Sciweavers

258 search results - page 36 / 52
» Trusting Routers and Relays in Ad hoc Networks
Sort
View
PERCOM
2006
ACM
14 years 7 months ago
Developing a Model for Trust Management in Pervasive Devices
Pervasive devices interacting in open and dynamic spaces with each others require a mechanism that allows them acting autonomously in a secure way and protecting their resources. ...
Andrés Marín López, Daniel Di...
USS
2004
13 years 9 months ago
Tor: The Second-Generation Onion Router
We present Tor, a circuit-based low-latency anonymous communication service. This second-generation Onion Routing system addresses limitations in the original design by adding per...
Roger Dingledine, Nick Mathewson, Paul F. Syverson
COMCOM
2006
178views more  COMCOM 2006»
13 years 7 months ago
SIP-based MIP6-MANET: Design and implementation of mobile IPv6 and SIP-based mobile ad hoc networks
In this paper, we designed and implemented an integrated wireless system, namely a SIP-based MIP6-MANET system. This SIP-based MIP6MANET system is an integration and implementatio...
Yuh-Shyan Chen, Yun-Hsuan Yang, Ren-Hung Hwang
IC
2010
13 years 5 months ago
Distributed Algorithms for the Placement of Network Services
Network services play an important role in the Internet today. They serve as data caches for websites, servers for multiplayer games and relay nodes for Voice over IP (VoIP) conver...
Todd Sproull, Roger Chamberlain
WS
2003
ACM
14 years 29 days ago
An authentication framework for hierarchical ad hoc sensor networks
Recent results indicate scalability problems for flat ad hoc networks. To address the issue of scalability, self-organizing hierarchical ad hoc architectures are being investigat...
Mathias Bohge, Wade Trappe