Sciweavers

1807 search results - page 53 / 362
» Resilient Overlay Networks
Sort
View
ICDCSW
2005
IEEE
14 years 1 months ago
Increasing Attack Resiliency of Wireless Ad Hoc and Sensor Networks
An ad hoc or sensor network that is employed for security sensitive applications is expected to tolerate a certain quantity of maliciously behaving nodes. Algorithms must be desig...
Harald Vogt
ICPP
2008
IEEE
14 years 2 months ago
A Replication Overlay Assisted Resource Discovery Service for Federated Systems
Abstract—Federated systems have recently attracted much attention because they allow loosely coupled organizations to share resources for common benefits. However, discovering r...
Hao Yang, Fan Ye, Zhen Liu
ACNS
2007
Springer
91views Cryptology» more  ACNS 2007»
13 years 11 months ago
Efficient Content Authentication in Peer-to-Peer Networks
ed Abstract
Roberto Tamassia, Nikos Triandopoulos
INTR
2006
87views more  INTR 2006»
13 years 7 months ago
Agyaat: mutual anonymity over structured P2P networks
Purpose
Aameek Singh, Bugra Gedik, Ling Liu
IPTPS
2005
Springer
14 years 1 months ago
A Self-repairing Peer-to-Peer System Resilient to Dynamic Adversarial Churn
We present a dynamic distributed hash table where peers may join and leave at any time. Our system tolerates a powerful adversary which has complete visibility of the entire state ...
Fabian Kuhn, Stefan Schmid, Roger Wattenhofer