Sciweavers

11603 search results - page 2183 / 2321
» Securing Embedded Systems
Sort
View
ICCCN
2007
IEEE
15 years 9 months ago
SCUBE: A DoS-Resistant Distributed Search Protocol
– Many P2P-based storage systems use distributed indexing service for searching documents. There are two security issues when the nodes providing the index service are compromise...
Souvik Ray, Zhao Zhang
126
Voted
INFOCOM
2007
IEEE
15 years 9 months ago
An Open and Scalable Emulation Infrastructure for Large-Scale Real-Time Network Simulations
— We present a software infrastructure that embeds physical hosts in a simulated network. Aiming to create a largescale real-time virtual network testbed, our real-time interacti...
Jason Liu, Scott Mann, Nathanael Van Vorst, Keith ...
INFOCOM
2007
IEEE
15 years 9 months ago
A Proxy View of Quality of Domain Name Service
— The Domain Name System (DNS) provides a critical service for the Internet – mapping of user-friendly domain names to their respective IP addresses. Yet, there is no standard ...
Lihua Yuan, Krishna Kant, Prasant Mohapatra, Chen-...
155
Voted
ISPASS
2007
IEEE
15 years 9 months ago
An Analysis of Performance Interference Effects in Virtual Environments
Virtualization is an essential technology in modern datacenters. Despite advantages such as security isolation, fault isolation, and environment isolation, current virtualization ...
Younggyun Koh, Rob C. Knauerhase, Paul Brett, Mic ...
139
Voted
P2P
2007
IEEE
165views Communications» more  P2P 2007»
15 years 8 months ago
An Information-Theoretic Framework for Analyzing Leak of Privacy in Distributed Hash Tables
An important security issue in DHT-based structured overlay networks is to provide anonymity to the storage nodes. Compromised routing tables in those DHTs leak information about ...
Souvik Ray, Zhao Zhang
« Prev « First page 2183 / 2321 Last » Next »