Sciweavers

12 search results - page 3 / 3
» Evaluation of JPEG2000 hashing for efficient authentication
Sort
View
CORR
2008
Springer
107views Education» more  CORR 2008»
13 years 4 months ago
Our Brothers' Keepers: Secure Routing with High Performance
The Trinity [1] spam classification system is based on a distributed hash table that is implemented using a structured peer-to-peer overlay. Such an overlay must be capable of proc...
Alex Brodsky, Scott Lindenberg
COMCOM
2006
194views more  COMCOM 2006»
13 years 4 months ago
INSENS: Intrusion-tolerant routing for wireless sensor networks
This paper describes an INtrusion-tolerant routing protocol for wireless SEnsor NetworkS (INSENS). INSENS securely and efficiently constructs tree-structured routing for wireless ...
Jing Deng, Richard Han, Shivakant Mishra