Sciweavers

277 search results - page 42 / 56
» Secure Aggregation in Large Scale Overlay Networks
Sort
View
EUROPKI
2004
Springer
14 years 1 months ago
Distributed CA-based PKI for Mobile Ad Hoc Networks Using Elliptic Curve Cryptography
The implementation of a standard PKI in a mobile ad hoc network (MANET) is not practical for several reasons: (1) lack of a fixed infrastructure; (2) a centralized certification au...
Charikleia Zouridaki, Brian L. Mark, Kris Gaj, Ros...
SAMOS
2005
Springer
14 years 1 months ago
Benchmarking Mesh and Hierarchical Bus Networks in System-on-Chip Context
The performance and area of a System-on-Chip depend on the utilized communication method. This paper presents simulation-based comparison of generic, synthesizable single bus, hie...
Erno Salminen, Tero Kangas, Jouni Riihimäki, ...
WETICE
2003
IEEE
14 years 1 months ago
Design and Implementation of Virtual Private Services
Large scale distributed applications such as electronic commerce and online marketplaces combine network access with multiple storage and computational elements. The distributed r...
Sotiris Ioannidis, Steven M. Bellovin, John Ioanni...
SIGCOMM
2005
ACM
14 years 2 months ago
Towards a global IP anycast service
IP anycast, with its innate ability to find nearby resources in a robust and efficient fashion, has long been considered an important means of service discovery. The growth of P2...
Hitesh Ballani, Paul Francis
ACSAC
2010
IEEE
13 years 5 months ago
Detecting spammers on social networks
Social networking has become a popular way for users to meet and interact online. Users spend a significant amount of time on popular social network platforms (such as Facebook, M...
Gianluca Stringhini, Christopher Kruegel, Giovanni...