207
click to vote
SIGOPSE
15 years 10 months ago
2004 ACM
Anonymity is increasingly important for networked applications amidst concerns over censorship and privacy. This paper outlines the design of HerbivoreFS, a scalable and efficien...
144
click to vote
SIGOPSE
15 years 10 months ago
2004 ACM
Wireless ad hoc networks of sensor nodes are envisioned to be deployed in the physical environment to monitor a wide variety of real-world phenomena. Almost any sensor network appl...
147
click to vote
SIGOPSE
15 years 10 months ago
2004 ACM
This paper describes a cooperative overlay network that provides anonymous communication services for participating users. The Anonymizing Peer-to-Peer Proxy (AP3) system provides...
145
Voted
SIGOPSE
15 years 10 months ago
2004 ACM
Secure systems are best built on top of a small trusted operating system: The smaller the operating system, the easier it can be assured or verified for correctness. In this pape...
147
Voted
SIGOPSE
15 years 10 months ago
2004 ACM
We propose the Firecracker protocol for data dissemination in wireless sensor networks. Firecracker uses a combination of routing and broadcasts to rapidly deliver a piece of data...
|