Sciweavers

702 search results - page 54 / 141
» An overlay approach to data security in ad-hoc networks
Sort
View
BTW
2007
Springer
189views Database» more  BTW 2007»
15 years 4 months ago
Reconsidering Consistency Management in Shared Data Spaces for Emergency and Rescue Applications
: Efficient information sharing is very important for emergency and rescue operations. These operations often have to be performed in environments where no communication infrastruc...
Thomas Plagemann, Ellen Munthe-Kaas, Vera Goebel
GLOBECOM
2008
IEEE
15 years 4 months ago
Distributed Key Management with Protection Against RSU Compromise in Group Signature Based VANETs
—The group signature based security scheme is a promising approach to provision privacy in vehicular ad hoc networks (VANETs). In this paper, we propose a novel distributed key m...
Yong Hao, Yu Cheng, Kui Ren
DSN
2007
IEEE
15 years 4 months ago
Concilium: Collaborative Diagnosis of Broken Overlay Routes
In a peer-to-peer overlay network, hosts cooperate to forward messages. When a message does not reach its final destination, there are two possible explanations. An intermediate ...
James W. Mickens, Brian D. Noble
GLOBECOM
2010
IEEE
14 years 7 months ago
Assessing the Impact of Geographically Correlated Failures on Overlay-Based Data Dissemination
Abstract--This paper addresses reliability of data dissemination applications when there are severe disruptions to the underlying physical infrastructure. Such massive simultaneous...
Kyungbaek Kim, Nalini Venkatasubramanian
VLDB
2005
ACM
83views Database» more  VLDB 2005»
15 years 3 months ago
Indexing Data-oriented Overlay Networks
The application of structured overlay networks to implement index structures for data-oriented applications such as peer-to-peer databases or peer-to-peer information retrieval, r...
Karl Aberer, Anwitaman Datta, Manfred Hauswirth, R...