Sciweavers

675 search results - page 16 / 135
» Anonymous communication in overlay networks
Sort
View
124
Voted
COMSWARE
2007
IEEE
15 years 6 months ago
An Architecture and a Programming Interface for Application-Aware Data Dissemination Using Overlay Networks
- Many real-time distributed collaborative applications are emerging that require exchange of critical sensor data among geographically distant end users under resource-constrained...
Tarun Banka, Panho Lee, Anura P. Jayasumana, Jim K...
106
Voted
CCS
2011
ACM
14 years 4 days ago
Trust-based anonymous communication: adversary models and routing algorithms
We introduce a novel model of routing security that incorporates the ordinarily overlooked variations in trust that users have for different parts of the network. We focus on ano...
Aaron Johnson, Paul F. Syverson, Roger Dingledine,...
108
Voted
INFOCOM
2002
IEEE
15 years 5 months ago
Routing in Overlay Multicast Networks
— Multicast services can be provided either as a basic network service or as an application-layer service. Higher level multicast implementations often provide more sophisticated...
Sherlia Shi, Jonathan S. Turner
98
Voted
CLUSTER
2007
IEEE
14 years 12 months ago
Anonymous communications in the Internet
With the growth and acceptance of the Internet, there has been increased interest in maintaining anonymity in the network. Using traffic analysis, it is possible to infer who is t...
Arjan Durresi
JCST
2008
98views more  JCST 2008»
15 years 4 days ago
Probabilistic Adaptive Anonymous Authentication in Vehicular Networks
Vehicular networks have attracted extensive attention in recent years for their promises in improving safety and enabling other value-added services. Most previous work focuses on ...
Yong Xi, Kewei Sha, Weisong Shi, Loren Schwiebert,...