Sciweavers

1351 search results - page 70 / 271
» Trust in Anonymity Networks
Sort
View
MASS
2010
181views Communications» more  MASS 2010»
13 years 6 months ago
Perfectly anonymous data aggregation in wireless sensor networks
Clustering and data aggregation in wireless sensor networks improves scalability, and helps the efficient use of scarce resources. Yet, these mechanisms also introduce some securi...
Levente Buttyán, Tamás Holczer
GLOBECOM
2009
IEEE
14 years 3 months ago
Human Behavior and Challenges of Anonymizing WLAN Traces
—With the wide spread deployment of wireless LANs (WLANs), it is becoming necessary to conduct analysis of libraries of measurements taken from such operational networks. The ava...
Udayan Kumar, Ahmed Helmy
CISSE
2008
Springer
13 years 10 months ago
Modeling Trust in Wireless Ad-Hoc Networks
Tirthankar Ghosh, Hui Xu
ASIAN
2007
Springer
114views Algorithms» more  ASIAN 2007»
14 years 3 months ago
Large Scale Simulation of Tor:
Implementing global passive adversary attacks on currently deployed low latency anonymous networks is not feasible. This paper describes the implementation of a large scale, discre...
Gavin O'Gorman, Stephen Blott
P2P
2003
IEEE
100views Communications» more  P2P 2003»
14 years 2 months ago
Identity Crisis: Anonymity vs. Reputation in P2P Systems
The effectiveness of reputation systems for peer-to-peer resource-sharing networks is largely dependent on the reliability of the identities used by peers in the network. Much deb...
Sergio Marti, Hector Garcia-Molina