Sciweavers

671 search results - page 126 / 135
» Trust evaluation in ad-hoc networks
Sort
View
OSDI
2002
ACM
14 years 10 months ago
Secure Routing for Structured Peer-to-Peer Overlay Networks
Structured peer-to-peer overlay networks provide a substrate for the construction of large-scale, decentralized applications, including distributed storage, group communication, a...
Miguel Castro, Peter Druschel, Ayalvadi J. Ganesh,...
ECIS
2004
13 years 11 months ago
Security and privacy in a structured information network
The lack of trust amongst consumers and concerns about disclosing personal information are commonly seen as a major impediment to the growth of e-commerce. This is a consequence o...
Tuomas Valtonen, Tero Reuna, Kalle Luhtinen
AAMAS
2006
Springer
13 years 10 months ago
CONFIDANT: Collaborative Object Notification Framework for Insider Defense using Autonomous Network Transactions
File Integrity Analyzers serve as a component of an Intrusion Detection environment by performing filesystem inspections to verify the content of security-critical files in order ...
Adam J. Rocke, Ronald F. DeMara
MIDDLEWARE
2007
Springer
14 years 4 months ago
Securing peer-to-peer media streaming systems from selfish and malicious behavior
We present a flexible framework for throttling attackers in peerto-peer media streaming systems. In such systems, selfish nodes (e.g., free riders) and malicious nodes (e.g., DoS ...
William Conner, Klara Nahrstedt
ICUMT
2009
13 years 7 months ago
Multipath at the transport layer: An end-to-end resilience mechanism
Abstract--As society's dependence on network technology increases, the need for resilience and survivability in these services becomes increasingly apparent. Since the user ex...
Justin P. Rohrer, Ramya Naidu, James P. G. Sterben...