Sciweavers

SIGOPSE
2004
ACM
13 years 11 months ago
Eluding carnivores: file sharing with strong anonymity
Anonymity is increasingly important for networked applications amidst concerns over censorship and privacy. This paper outlines the design of HerbivoreFS, a scalable and efficien...
Emin Gün Sirer, Sharad Goel, Mark Robson, Dog...
SIGOPSE
2004
ACM
13 years 11 months ago
Generic role assignment for wireless sensor networks
Wireless ad hoc networks of sensor nodes are envisioned to be deployed in the physical environment to monitor a wide variety of real-world phenomena. Almost any sensor network appl...
Kay Römer, Christian Frank, Pedro José...
SIGOPSE
2004
ACM
13 years 11 months ago
AP3: cooperative, decentralized anonymous communication
This paper describes a cooperative overlay network that provides anonymous communication services for participating users. The Anonymizing Peer-to-Peer Proxy (AP3) system provides...
Alan Mislove, Gaurav Oberoi, Ansley Post, Charles ...
SIGOPSE
2004
ACM
13 years 11 months ago
Reducing TCB size by using untrusted components: small kernels versus virtual-machine monitors
Secure systems are best built on top of a small trusted operating system: The smaller the operating system, the easier it can be assured or verified for correctness. In this pape...
Michael Hohmuth, Michael Peter, Hermann Härti...
SIGOPSE
2004
ACM
13 years 11 months ago
The firecracker protocol
We propose the Firecracker protocol for data dissemination in wireless sensor networks. Firecracker uses a combination of routing and broadcasts to rapidly deliver a piece of data...
Philip Levis, David E. Culler
Operating System
Top of PageReset Settings