Sciweavers

675 search results - page 52 / 135
» Anonymous communication in overlay networks
Sort
View
ICC
2007
IEEE
105views Communications» more  ICC 2007»
15 years 5 months ago
Wheel of Trust: A Secure Framework for Overlay-Based Services
— The recent advances of distributed hash tables (DHTs) facilitate the development of highly scalable and robust network applications and services. However, with applications and...
Guor-Huar Lu, Zhi-Li Zhang
WWW
2004
ACM
15 years 11 months ago
Gossip based streaming
In this paper, we propose a novel multicast streaming protocol for overlay networks, called Gossip Based Streaming (GBS). In GBS, streaming contents are not come from a single ups...
Xinyan Zhang, Jiangchuan Liu
FMCO
2007
Springer
129views Formal Methods» more  FMCO 2007»
15 years 4 months ago
Self Management for Large-Scale Distributed Systems: An Overview of the SELFMAN Project
As Internet applications become larger and more complex, the task of managing them becomes overwhelming. “Abnormal” events such as software updates, failures, attacks, and hots...
Peter Van Roy, Seif Haridi, Alexander Reinefeld, J...
CCS
2010
ACM
14 years 11 months ago
Recruiting new tor relays with BRAIDS
Tor, a distributed Internet anonymizing system, relies on volunteers who run dedicated relays. Other than altruism, these volunteers have no incentive to run relays, causing a lar...
Rob Jansen, Nicholas Hopper, Yongdae Kim
CCS
2009
ACM
15 years 5 months ago
As-awareness in Tor path selection
Tor is an anonymous communications network with thousands of router nodes worldwide. An intuition reflected in much of the literature on anonymous communications is that, as an a...
Matthew Edman, Paul F. Syverson