Sciweavers

548 search results - page 16 / 110
» Secure peer sampling
Sort
View
WWW
2004
ACM
14 years 10 months ago
Pride: peer-to-peer reputation infrastructure for decentralized environments
Peer-to-peer (P2P) networks use the fundamental assumption that the nodes in the network will cooperate and will not cheat. In the absence of any common goals shared by the nodes ...
Prashant Dewan, Partha Dasgupta
ACNS
2007
Springer
91views Cryptology» more  ACNS 2007»
14 years 1 months ago
Efficient Content Authentication in Peer-to-Peer Networks
ed Abstract
Roberto Tamassia, Nikos Triandopoulos
CCS
2006
ACM
14 years 1 months ago
Providing witness anonymity in peer-to-peer systems
In this paper, we introduce the concept of witness anonymity for peer-to-peer systems. Witness anonymity combines the seemingly conflicting requirements of anonymity (for honest p...
Bo Zhu, Sanjeev Setia, Sushil Jajodia
MICRO
2008
IEEE
103views Hardware» more  MICRO 2008»
14 years 4 months ago
Testudo: Heavyweight security analysis via statistical sampling
Heavyweight security analysis systems, such as taint analysis and dynamic type checking, are powerful technologies used to detect security vulnerabilities and software bugs. Tradi...
Joseph L. Greathouse, Ilya Wagner, David A. Ramos,...
DSN
2006
IEEE
14 years 3 months ago
Secure Split Assignment Trajectory Sampling: A Malicious Router Detection System
Routing infrastructure plays a vital role in the Internet, and attacks on routers can be damaging. Compromised routers can drop, modify, mis-forward or reorder valid packets. Exis...
Sihyung Lee, Tina Wong, Hyong S. Kim