Sciweavers

152
Voted
DSN
2004
IEEE
15 years 7 months ago
Fault Tolerant Energy Aware Data Dissemination Protocol in Sensor Networks
In this paper we present a data dissemination protocol for efficiently distributing data through a sensor network in the face of node and link failures. Our work is motivated by t...
Gunjan Khanna, Saurabh Bagchi, Yu-Sung Wu
136
Voted
CCS
2006
ACM
15 years 7 months ago
Virtual monotonic counters and count-limited objects using a TPM without a trusted OS
A trusted monotonic counter is a valuable primitive that enables a wide variety of highly scalable offline and decentralized applications that would otherwise be prone to replay a...
Luis F. G. Sarmenta, Marten van Dijk, Charles W. O...
126
Voted
CCS
2006
ACM
15 years 7 months ago
Daonity: grid security with behaviour conformity from trusted computing
A central security requirement for grid computing can be referred to as behaviour conformity. This is an assurance that ad hoc related principals (users, platforms or instruments)...
Wenbo Mao, Fei Yan, Chunrun Chen
DSN
2004
IEEE
15 years 7 months ago
Automated System Design for Availability
G. John Janakiraman, Jose Renato Santos, Yoshio Tu...
123
Voted
CCS
2006
ACM
15 years 7 months ago
Scalable group communication system for scalable trust
Programmers of large-scale trusted systems need tools to simplify tasks such as replicating services or data. Group communication systems achieve this via various flavors of relia...
Krzysztof Ostrowski, Kenneth P. Birman