Sciweavers

548 search results - page 37 / 110
» Secure peer sampling
Sort
View
OTM
2007
Springer
14 years 4 months ago
A Novel Overlay Network for a Secure Global Home Agent Dynamic Discovery
Mobile IP and Network Mobility are the IETF proposals to obtain mobility. However, both of them have routing limitations, due to the presence of an entity (Home Agent) in the commu...
Ángel Cuevas, Rubén Cuevas Rum&iacut...
USM
2000
14 years 1 months ago
Trade-offs in a Secure Jini Service Architecture
Jini is an infrastructure built on top of the mobile code facilities of the Java programming language enabling clients and services to spontaneously engage in arbitrary usage scena...
Peer Hasselmeyer, Roger Kehr, Marco Voß
DEXAW
2006
IEEE
123views Database» more  DEXAW 2006»
14 years 1 months ago
Privacy, Security and Trust in P2P environments: A Perspective
The Peer-to-Peer (P2P) paradigm of computing has been growing dramatically in popularity over the last decade. Consequently, large amounts of data are being shared among P2P users...
Anirban Mondal, Masaru Kitsuregawa
WMCSA
2009
IEEE
14 years 4 months ago
We saw each other on the subway: secure, anonymous proximity-based missed connections
There is an inherent tension between the value provided by Location-Based Services (LBSs) and the location-privacy concerns they raise. Unfortunately, users are often forced to ei...
Justin Manweiler, Ryan Scudellari, Zachary Cancio,...
ECCC
1998
88views more  ECCC 1998»
13 years 9 months ago
Computational Indistinguishability: A Sample Hierarchy
We consider the existence of pairs of probability ensembles which may be efficiently distinguished from each other given k samples but cannot be efficiently distinguished given ...
Oded GoldreichMadhu Sudan