribution Schemes for Sensor Networks
Sort
View
ICC
2007
IEEE
14 years 1 months ago
Supporting VCR Functions in P2P VoD Services Using Ring-Assisted Overlays
—Peer-to-Peer (P2P) networks have been shown to be a promising approach to providing large-scale Video-on-Demand (VoD) services over the Internet for their potential scalability....
Bin Cheng, Hai Jin, Xiaofei Liao
CCS
2009
ACM
14 years 7 months ago
A generic construction of useful client puzzles
Denial of Service (DoS) attacks are serious threats for network societies. For dealing with DoS attacks, Jakobsson and Juels first proposed the notion of useful client puzzles (UC...
Rui Zhang 0002, Goichiro Hanaoka, Hideki Imai
PODC
2006
ACM
14 years 1 months ago
Computing separable functions via gossip
Motivated by applications to sensor, peer-to-peer, and adhoc networks, we study the problem of computing functions of values at the nodes in a network in a totally distributed man...
Damon Mosk-Aoyama, Devavrat Shah
NDSS
2003
IEEE
14 years 11 days ago
Proactive Two-Party Signatures for User Authentication
We study proactive two-party signature schemes in the context of user authentication. A proactive two-party signature scheme (P2SS) allows two parties—the client and the serverâ...
Antonio Nicolosi, Maxwell N. Krohn, Yevgeniy Dodis...
ICOIN
2007
Springer
14 years 1 months ago
Collision-Free Downlink Scheduling in the IEEE 802.15.4 Network
Abstract. IEEE 802.15.4 is the Low-Rate Wireless Personal Area Network (LR-WPAN) standard that is suitable for wireless sensor networks and wireless home networks among others. The...
Sangki Yun, Hyogon Kim