Sciweavers

675 search results - page 70 / 135
» Anonymous communication in overlay networks
Sort
View
SECON
2007
IEEE
15 years 5 months ago
Privacy Preserving Communication in MANETs
Abstract— Mobile ad hoc networks often support sensitive applications. These applications may require that users’ identity, location, and correspondents be kept secret. This is...
Heesook Choi, Patrick Drew McDaniel, Thomas F. La ...
104
Voted
ICC
2007
IEEE
106views Communications» more  ICC 2007»
15 years 5 months ago
A Distributed Approach to End-to-End Network Topology Inference
Abstract— To construct an efficient overlay network, the information of underlay is important. However, the inference of an underlay topology is not easy. We consider using end-...
Xing Jin, Qiuyan Xia, Shueng-Han Gary Chan
84
Voted
CCGRID
2002
IEEE
15 years 3 months ago
Invisible Network: Concepts and Architecture
Efficient schemes for deploying and maintaining widearea services and accessing such services are essential if the Internet is to sustain itself as the communication medium for b...
Muthucumaru Maheswaran, Balasubramaneyam Maniymara...
68
Voted
PERCOM
2007
ACM
15 years 10 months ago
MundoCore: A light-weight infrastructure for pervasive computing
MundoCore is a communication middleware specifically designed for the requirements of pervasive computing. To address the high degree of heterogeneity of platforms and networking ...
Erwin Aitenbichler, Jussi Kangasharju, Max Mühlh...
61
Voted
FC
2009
Springer
93views Cryptology» more  FC 2009»
15 years 5 months ago
Detecting Denial of Service Attacks in Tor
Abstract. Tor is currently one of the more popular systems for anonymizing near real-time communications on the Internet. Recently, Borisov et al. proposed a denial of service base...
Norman Danner, Danny Krizanc, Marc Liberatore