Sciweavers

1630 search results - page 45 / 326
» Secure Overlay Network Design
Sort
View
SASN
2003
ACM
14 years 4 months ago
A security design for a general purpose, self-organizing, multihop ad hoc wireless network
We present a security design for a general purpose, selforganizing, multihop ad hoc wireless network, based on the IEEE 802.15.4 low-rate wireless personal area network standard. ...
Thomas S. Messerges, Johnas Cukier, Tom A. M. Keve...
CCS
2010
ACM
13 years 11 months ago
Secure latency estimation with treeple
A network latency estimation scheme associates a "position" to every peer in a distributed network such that the latency between any two nodes can be accurately estimate...
Eric Chan-Tin, Nicholas Hopper
GRID
2006
Springer
13 years 11 months ago
Design and Implementation of a Distributed Content-based Notification Broker for WS-Notification
Abstract-- We describe an implementation based on the WSNotification (WSN) specification for Publish/Subscribe communication which provides a distributed, content-based notificatio...
Andres Quiroz, Manish Parashar
SIGCOMM
2006
ACM
14 years 5 months ago
Enabling contribution awareness in an overlay broadcasting system
We consider the design of bandwidth-demanding broadcasting applications using overlays in environments characterized by hosts with limited and asymmetric bandwidth, and significa...
Yu-Wei Eric Sung, Michael A. Bishop, Sanjay G. Rao
ICOIN
2005
Springer
14 years 4 months ago
A Self-organized Authentication Architecture in Mobile Ad-Hoc Networks
Abstract. Network security is considered one of the obstacles that prevent the wide deployment of ad-hoc wireless networks. Among many security problems, authentication is the most...
Seongil Hahm, Yongjae Jung, Seunghee Yi, Yukyoung ...