Sciweavers

675 search results - page 56 / 135
» Anonymous communication in overlay networks
Sort
View
ACNS
2009
Springer
162views Cryptology» more  ACNS 2009»
15 years 5 months ago
Performance Measurements of Tor Hidden Services in Low-Bandwidth Access Networks
Abstract. Being able to access and provide Internet services anonymously is an important mechanism to ensure freedom of speech in vast parts of the world. Offering location-hidden...
Jörg Lenhard, Karsten Loesing, Guido Wirtz
WWIC
2005
Springer
147views Communications» more  WWIC 2005»
15 years 4 months ago
Location Assisted Fast Vertical Handover for UMTS/WLAN Overlay Networks
UMTS/WLAN integration offers considerable benefits for the users as well as for the mobile network. As soon as coverage is available, a mobile user should be able to switch seamle...
Tom Van Leeuwen, Ingrid Moerman, Bart Dhoedt, Piet...
EDO
2006
Springer
15 years 2 months ago
Damon: a decentralized aspect middleware built on top of a peer-to-peer overlay network
In this paper we present Damon, a decentralized wide-area runtime aspect middleware built on top of a structured peer-topeer (p2p) substrate and a dynamic Aspect Oriented Programm...
Rubén Mondéjar, Pedro García ...
MOBICOM
2010
ACM
14 years 11 months ago
Privacy vulnerability of published anonymous mobility traces
Mobility traces of people and vehicles have been collected and published to assist the design and evaluation of mobile networks, such as large-scale urban sensing networks. Althou...
Chris Y. T. Ma, David K. Y. Yau, Nung Kwan Yip, Na...
P2P
2006
IEEE
135views Communications» more  P2P 2006»
15 years 4 months ago
Ordered Slicing of Very Large-Scale Overlay Networks
Recently there has been an increasing interest to harness the potential of P2P technology to design and build rich environments where services are provided and multiple applicatio...
Márk Jelasity, Anne-Marie Kermarrec