Sciweavers

764 search results - page 86 / 153
» Reputable Mix Networks
Sort
View
JSAC
2010
142views more  JSAC 2010»
13 years 2 months ago
Handling inelastic traffic in wireless sensor networks
The capabilities of sensor networking devices are increasing at a rapid pace. It is therefore not impractical to assume that future sensing operations will involve real time (inela...
Jiong Jin, Avinash Sridharan, Bhaskar Krishnamacha...
WINE
2005
Springer
179views Economy» more  WINE 2005»
14 years 1 months ago
A Graph-Theoretic Network Security Game
Consider a network vulnerable to viral infection. The system security software can guarantee safety only to a limited part of the network. Such limitations result from economy cos...
Marios Mavronicolas, Vicky G. Papadopoulou, Anna P...
SP
2008
IEEE
285views Security Privacy» more  SP 2008»
14 years 2 months ago
SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks
Decentralized distributed systems such as peer-to-peer systems are particularly vulnerable to sybil attacks, where a malicious user pretends to have multiple identities (called sy...
Haifeng Yu, Phillip B. Gibbons, Michael Kaminsky, ...
ISAAC
2005
Springer
153views Algorithms» more  ISAAC 2005»
14 years 1 months ago
Network Game with Attacker and Protector Entities
Consider an information network with harmful procedures called attackers (e.g., viruses); each attacker uses a probability distribution to choose a node of the network to damage. O...
Marios Mavronicolas, Vicky G. Papadopoulou, Anna P...
INFOCOM
2009
IEEE
14 years 2 months ago
Considerations for Sizing Buffers in Optical Packet Switched Networks
— Optical packet switches of the foreseeable future are expected to have severely limited buffering capability, since storage of optical signals remains a difficult and expensiv...
Arun Vishwanath, Vijay Sivaraman, George N. Rouska...