Sciweavers

675 search results - page 75 / 135
» Anonymous communication in overlay networks
Sort
View
ESAS
2004
Springer
15 years 4 months ago
Pseudonym Generation Scheme for Ad-Hoc Group Communication Based on IDH
In this paper we describe the advantages of using iterative Diffie-Hellman (IDH) key trees for mobile ad-hoc group communication. We focus on the Treebased Group Diffie-Hellman (...
Mark Manulis, Jörg Schwenk
CSCW
2010
ACM
15 years 7 months ago
Warrants and deception in computer mediated communication
This article explores the operation of warrants, connections between online and real-world identities, on deceptive behavior in computer-mediated communication. A survey of 132 pa...
Darcy Warkentin, Michael Woodworth, Jeffrey T. Han...
OSDI
2004
ACM
15 years 11 months ago
FUSE: Lightweight Guaranteed Distributed Failure Notification
FUSE is a lightweight failure notification service for building distributed systems. Distributed systems built with FUSE are guaranteed that failure notifications never fail. When...
John Dunagan, Nicholas J. A. Harvey, Michael B. Jo...
PERCOM
2009
ACM
15 years 11 months ago
Mobile Ad Hoc Networks: the DHT paradigm
In this paper, a DHT-based routing protocol which integrates at the network layer both traditional direct routing, i.e. MANET routing, and indirect key-based routing, i.e. P2P rout...
Marcello Caleffi
MOBILITY
2009
ACM
15 years 5 months ago
A membership management protocol for mobile P2P networks
MANETs are self-organizing networks composed of mobile wireless nodes with often scarce resources. Distributed applications based on the P2P paradigm are by nature good candidates...
Mohamed Karim Sbai, Emna Salhi, Chadi Barakat