Sciweavers

1630 search results - page 43 / 326
» Secure Overlay Network Design
Sort
View
EUROMICRO
2006
IEEE
14 years 4 months ago
Authentication in Stealth Distributed Hash Tables
Most existing DHT algorithms assume that all nodes have equal capabilities. This assumption has previously been shown to be untrue in real deployments, where the heterogeneity of ...
Andrew MacQuire, Andrew Brampton, Idris A. Rai, Ni...
AINA
2010
IEEE
14 years 3 months ago
Design and Construction of a Prototype Secure Wireless Mesh Network Testbed
—Wireless Mesh Network (WMN) is a promising broadband wireless network architecture. Security is an important component of the WMN architecture but is not fully considered so far...
Donglai Sun, Yue Wu, Tian Wu, Yang Liu, Ning Liu, ...
WWW
2007
ACM
14 years 10 months ago
SRing: a structured non dht p2p overlay supporting string range queries
This paper presents SRing, a structured non DHT P2P overlay that efficiently supports exact and range queries on multiple attribute values. In SRing, all attribute values are inte...
Xiaoping Sun, Xue Chen
GCC
2006
Springer
14 years 1 months ago
Hierarchical Replica Location Service Based on Hybrid Overlay Platform
An important problem that confronts data grid applications is to efficiently locate the node that stores a particular data replica. This paper proposes a Hierarchical Replica Loca...
Jianjin Jiang, Guangwen Yang, Yongwei Wu, Wusheng ...
LCN
2005
IEEE
14 years 3 months ago
Secure Content Delivery using Key Composition
In this paper, we propose a novel framework for secure multicast on overlay networks. Our contributions are threefold: 1) a technique key composition is proposed to cope with the ...
Chun-Ying Huang, Yun-Peng Chiu, Kuan-Ta Chen, Hann...