Sciweavers

671 search results - page 124 / 135
» Trust evaluation in ad-hoc networks
Sort
View
ICNP
2006
IEEE
14 years 3 months ago
Vault: A Secure Binding Service
— Binding services are crucial building blocks in networks and networked applications. A binding service (e.g., the Domain Name System (DNS)) maps certain information, namely, bi...
Guor-Huar Lu, Changho Choi, Zhi-Li Zhang
NSDI
2010
13 years 11 months ago
Prophecy: Using History for High-Throughput Fault Tolerance
Byzantine fault-tolerant (BFT) replication has enjoyed a series of performance improvements, but remains costly due to its replicated work. We eliminate this cost for read-mostly ...
Siddhartha Sen, Wyatt Lloyd, Michael J. Freedman
CSE
2009
IEEE
14 years 4 months ago
Private Buddy Search: Enabling Private Spatial Queries in Social Networks
—With the abundance of location-aware portable devices such as cellphones and PDAs, a new emerging application is to use this pervasive computing platform to learn about the wher...
Ali Khoshgozaran, Cyrus Shahabi
WWIC
2010
Springer
183views Communications» more  WWIC 2010»
14 years 2 months ago
Enhanced Mobility Support for Roaming Users: Extending the IEEE 802.21 Information Service
Many cell-phones and Personal Digital Assistants (PDAs) are equipped with multiple radio interfaces. Because of this, devices need to have ways of efficiently selecting the most su...
Karl Andersson, Andrea G. Forte, Henning Schulzrin...
NCA
2009
IEEE
14 years 4 months ago
Sharing Private Information Across Distributed Databases
—In industries such as healthcare, there is a need to electronically share privacy-sensitive data across distinct organizations. We show how this can be done while allowing organ...
Michael Siegenthaler, Ken Birman