Sciweavers

675 search results - page 40 / 135
» Anonymous communication in overlay networks
Sort
View
ESORICS
2008
Springer
15 years 12 days ago
A Multi-Path Approach for k-Anonymity in Mobile Hybrid Networks
The ubiquitous proliferation of mobile devices has given rise to novel user-centric application and services. In current mobile systems, users gain access to remote service provide...
Claudio Agostino Ardagna, Angelos Stavrou, Sushil ...
ICC
2011
IEEE
199views Communications» more  ICC 2011»
13 years 10 months ago
Equal-Sized Cells Mean Equal-Sized Packets in Tor?
Abstract—Tor is a well-known low-latency anonymous communication system. To prevent the traffic analysis attack, Tor packs application data into equal-sized cells. However, we f...
Zhen Ling, Junzhou Luo, Wei Yu, Xinwen Fu
IWQOS
2004
Springer
15 years 4 months ago
Topology design for service overlay networks with bandwidth guarantees
— The Internet still lacks adequate support for QoS applications with real-time requirements. In great part, this is due to the fact that provisioning of end-to-end QoS to traf...
S. L. Vieira, Jörg Liebeherr
NOSSDAV
2005
Springer
15 years 4 months ago
Platform Overlays: enabling in-network stream processing in large-scale distributed applications
The purpose of this research is to explore the capabilities of future, multi-core heterogeneous systems, with specialized communication support, to be used as efficient and flex...
Ada Gavrilovska, Sanjay Kumar, Srikanth Sundaragop...
IPPS
2006
IEEE
15 years 4 months ago
Free network measurement for adaptive virtualized distributed computing
An execution environment consisting of virtual machines (VMs) interconnected with a virtual overlay network can use the naturally occurring traffic of an existing, unmodified ap...
Ashish Gupta, Marcia Zangrilli, Ananth I. Sundarar...