Sciweavers

675 search results - page 16 / 135
» Anonymous communication in overlay networks
Sort
View
COMSWARE
2007
IEEE
15 years 4 months ago
An Architecture and a Programming Interface for Application-Aware Data Dissemination Using Overlay Networks
- Many real-time distributed collaborative applications are emerging that require exchange of critical sensor data among geographically distant end users under resource-constrained...
Tarun Banka, Panho Lee, Anura P. Jayasumana, Jim K...
CCS
2011
ACM
13 years 10 months ago
Trust-based anonymous communication: adversary models and routing algorithms
We introduce a novel model of routing security that incorporates the ordinarily overlooked variations in trust that users have for different parts of the network. We focus on ano...
Aaron Johnson, Paul F. Syverson, Roger Dingledine,...
INFOCOM
2002
IEEE
15 years 3 months ago
Routing in Overlay Multicast Networks
— Multicast services can be provided either as a basic network service or as an application-layer service. Higher level multicast implementations often provide more sophisticated...
Sherlia Shi, Jonathan S. Turner
CLUSTER
2007
IEEE
14 years 10 months ago
Anonymous communications in the Internet
With the growth and acceptance of the Internet, there has been increased interest in maintaining anonymity in the network. Using traffic analysis, it is possible to infer who is t...
Arjan Durresi
95
Voted
JCST
2008
98views more  JCST 2008»
14 years 10 months ago
Probabilistic Adaptive Anonymous Authentication in Vehicular Networks
Vehicular networks have attracted extensive attention in recent years for their promises in improving safety and enabling other value-added services. Most previous work focuses on ...
Yong Xi, Kewei Sha, Weisong Shi, Loren Schwiebert,...